Reigning in the Remote Employee: Applying Social Learning Theory to Explain Information Security Policy Compliance Attitudes
@inproceedings{Johnston2010ReigningIT, title={Reigning in the Remote Employee: Applying Social Learning Theory to Explain Information Security Policy Compliance Attitudes}, author={A. Johnston and Barbara Wech and E. Jack and M. Beavers}, booktitle={AMCIS}, year={2010} }
In an era of heightened sensitivity to issues of privacy or information security, concerns over policy compliance by all employees is of great importance. Many organizations are increasing the resources devoted to compliance training and efforts to inform employees of proper compliance behavior. Compliance by remote employees, however, is especially challenging as they are often not privy to the same resources provided of their in-house counterparts. Through a survey of over 500 remote and in… CONTINUE READING
Figures, Tables, and Topics from this paper
8 Citations
A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour
- Computer Science
- Int. J. Inf. Secur. Priv.
- 2015
- 37
- PDF
Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance
- Computer Science
- MIS Q.
- 2019
- 41
- PDF
The Theory of Planned Behavior and Information Security Policy Compliance
- Economics, Computer Science
- J. Comput. Inf. Syst.
- 2019
- 14
A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behavior
- 2014
- 2
- PDF
Which are the Most Effective Measures for Improving Employees' Security Compliance?
- Business, Computer Science
- ICIS
- 2015
- 2
Measuring employees' compliance - the importance of value pluralism
- Political Science, Computer Science
- Inf. Comput. Secur.
- 2017
- 12
References
SHOWING 1-10 OF 42 REFERENCES
A Self-Efficacy Theory Explanation for the Management of Remote Workers in Virtual Organizations
- Psychology, Computer Science
- J. Comput. Mediat. Commun.
- 1998
- 359
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
- Psychology, Computer Science
- Inf. Syst. Res.
- 2009
- 891
- PDF
Diffusing the Internet in the Arab world: the role of social norms and technological culturation
- Economics, Computer Science
- IEEE Trans. Engineering Management
- 2003
- 391
Self-efficacy: Toward a unifying theory of behavioral change☆☆☆
- Psychology
- 1978
- 11,632
- Highly Influential
Prior family business exposure as intergenerational influence and entrepreneurial intent: A Theory of Planned Behavior approach
- Psychology
- 2007
- 523
- PDF
Validation in Information Systems Research: A State-of-the-Art Assessment
- Psychology, Computer Science
- MIS Q.
- 2001
- 911
- PDF