IS

Hung, Yu Wen

Topic Weight Topic Terms
0.289 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.170 behavior behaviors behavioral study individuals affect model outcomes psychological individual responses negative influence explain hypotheses
0.139 organizational organizations effectiveness factors managers model associated context characteristics variables paper relationships level attention environmental
0.122 control controls formal systems mechanisms modes clan informal used internal literature outsourced outcome theory configuration

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Hsu, Jack Shih-Chieh 1 Lowry, Paul Benjamin 1 Shih, Sheng-Pao 1
behavioral security 1 extra-role behaviors 1 formal control 1 IS security 1
in-role behaviors 1 information security policy 1 ISP 1 organizations 1
social control theory 1 SCT 1 security management 1 social control 1

Articles (1)

The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness (Information Systems Research, 2015)
Authors: Abstract:
    Although most behavioral security studies focus on organizational in-role behaviors such as information security policy (ISP) compliance, the role of organizational extra-role behaviorsÑsecurity behaviors that benefit organizations but are not specified in ISPsÑhas long been overlooked. This study examines (1) the consequences of organizational in-role and extra-role security behaviors on the effectiveness of ISPs and (2) the role of formal and social controls in enhancing in-role and extra-role security behaviors in organizations. We propose that both in-role security behaviors and extra-role security behaviors contribute to ISP effectiveness. Furthermore, based on social control theory, we hypothesize that social control can boost both in- and extra-role security behaviors. Data collected from practitionersÑincluding information systems (IS) managers and employees at many organizationsÑconfirmed most of our hypotheses. Survey data from IS managers substantiated the importance of extra-role behaviors in improving ISP effectiveness. Paired data, collected from managers and employees in the same organizations, indicated that formal control and social control individually and interactively enhance both in- and extra-role security behaviors. We conclude by discussing the implications of this research for academics and practitioners, along with compelling future research possibilities.