{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T13:22:32Z","timestamp":1776864152129,"version":"3.51.2"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T00:00:00Z","timestamp":1687910400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T00:00:00Z","timestamp":1687910400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cogn Tech Work"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s10111-023-00727-5","type":"journal-article","created":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T00:02:27Z","timestamp":1687910547000},"page":"273-289","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["The impact of an employee\u2019s psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation"],"prefix":"10.1007","volume":"25","author":[{"given":"Daeun","family":"Lee","sequence":"first","affiliation":[]},{"given":"Harjinder Singh","family":"Lallie","sequence":"additional","affiliation":[]},{"given":"Nadine","family":"Michaelides","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,28]]},"reference":[{"key":"727_CR1","doi-asserted-by":"crossref","unstructured":"Abela F, Debono M (2019) The relationship between psychological contract breach and job-related attitudes within a manufacturing plant. SAGE Open 9 (1): 2158244018822179 (ISSN 2158-2440)","DOI":"10.1177\/2158244018822179"},{"key":"727_CR2","unstructured":"Abraham S (2011) Information security behavior: factors and research directions"},{"key":"727_CR3","doi-asserted-by":"crossref","unstructured":"Al-Abrrow H Alnoor A, Ismail E, Eneizan B, Makhamreh HZ(2019) Psychological contract and organizational misbehavior: Exploring the moderating and mediating effects of organizational health and psychological contract breach in Iraqi oil tanks company. Cogent Bus Manag 6 (1): 1683123 (ISSN 2331-1975)","DOI":"10.1080\/23311975.2019.1683123"},{"key":"727_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102003","volume":"98","author":"M Alshaikh","year":"2020","unstructured":"Alshaikh M (2020) Developing cybersecurity culture to influence employee behavior: a practice perspective. Comput Secur 98:102003","journal-title":"Comput Secur"},{"key":"727_CR5","doi-asserted-by":"crossref","unstructured":"Alzahrani A, Johnson C, Altamimi S (2018) Information security policy compliance: investigating the role of intrinsic motivation towards policy compliance in the organisation. In: 2018 4th international conference on information management (ICIM), pp 125\u2013132. IEEE, New York","DOI":"10.1109\/INFOMAN.2018.8392822"},{"key":"727_CR6","unstructured":"Bada M, Sasse AM, Nurse Jason\u00a0RC (2019) Cyber security awareness campaigns: why do they fail to change behaviour? arXiv preprint arXiv:1901.02672"},{"key":"727_CR7","doi-asserted-by":"crossref","unstructured":"Bal PM, De\u00a0Cooman R, Mol ST (2013) Dynamics of psychological contracts with work engagement and turnover intention: the influence of organizational tenure. Eur J Work Organ Psychol 22(1): 107\u2013122 (ISSN 1359-432X)","DOI":"10.1080\/1359432X.2011.626198"},{"key":"727_CR8","unstructured":"Bal P, Chiaburu DS, Jansen PGW (2010) Psychological contract breach and work performance: is social exchange a buffer or an intensifier? J Manag Psychol (ISSN 0268-3946)"},{"issue":"3","key":"727_CR9","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1111\/1467-937X.00253","volume":"70","author":"R Benabou","year":"2003","unstructured":"Benabou R, Tirole J (2003) Intrinsic and extrinsic motivation. Rev Econ Stud 70(3):489\u2013520","journal-title":"Rev Econ Stud"},{"issue":"4","key":"727_CR10","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1177\/0734371X03259295","volume":"23","author":"EM Berman","year":"2003","unstructured":"Berman EM, West JP (2003) Psychological contracts in local government: a preliminary survey. Rev Public Pers Admin 23(4):267\u2013285","journal-title":"Rev Public Pers Admin"},{"issue":"3","key":"727_CR11","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1177\/1747954119848420","volume":"14","author":"GA Bravo","year":"2019","unstructured":"Bravo GA, Won D, Chiu W (2019) Psychological contract, job satisfaction, commitment, and turnover intention: exploring the moderating role of psychological contract breach in national collegiate athletic association coaches. Int J Sports Sci Coach 14(3):273\u2013284","journal-title":"Int J Sports Sci Coach"},{"key":"727_CR12","volume-title":"Confirmatory factor analysis for applied research","author":"TA Brown","year":"2015","unstructured":"Brown TA (2015) Confirmatory factor analysis for applied research. Guilford Publications, New York"},{"key":"727_CR13","unstructured":"Bulgurcu B, Cavusoglu H, Benbasat I (2009) Roles of information security awareness and perceived fairness in information security policy compliance. In: AMCIS 2009 proceedings, p 419"},{"key":"727_CR14","doi-asserted-by":"crossref","unstructured":"Bulgurcu B, Cavusoglu H, Benbasat I (2010) Quality and fairness of an information security policy as antecedents of employees\u2019 security engagement in the workplace: an empirical investigation. In: 2010 43rd Hawaii international conference on system sciences, pp 1\u20137. IEEE, New York","DOI":"10.1109\/HICSS.2010.312"},{"key":"727_CR15","unstructured":"Bulgurcu B, Cavusoglu H, Benbasat I (2011) Information security policy compliance: the role of fairness, commitment, and cost beliefs. In: MCIS 2011 proceedings"},{"key":"727_CR16","unstructured":"CERT\/CC (2016) Cert insider threat center, 2016. https:\/\/resources.sei.cmu.edu\/asset_files\/Brochure\/2017_015_001_452233.pdf"},{"issue":"3","key":"727_CR17","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1080\/14697017.2017.1407353","volume":"18","author":"HH Chiu","year":"2018","unstructured":"Chiu HH (2018) Employees\u2019 intrinsic and extrinsic motivations in innovation implementation: the moderation role of managers\u2019 persuasive and assertive strategies. J Change Manag 18(3):218\u2013239","journal-title":"J Change Manag"},{"key":"727_CR18","doi-asserted-by":"crossref","unstructured":"Conner M (2020) Theory of planned behavior. In: Handbook of sport psychology, pp 1\u201318","DOI":"10.1002\/9781119568124.ch1"},{"issue":"4","key":"727_CR19","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1080\/02678373.2011.632610","volume":"25","author":"AH de Lange","year":"2011","unstructured":"de Lange AH, Bal PM, Van der Heijden BIJM, de Jong N, Schaufeli WB (2011) When I\u2019m 64: psychological contract breach, work motivation and the moderating roles of future time perspective and regulatory focus. Work Stress 25(4):338\u2013354","journal-title":"Work Stress"},{"key":"727_CR20","doi-asserted-by":"crossref","unstructured":"De\u00a0Clercq D, Haq IU, Azeem MU (2019) Perceived contract violation and job satisfaction: buffering roles of emotion regulation skills and work-related self-efficacy. Int J Organ Anal (ISSN 1934-8835)","DOI":"10.1108\/IJOA-07-2019-1837"},{"key":"727_CR21","volume-title":"Everyday cyber security in organisations","author":"A Ertan","year":"2018","unstructured":"Ertan A, Crossland G, Denny D, Jensen R (2018) Everyday cyber security in organisations. Claude Heath, London"},{"issue":"1","key":"727_CR22","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1504\/IJHST.2014.064398","volume":"4","author":"F Fathian","year":"2014","unstructured":"Fathian F, Dehghan Z, Eslamian S (2014) Analysis of water level changes in lake Urmia based on data characteristics and non-parametric test. Int J Hydrol Sci Technol 4(1):18\u201338","journal-title":"Int J Hydrol Sci Technol"},{"key":"727_CR23","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.cose.2016.01.004","volume":"59","author":"WR Flores","year":"2016","unstructured":"Flores WR, Ekstedt M (2016) Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. Comput Secur 59:26\u201344","journal-title":"Comput Secur"},{"key":"727_CR24","doi-asserted-by":"crossref","unstructured":"Han JY, Kim YJ, Kim H (2017) An integrative model of information security policy compliance with psychological contract: examining a bilateral perspective. Comput Secur 66: 52\u201365 (ISSN 0167-4048)","DOI":"10.1016\/j.cose.2016.12.016"},{"key":"727_CR25","doi-asserted-by":"crossref","unstructured":"Han JY, Kim YJ, Kim H (2017) An integrative model of information security policy compliance with psychological contract: examining a bilateral perspective. Comput Secur 66: 52\u201365 (ISSN 0167-4048)","DOI":"10.1016\/j.cose.2016.12.016"},{"issue":"2","key":"727_CR26","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1177\/0091026014564071","volume":"44","author":"JR Harrington","year":"2015","unstructured":"Harrington JR, Lee JH (2015) What drives perceived fairness of performance appraisal? Exploring the effects of psychological contract fulfillment on employees\u2019 perceived fairness of performance appraisal in US Federal Agencies. Public Pers Manag 44(2):214\u2013238","journal-title":"Public Pers Manag"},{"issue":"2","key":"727_CR27","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.dss.2009.02.005","volume":"47","author":"T Herath","year":"2009","unstructured":"Herath T, Rao HR (2009) Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness. Decis Supp Syst 47(2):154\u2013165","journal-title":"Decis Supp Syst"},{"issue":"2","key":"727_CR28","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1057\/ejis.2009.6","volume":"18","author":"T Herath","year":"2009","unstructured":"Herath T, Rao HR (2009) Protection motivation and deterrence: a framework for security policy compliance in organisations. Eur J Inf Syst 18(2):106\u2013125","journal-title":"Eur J Inf Syst"},{"issue":"1","key":"727_CR29","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","volume":"31","author":"P Ifinedo","year":"2012","unstructured":"Ifinedo P (2012) Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Comput Secur 31(1):83\u201395","journal-title":"Comput Secur"},{"key":"727_CR30","unstructured":"ISF (2020) Human-centred security, 2020. https:\/\/www.securityforum.org\/human-centred-security-positively-influencing-security-behaviour\/"},{"key":"727_CR31","doi-asserted-by":"publisher","DOI":"10.1201\/9781315372785","volume-title":"Information security policies, procedures, and standards: a practitioner\u2019s reference","author":"DJ Landoll","year":"2017","unstructured":"Landoll DJ (2017) Information security policies, procedures, and standards: a practitioner\u2019s reference. CRC Press, London"},{"key":"727_CR32","doi-asserted-by":"crossref","unstructured":"Leach J (2003) Improving user security behaviour. Comput Secur 22 (8): 685\u2013692 (ISSN 0167-4048)","DOI":"10.1016\/S0167-4048(03)00007-5"},{"key":"727_CR33","doi-asserted-by":"crossref","unstructured":"Lebek B, Uffen J, Neumann M, Hohler B, Breitner MH (2014) Information security awareness and behavior: a theory-based literature review. Manag Res Rev","DOI":"10.1109\/HICSS.2013.192"},{"key":"727_CR34","doi-asserted-by":"crossref","unstructured":"Lin T-C, Huang S-L, Chiang S-C (2018) User resistance to the implementation of information systems: a psychological contract breach perspective. J Assoc Inf Syst 19(4): 2 (ISSN 1536-9323)","DOI":"10.17705\/1jais.00493"},{"key":"727_CR35","doi-asserted-by":"crossref","unstructured":"Mai KM, Ellis APJ, Christian JS, Porter COLH (2016) Examining the effects of turnover intentions on organizational citizenship behaviors and deviance behaviors: a psychological contract approach. J Appl Psychol 101(8): 1067 (ISSN 1939-1854)","DOI":"10.1037\/apl0000115"},{"issue":"8","key":"727_CR36","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.1037\/apl0000115","volume":"101","author":"KM Mai","year":"2016","unstructured":"Mai KM, Ellis APJ, Christian JS, Porter COLH (2016) Examining the effects of turnover intentions on organizational citizenship behaviors and deviance behaviors: a psychological contract approach. J Appl Psychol 101(8):1067","journal-title":"J Appl Psychol"},{"issue":"1","key":"727_CR37","doi-asserted-by":"publisher","first-page":"38","DOI":"10.5430\/sass.v4n1p38","volume":"4","author":"A Makki","year":"2017","unstructured":"Makki A, Abid M (2017) Influence of intrinsic and extrinsic motivation on employee\u2019s task performance. Stud Asian Soc Sci 4(1):38\u201343","journal-title":"Stud Asian Soc Sci"},{"key":"727_CR38","doi-asserted-by":"crossref","unstructured":"Ma B, Liu S, Lassleben H, Ma G (2019) The relationships between job insecurity, psychological contract breach and counterproductive workplace behavior. Pers Rev (ISSN 0048-3486)","DOI":"10.1108\/PR-04-2018-0138"},{"issue":"16","key":"727_CR39","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.1111\/j.1559-1816.1998.tb01689.x","volume":"28","author":"LJ Millward","year":"1998","unstructured":"Millward LJ, Hopkins LJ (1998) Psychological contracts, organizational and job commitment. J Appl Soc Psychol 28(16):1530\u20131556","journal-title":"J Appl Soc Psychol"},{"issue":"1","key":"727_CR40","doi-asserted-by":"publisher","first-page":"226","DOI":"10.2307\/259230","volume":"22","author":"EW Morrison","year":"1997","unstructured":"Morrison EW, Robinson SL (1997) When employees feel betrayed: a model of how psychological contract violation develops. Acad Manag Rev 22(1):226\u2013256","journal-title":"Acad Manag Rev"},{"key":"727_CR41","unstructured":"MRC (2013) What thresholds should I use for factor loading cut-offs? https:\/\/imaging.mrc-cbu.cam.ac.uk\/statswiki\/FAQ\/thresholds"},{"key":"727_CR42","doi-asserted-by":"crossref","unstructured":"Nasir A, Arshah RA, Hamid MRA (2017) Information security policy compliance behavior based on comprehensive dimensions of information security culture: a conceptual framework. In: Proceedings of the 2017 international conference on information system and data mining, pp 56\u201360","DOI":"10.1145\/3077584.3077593"},{"key":"727_CR43","doi-asserted-by":"crossref","unstructured":"Pate J, Martin G, McGoldrick J (2003) The impact of psychological contract violation on employee attitudes and behaviour. Employee Relat (ISSN 0142-5455)","DOI":"10.1108\/01425450310501306"},{"key":"727_CR44","doi-asserted-by":"crossref","unstructured":"Robinson SL , Morrison EW (2000) The development of psychological contract breach and violation: a longitudinal study. J Organ Behav 21(5): 525\u2013546 (ISSN 0894-3796)","DOI":"10.1002\/1099-1379(200008)21:5<525::AID-JOB40>3.0.CO;2-T"},{"key":"727_CR45","doi-asserted-by":"publisher","first-page":"574","DOI":"10.2307\/2393868","volume":"41","author":"SL Robinson","year":"1996","unstructured":"Robinson SL (1996) Trust and breach of the psychological contract. Admin Sci Q 41:574\u2013599","journal-title":"Admin Sci Q"},{"issue":"3","key":"727_CR46","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1002\/job.4030150306","volume":"15","author":"SL Robinson","year":"1994","unstructured":"Robinson SL, Rousseau DM (1994) Violating the psychological contract: not the exception but the norm. J Organ Behav 15(3):245\u2013259","journal-title":"J Organ Behav"},{"issue":"1","key":"727_CR47","doi-asserted-by":"publisher","first-page":"137","DOI":"10.2307\/256773","volume":"37","author":"SL Robinson","year":"1994","unstructured":"Robinson SL, Kraatz MS, Rousseau DM (1994) Changing obligations and the psychological contract: a longitudinal study. Acad Manag J 37(1):137\u2013152","journal-title":"Acad Manag J"},{"issue":"2","key":"727_CR48","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/BF01384942","volume":"2","author":"DM Rousseau","year":"1989","unstructured":"Rousseau DM (1989) Psychological and implied contracts in organizations. Employee Respons Rights J 2(2):121\u2013139","journal-title":"Employee Respons Rights J"},{"key":"727_CR49","doi-asserted-by":"crossref","unstructured":"Safa NS, Maple C, Azad Furnell SMA, Perera C, Dabbagh M, Sookhak M (2019) Deterrence and prevention-based model to mitigate information security insider threats in organisations. Future Gener Comput Syst 97:587\u2013597","DOI":"10.1016\/j.future.2019.03.024"},{"issue":"1","key":"727_CR50","first-page":"60","volume":"6","author":"L Shamini","year":"2021","unstructured":"Shamini L (2021) A study on the influence job satisfaction of millennial workers in beverage manufacturing industry. Electron J Bus Manag 6(1):60\u201380","journal-title":"Electron J Bus Manag"},{"key":"727_CR51","doi-asserted-by":"crossref","unstructured":"Topa I, Karyda M (2015) Identifying factors that influence employees\u2019 security behavior for enhancing ISP compliance. In: International conference on trust and privacy in digital business. Springer, New York, pp 169\u2013179","DOI":"10.1007\/978-3-319-22906-5_13"},{"key":"727_CR52","unstructured":"Trybou J, Gemmel P (2016) The mediating role of psychological contract violation between psychological contract breach and nurses\u2019 organizational attitudes. Nurs Econ 34(6): 296\u2013303 (ISSN 0746-1739)"},{"issue":"3","key":"727_CR53","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1080\/14697017.2020.1737180","volume":"20","author":"E van Gilst","year":"2020","unstructured":"van Gilst E, Schalk R, Kluijtmans T, Poell R (2020) The role of remediation in mitigating the negative consequences of psychological contract breach: a qualitative study in the banking sector. J Change Manag 20(3):264\u2013282","journal-title":"J Change Manag"},{"key":"727_CR54","doi-asserted-by":"crossref","unstructured":"Wiktorowicz J et\u00a0al (2016) Exploratory factor analysis in the measurement of the competencies of older people. Ekonometria","DOI":"10.15611\/ekt.2016.4.03"},{"key":"727_CR55","doi-asserted-by":"crossref","unstructured":"Williams KR, Hawkins R (1986) Perceptual research on general deterrence: a critical review. Law Soc Rev 545\u2013572 (ISSN 0023-9216)","DOI":"10.2307\/3053466"},{"key":"727_CR56","doi-asserted-by":"crossref","unstructured":"Zhao H, Wayne SJ, Glibkowski BC, Bravo J (2007) The impact of psychological contract breach on work-related outcomes: a meta-analysis. Pers Psychol 60(3): 647\u2013680 (ISSN 0031-5826)","DOI":"10.1111\/j.1744-6570.2007.00087.x"}],"container-title":["Cognition, Technology &amp; Work"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10111-023-00727-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10111-023-00727-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10111-023-00727-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,14]],"date-time":"2023-07-14T06:37:55Z","timestamp":1689316675000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10111-023-00727-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,28]]},"references-count":56,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["727"],"URL":"https:\/\/doi.org\/10.1007\/s10111-023-00727-5","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-1447260\/v1","asserted-by":"object"}]},"ISSN":["1435-5558","1435-5566"],"issn-type":[{"value":"1435-5558","type":"print"},{"value":"1435-5566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,28]]},"assertion":[{"value":"13 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that we have no competing financial or non-financial interests that are directly or indirectly related to the work submitted for publication.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}