{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T03:54:45Z","timestamp":1776830085003,"version":"3.51.2"},"reference-count":23,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2015,6,8]],"date-time":"2015-06-08T00:00:00Z","timestamp":1433721600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6,8]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 This paper aims to challenge the assumption that the theory of planned behaviour (TPB) includes all constructs that explain information security policy compliance and investigates if anticipated regret or constructs from the protection motivation theory add explanatory power. The TPB is an established theory that has been found to predict compliance with information security policies well. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 Responses from 306 respondents at a research organization were collected using a questionnaire-based survey. Extensions in terms of anticipated regret and constructs drawn from the protection motivation theory are tested using hierarchical regression analysis. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 Adding anticipated regret and the threat appraisal process results in improvements of the predictions of intentions. The improvements are of sufficient magnitude to warrant adjustments of the model of the TPB when it is used in the area of information security policy compliance. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 This study is the first test of anticipated regret as a predictor of information security policy compliance and the first to assess its influence in relation to the TPB and the protection motivation theory.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/ics-04-2014-0025","type":"journal-article","created":{"date-parts":[[2015,5,22]],"date-time":"2015-05-22T08:10:47Z","timestamp":1432282247000},"page":"200-217","source":"Crossref","is-referenced-by-count":83,"title":["The sufficiency of the theory of planned behavior for explaining information security policy compliance"],"prefix":"10.1108","volume":"23","author":[{"given":"Teodor","family":"Sommestad","sequence":"first","affiliation":[]},{"given":"Henrik","family":"Karlz\u00e9n","sequence":"additional","affiliation":[]},{"given":"Jonas","family":"Hallberg","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020122322510535900_b1","doi-asserted-by":"crossref","unstructured":"Ajzen, I.\n                (1991), \u201cThe theory of planned behavior\u201d, \n                  Organizational Behavior and Human Decision Process\n               , Vol. 50 No. 2, pp. 179-211.","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"key2020122322510535900_b2","doi-asserted-by":"crossref","unstructured":"Ajzen, I.\n                (2011), \u201cThe theory of planned behavior: reactions and reflections\u201d, \n                  Psychology & Health\n               , Vol. 26 No. 9, pp. 1113-1127.","DOI":"10.1080\/08870446.2011.613995"},{"key":"key2020122322510535900_b3","unstructured":"Ajzen, I.\n                (2012), \u201cTheory of planned behavior\u201d, available at: http:\/\/people.umass.edu\/aizen\/tpb.html (accessed 19 August 2013)."},{"key":"key2020122322510535900_b4","doi-asserted-by":"crossref","unstructured":"Armitage, C.J.\n                and \n                  Conner, M.\n                (2001), \u201cEfficacy of the theory of planned behaviour: a meta-analytic review\u201d, \n                  The British Journal Social Psychology\n               , Vol. 40 No. 4, pp. 471-499.","DOI":"10.1348\/014466601164939"},{"key":"key2020122322510535900_b5","unstructured":"Chin, W.\n                (1998), \u201cCommentary: issues and opinion on structural equation modeling\u201d, \n                  MIS Quarterly\n               , Vol. 22."},{"key":"key2020122322510535900_b6","doi-asserted-by":"crossref","unstructured":"Cronbach, L.J.\n                and \n                  Shavelson, R.J.\n                (2004), \u201cMy current thoughts on coefficient alpha and successor procedures\u201d, \n                  Educational and Psychological Measurement\n               , Vol. 64 No. 3, pp. 391-418.","DOI":"10.1177\/0013164404266386"},{"key":"key2020122322510535900_b7","unstructured":"Fishbein, M.\n                (1979), \u201cA theory of reasoned action: some applications and implications\u201d, \n                  Nebraska Symposium on Motivation\n               , Vol. 27, pp. 65-116."},{"key":"key2020122322510535900_b8","doi-asserted-by":"crossref","unstructured":"Fishbein, M.\n                and \n                  Ajzen, I.\n                (2010), \n                  Predicting and Changing Behavior: The Reasoned Action Approach\n               , Psychology Press, New York, NY.","DOI":"10.4324\/9780203838020"},{"key":"key2020122322510535900_b9","doi-asserted-by":"crossref","unstructured":"Gefen, D.\n               , \n                  Straub, D.\n                and \n                  Boudreau, M.\n                (2000), \u201cStructural equation modeling and regression: guidelines for research practice\u201d, \n                  Communication of Association for Information Systems\n               , Vol. 4.","DOI":"10.17705\/1CAIS.00407"},{"key":"key2020122322510535900_b10","unstructured":"Gordon, L.A.\n               , \n                  Loeb, M.P.\n               , \n                  Lucyshyn, W.\n                and \n                  Richardson, R.\n                (2004), \n                  COMPUTER CRIME 2004 CSI\/FBI Computer Crime and Security Survey\n               , Long Beach, CA."},{"key":"key2020122322510535900_b11","doi-asserted-by":"crossref","unstructured":"Hankins, M.\n               , \n                  French, D.\n                and \n                  Horne, R.\n                (2000), \u201cStatistical guidelines for studies of the theory of reasoned action and the theory of planned behaviour\u201d, \n                  Psychology & Health\n               , Vol. 15 No. 2, pp. 151-161.","DOI":"10.1080\/08870440008400297"},{"key":"key2020122322510535900_b12","doi-asserted-by":"crossref","unstructured":"Herath, T.\n                and \n                  Rao, H.R.\n                (2009), \u201cProtection motivation and deterrence: a framework for security policy compliance in organizations\u201d, \n                  European Journal of Information Systems\n               , Vol. 18 No. 2, pp. 106-125.","DOI":"10.1057\/ejis.2009.6"},{"key":"key2020122322510535900_b13","doi-asserted-by":"crossref","unstructured":"Ifinedo, P.\n                (2012), \u201cUnderstanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory\u201d, \n                  Computers and Security\n               , Langford Lane, Kidlington, Oxford, pp. 83-95.","DOI":"10.1016\/j.cose.2011.10.007"},{"key":"key2020122322510535900_b14","doi-asserted-by":"crossref","unstructured":"Maddux, J.E.\n                and \n                  Rogers, R.W.\n                (1983), \u201cProtection motivation and self-efficacy: a revised theory of fear appeals and attitude change\u201d, \n                  Journal of Experimental Social Psychology\n               , Vol. 19, pp. 469-479.","DOI":"10.1016\/0022-1031(83)90023-9"},{"key":"key2020122322510535900_b15","doi-asserted-by":"crossref","unstructured":"Milne, S.\n               , \n                  Sheeran, P.\n                and \n                  Orbell, S.\n                (2000), \u201cPrediction and intervention in health-related behavior: a meta-analytic review of protection motivation theory\u201d, \n                  Journal of Applied Social Psychology\n               , Vol. 30, pp. 106-143.","DOI":"10.1111\/j.1559-1816.2000.tb02308.x"},{"key":"key2020122322510535900_b16","unstructured":"Norman, P.\n               , \n                  Boer, H.\n                and \n                  Seydel, E.R.\n                (2005), \u201cProtection motivation theory\u201d, in \n                  Conner, M.\n                and \n                  Norman, P.\n                (Eds), \n                  Predicting Health Behaviour: Research and Practice with Social Cognition Models\n               , Open University Press, pp. 81-126."},{"key":"key2020122322510535900_b17","doi-asserted-by":"crossref","unstructured":"Peterson, R.A.\n                (2014), \u201cMeta-analysis of Alpha Cronbach\u2019s coefficient\u201d, \n                  Journal of Consumer Research\n               , Vol. 21 No. 2, pp. 381-391.","DOI":"10.1086\/209405"},{"key":"key2020122322510535900_b18","doi-asserted-by":"crossref","unstructured":"Rogers, R.W.\n                (1975), \u201cA protection motivation theory of fear appeals and attitude change\u201d, \n                  The Journal Psychology\n               , Vol. 91 No. 1, pp. 93-114.","DOI":"10.1080\/00223980.1975.9915803"},{"key":"key2020122322510535900_b19","unstructured":"Rogers, R.W.\n                (1983), \u201cCognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation\u201d, in \n                  Cacioppo, J.\n                and \n                  Petty, R.\n                (Eds), \n                  Social Psychophysiology\n               , Guilford Press, New York, NY."},{"key":"key2020122322510535900_b20","doi-asserted-by":"crossref","unstructured":"Sandberg, T.\n                and \n                  Conner, M.\n                (2008), \u201cAnticipated regret as an additional predictor in the theory of planned behaviour: a meta-analysis\u201d, \n                  British Journal of Social Psychology\n               , Vol. 47 No. 4, pp. 589-606.","DOI":"10.1348\/014466607X258704"},{"key":"key2020122322510535900_b21","doi-asserted-by":"crossref","unstructured":"Schmider, E.\n               , \n                  Ziegler, M.\n               , \n                  Danay, E.\n               , \n                  Beyer, L.\n                and \n                  B\u00fchner, M.\n                (2010), \u201cIs it really robust? Reinvestigating the robustness of ANOVA against violations of the normal distribution assumption\u201d, \n                  Methodology European Journal of Research Methods for the Behavioral and Social Sciences\n               , Vol. 6 No. 4, pp. 147-151.","DOI":"10.1027\/1614-2241\/a000016"},{"key":"key2020122322510535900_b22","doi-asserted-by":"crossref","unstructured":"Sommestad, T.\n                and \n                  Hallberg, J.\n                (2013), \u201cA review of the theory of planned behaviour in the context of information security policy compliance\u201d, in Janczewski, E., Wolf, H. and Shenoi, S. (Eds), International Information Security and Privacy Conference, Springer, Berlin, Heidelberg, Auckland.","DOI":"10.1007\/978-3-642-39218-4_20"},{"key":"key2020122322510535900_b23","unstructured":"Sommestad, T.\n               , \n                  Hallberg, J.\n               , \n                  Lundholm, K.\n                and \n                  Bengtsson, J.\n                (2014), \u201cVariables influencing information security policy compliance: a systematic review of quantitative studies\u201d, \n                  Information Management & Computer Security\n               , Vol. 22."}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/ICS-04-2014-0025","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-04-2014-0025\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-04-2014-0025\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:22:49Z","timestamp":1753406569000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/23\/2\/200-217\/119717"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,8]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,6,8]]}},"alternative-id":["10.1108\/ICS-04-2014-0025"],"URL":"https:\/\/doi.org\/10.1108\/ics-04-2014-0025","relation":{},"ISSN":["2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"}],"subject":[],"published":{"date-parts":[[2015,6,8]]}}}