{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T05:23:44Z","timestamp":1775107424747,"version":"3.50.1"},"reference-count":129,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T00:00:00Z","timestamp":1684108800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2023,5,19]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>With increased remote working, employers are concerned with employees\u2019 commitment and compliance with security procedures. Through the lens of psychological capital, this study aims to investigate whether strong organizational values can improve employees\u2019 commitment to the organization and security behaviors.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>Using Qualtrics platform, the authors conducted an online survey. The survey participants are college-educated, full-time employees. The authors used structural equation modeling to analyze 289 responses.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The results indicate perceived importance of organizational values is associated with increased organizational commitment and information security behavior. The authors find that psychological capital partially mediates these relations suggesting that employees\u2019 psychological capital effectively directs employees toward an affinity for the organization and information security behavior. The results highlight the importance of organizational values for improving security behavior and organizational commitment. Second, the results suggest that psychological capital is an effective mechanism for this influence. Finally, the authors find that individual differences (gender, organizational level and education) are boundary conditions on their findings, providing a nuanced view of their results and offering opportunities for further investigation.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>To the best of the authors\u2019 knowledge, this study is the first to explore organizational values in relation to information security behaviors. In addition, this study investigates the underlying mechanism of this relationship by showing psychological capital\u2019s mediating role in this relationship. Therefore, the authors suggest organizations create a supportive environment that appreciates innovation, quality services, diversity and collaboration. Furthermore, organizations should communicate the importance of these values to their employees to motivate them to have a stronger affective commitment and a more careful set of security behaviors.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-10-2022-0156","type":"journal-article","created":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T06:42:30Z","timestamp":1683787350000},"page":"172-198","source":"Crossref","is-referenced-by-count":10,"title":["The influence of organizational values on employee attitude and information security behavior: the mediating role of psychological capital"],"prefix":"10.1108","volume":"31","author":[{"given":"Cynthia K.","family":"Riemenschneider","sequence":"first","affiliation":[]},{"given":"Laurie L.","family":"Burney","sequence":"additional","affiliation":[]},{"given":"Saman","family":"Bina","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2023,5,15]]},"reference":[{"issue":"4","key":"key2023051713120992000_ref001","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1348\/096317905X26174","article-title":"Linking values and organizational commitment: a correlational and experimental investigation in two organizations","volume":"78","year":"2005","journal-title":"Journal of Occupational and Organizational Psychology"},{"key":"key2023051713120992000_ref002","volume-title":"Understanding Attitudes and Predicting Social Behavior","year":"1980"},{"issue":"6","key":"key2023051713120992000_ref003","doi-asserted-by":"publisher","first-page":"615","DOI":"10.3200\/JRLP.142.6.615-632","article-title":"An analysis of the relation between employee\u2013organization value congruence and employee attitudes","volume":"142","year":"2008","journal-title":"The Journal of Psychology"},{"issue":"2","key":"key2023051713120992000_ref004","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1177\/0149206308329961","article-title":"The additive value of positive psychological capital in predicting work attitudes and behaviors","volume":"36","year":"2010","journal-title":"Journal of Management"},{"issue":"5","key":"key2023051713120992000_ref005","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1287\/orsc.14.5.510.16765","article-title":"From issues to actions: the importance of individual concerns and organizational values in responding to natural environmental issues","volume":"14","year":"2003","journal-title":"Organization Science"},{"issue":"8","key":"key2023051713120992000_ref006","doi-asserted-by":"publisher","first-page":"689","DOI":"10.17705\/1jais.00506","article-title":"Don\u2019t even think about it! The effects of antineutralization, informational, and normative communication on information security compliance","volume":"19","year":"2018","journal-title":"Journal of the Association for Information Systems"},{"issue":"7","key":"key2023051713120992000_ref007","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1016\/j.im.2017.01.003","article-title":"Determinants of early conformance with information security policies","volume":"54","year":"2017","journal-title":"Information and Management"},{"issue":"3","key":"key2023051713120992000_ref008","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1111\/ajps.12081","article-title":"Separating the shirkers from the workers? Making sure respondents pay attention on self-administered surveys","volume":"58","year":"2014","journal-title":"American Journal of Political Science"},{"key":"key2023051713120992000_ref009","unstructured":"Bissett, M.F. (2014), \u201cThe role of values and value congruence for job satisfaction, person organisation fit, work engagement and resilience\u201d, Master Dissertation, University of Canterbury, available at: https:\/\/ir.canterbury.ac.nz\/handle\/10092\/9171"},{"issue":"2","key":"key2023051713120992000_ref010","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1177\/009102609102000207","article-title":"Organizational values and value congruency and their impact on satisfaction, commitment, and cohesion: an empirical examination within the public sector","volume":"20","year":"1991","journal-title":"Public Personnel Management"},{"key":"key2023051713120992000_ref011","first-page":"136","article-title":"Alternative ways of assessing model fit","volume-title":"Testing Structural Equation Models","year":"1993"},{"key":"key2023051713120992000_ref012","doi-asserted-by":"crossref","unstructured":"Brynjolfsson, E., Horton, J., Ozimek, A., Rock, D., Sharma, G. and Yi Tu Ye, H. (2020), \u201cCOVID-19 and remote work: an early look at US data\u201d, Working Paper 27344, National Bureau of Economic Research, Cambridge, MA.","DOI":"10.3386\/w27344"},{"key":"key2023051713120992000_ref013","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.chb.2016.11.018","article-title":"Examining the relationship of organizational insiders\u2019 psychological capital with information security threat and coping appraisals","volume":"68","year":"2017","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"key2023051713120992000_ref014","doi-asserted-by":"publisher","first-page":"1228","DOI":"10.1287\/isre.2019.0860","article-title":"The adaptive roles of positive and negative emotions in organizational insiders\u2019 security-based precaution taking","volume":"30","year":"2019","journal-title":"Information Systems Research"},{"key":"key2023051713120992000_ref015","volume-title":"Structural Equation Modeling with AMOS: Basic Concepts, Applications, and Programming","year":"2010"},{"issue":"7","key":"key2023051713120992000_ref016","doi-asserted-by":"publisher","first-page":"3634","DOI":"10.3390\/su13073634","article-title":"The employees\u2019 state of mind during COVID-19: a self-determination theory perspective","volume":"13","year":"2021","journal-title":"Sustainability"},{"issue":"6","key":"key2023051713120992000_ref017","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1177\/0170840604045093","article-title":"Re-applying beliefs: an analysis of change in the oil industry","volume":"25","year":"2004","journal-title":"Organization Studies"},{"key":"key2023051713120992000_ref018","unstructured":"Castrillon, C. (2020), \u201cThis is the future of remote work in 2021\u201d, available at: www.forbes.com\/sites\/carolinecastrillon\/2021\/12\/27\/this-is-the-future-of-remote-work-in-2021\/?sh=1d6d24411e1d (accessed 23 July 2021)."},{"issue":"3","key":"key2023051713120992000_ref019","doi-asserted-by":"publisher","first-page":"373","DOI":"10.4026\/1303-2860.2011.0184.x","article-title":"The effects of the organizational psychological capital on the attitude of commitment and satisfaction: a public sample in Turkey","volume":"21","year":"2011","journal-title":"European Journal of Social Science"},{"issue":"3","key":"key2023051713120992000_ref020","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1177\/0146167200265001","article-title":"Dispositional affect and leadership effectiveness: a comparison of self-esteem, optimism, and efficacy","volume":"26","year":"2000","journal-title":"Personality and Social Psychology Bulletin"},{"issue":"4","key":"key2023051713120992000_ref021","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/s10551-011-0878-x","article-title":"Study of commitment antecedents: the dynamic point of view","volume":"103","year":"2011","journal-title":"Journal of Business Ethics"},{"issue":"4","key":"key2023051713120992000_ref022","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1108\/ITP-12-2017-0421","article-title":"The effects of moral disengagement and organizational ethical climate on insiders\u2019 information security policy violation behavior","volume":"32","year":"2019","journal-title":"Information Technology and People"},{"issue":"5","key":"key2023051713120992000_ref023","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1108\/ICS-03-2022-0047","article-title":"Understanding employees\u2019 information security\u2013related stress and policy compliance intention: the roles of information security fatigue and psychological capital","volume":"30","year":"2022","journal-title":"Information and Computer Security"},{"issue":"1","key":"key2023051713120992000_ref024","doi-asserted-by":"publisher","first-page":"64","DOI":"10.2307\/3150876","article-title":"A paradigm for developing better measures of marketing constructs","volume":"16","year":"1979","journal-title":"Journal of Marketing Research"},{"key":"key2023051713120992000_ref025","article-title":"Information systems security: the role of cultural aspects in organizational settings","year":"2013","journal-title":"WISP 2012 Proceedings"},{"key":"key2023051713120992000_ref026","first-page":"417","article-title":"Managing employee security behaviour in organisations: the role of cultural factors and individual values","volume-title":"IFIP International Information Security Conference","year":"2014"},{"issue":"2","key":"key2023051713120992000_ref027","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1177\/001872679905200202","article-title":"Predicting psychological empowerment among service workers: the effect of support-based relationships","volume":"52","year":"1999","journal-title":"Human Relations"},{"issue":"1","key":"key2023051713120992000_ref028","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s10551-011-0843-8","article-title":"Gender differences in ethics research: the importance of controlling for the social desirability response bias","volume":"103","year":"2011","journal-title":"Journal of Business Ethics"},{"issue":"1","key":"key2023051713120992000_ref029","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1287\/isre.1070.0160","article-title":"User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach","volume":"20","year":"2009","journal-title":"Information Systems Research"},{"issue":"4","key":"key2023051713120992000_ref030","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1111\/j.1365-2575.2007.00289.x","article-title":"User behaviour towards protective information technologies: the role of national cultural differences","volume":"19","year":"2009","journal-title":"Information Systems Journal"},{"issue":"3","key":"key2023051713120992000_ref031","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1111\/j.2044-8325.1997.tb00645.x","article-title":"Work values: an integrative framework and illustrative application to organizational socialization","volume":"70","year":"1997","journal-title":"Journal of Occupational and Organizational Psychology"},{"issue":"4","key":"key2023051713120992000_ref032","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1177\/109442819814002","article-title":"Common methods bias: does common methods variance really bias results?","volume":"1","year":"1998","journal-title":"Organizational Research Methods"},{"key":"key2023051713120992000_ref033","doi-asserted-by":"publisher","first-page":"2873","DOI":"10.1145\/2702123.2702249","article-title":"Scaling the security wall: developing a security behavior intentions scale (SeBIS)","volume-title":"CHI","year":"2015"},{"issue":"2","key":"key2023051713120992000_ref034","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1348\/096317900166958","article-title":"The impact of person and organizational values on organizational commitment","volume":"73","year":"2000","journal-title":"Journal of Occupational and Organizational Psychology"},{"key":"key2023051713120992000_ref035","volume-title":"Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research","year":"1975"},{"issue":"3","key":"key2023051713120992000_ref036","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1207\/s15456889ajc1203_1","article-title":"Organizational values and their relation to organizational performance outcomes","volume":"12","year":"2004","journal-title":"Atlantic Journal of Communication"},{"key":"key2023051713120992000_ref037","first-page":"4538","article-title":"How to mitigate security-related stress: the role of psychological capital","volume-title":"Proceedings of the 54th Hawaii International Conference on System Sciences","year":"2021"},{"issue":"3","key":"key2023051713120992000_ref038","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s10551-011-1128-y","article-title":"Antecedents of organizational commitment in a Chinese construction company","volume":"109","year":"2012","journal-title":"Journal of Business Ethics"},{"key":"key2023051713120992000_ref039","unstructured":"Gartner Inc (2020), \u201cGartner says 52% if legal and compliance leaders are concerned about third-party cybersecurity risk since COVID-19\u201d, Gartner, available at: www.gartner.com\/en\/newsroom\/press-releases\/2020-04-24-gartner-says-52-percent-of-legal-and-compliance-leaders-are-concerned-about-third-party-cybersecurity-risk-rince-covid-19 (accessed 22 July 2021)."},{"issue":"4","key":"key2023051713120992000_ref040","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1177\/1548051809332021","article-title":"In the eyes of the beholder: transformational leadership, positive psychological capital, and performance","volume":"15","year":"2009","journal-title":"Journal of Leadership and Organizational Studies"},{"issue":"4","key":"key2023051713120992000_ref041","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/BF01385031","article-title":"An essay on organizational citizenship behavior","volume":"4","year":"1991","journal-title":"Employee Responsibilities and Rights Journal"},{"key":"key2023051713120992000_ref042","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.cose.2017.11.015","article-title":"Correlating human traits and cyber security behavior intentions","volume":"73","year":"2018","journal-title":"Computers and Security"},{"issue":"3","key":"key2023051713120992000_ref043","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/s11747-011-0261-6","article-title":"An assessment of the use of partial least squares structural equation modeling in marketing research","volume":"40","year":"2012","journal-title":"Journal of the Academy of Marketing Science"},{"key":"key2023051713120992000_ref044","volume-title":"Multivariate Data Analysis","year":"2010","edition":"7th ed."},{"issue":"1","key":"key2023051713120992000_ref045","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1080\/10580530.2015.1117842","article-title":"Impact of users\u2019 security awareness on desktop security behavior: a protection motivation theory perspective","volume":"33","year":"2016","journal-title":"Information Systems Management"},{"issue":"8","key":"key2023051713120992000_ref046","doi-asserted-by":"publisher","first-page":"1609","DOI":"10.1016\/j.jbusres.2013.09.007","article-title":"Organizational culture, innovation, and performance: a test of Schein's model","volume":"67","year":"2014","journal-title":"Journal of Business Research"},{"issue":"4","key":"key2023051713120992000_ref047","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1111\/j.1540-5915.2012.00361.x","article-title":"Managing employee compliance with information security policies: the critical role of top management and organizational culture","volume":"43","year":"2012","journal-title":"Decision Sciences"},{"key":"key2023051713120992000_ref048","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1016\/j.chb.2017.12.022","article-title":"Examining technostress creators and role stress as potential threats to employees\u2019 information security compliance","volume":"81","year":"2018","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"key2023051713120992000_ref049","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.im.2013.10.001","article-title":"Information systems security policy compliance: an empirical study of the effects of socialisation, influence, and cognition","volume":"51","year":"2014","journal-title":"Information and Management"},{"issue":"3","key":"key2023051713120992000_ref050","doi-asserted-by":"publisher","first-page":"704","DOI":"10.1080\/07421222.2021.1962600","article-title":"Detecting noncompliant behavior in organizations: how online survey responses and behaviors reveal risk","volume":"38","year":"2021","journal-title":"Journal of Management Information Systems"},{"key":"key2023051713120992000_ref051","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2020.101782","article-title":"Toward a stage theory of the development of employees\u2019 information security behavior","volume":"93","year":"2020","journal-title":"Computers and Security"},{"issue":"3","key":"key2023051713120992000_ref052","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1108\/ICS-11-2016-0084","article-title":"Measuring employees\u2019 compliance \u2013 the importance of value pluralism","volume":"25","year":"2017","journal-title":"Information and Computer Security"},{"issue":"2","key":"key2023051713120992000_ref053","doi-asserted-by":"publisher","first-page":"239","DOI":"10.2307\/255757","article-title":"Work values and organizational commitment","volume":"21","year":"1978","journal-title":"Academy of Management Journal"},{"key":"key2023051713120992000_ref054","volume-title":"Principles and Practice of Structural Equation Modeling","year":"2005"},{"issue":"2","key":"key2023051713120992000_ref055","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s10796-019-09977-z","article-title":"The utility of information security training and education on cybersecurity incidents: an empirical evidence","volume":"23","year":"2019","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"key2023051713120992000_ref056","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1177\/10717919070130020601","article-title":"Potential added value of psychological capital in predicting work attitudes","volume":"13","year":"2006","journal-title":"Journal of Leadership and Organizational Studies"},{"key":"key2023051713120992000_ref057","unstructured":"Lavelle, J. (2020), \u201cGartner CFO survey reveals 74% intend to shift some employees to remote work permanently\u201d, available at: www.gartner.com\/en\/newsroom\/press-releases\/2020-04-03-gartner-cfo-surey-reveals-74-percent-of-organizations-to-shift-some-employees-to-remote-work-permanently2 (accessed 23 July 2021)."},{"key":"key2023051713120992000_ref058","article-title":"Understanding the roles of challenge security demands, psychological resources in information security policy noncompliance","volume":"123","year":"2018","journal-title":"PACIS 2018 Proceedings"},{"issue":"10","key":"key2023051713120992000_ref059","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1007\/BF00882023","article-title":"Value congruence: the interplay of individual and organizational value systems","volume":"8","year":"1989","journal-title":"Journal of Business Ethics"},{"issue":"1","key":"key2023051713120992000_ref060","doi-asserted-by":"publisher","first-page":"109","DOI":"10.2224\/sbp.2013.41.1.109","article-title":"Mediating effect of positive psychological capital in Taiwan\u2019s life insurance industry","volume":"41","year":"2013","journal-title":"Social Behavior and Personality: An International Journal"},{"key":"key2023051713120992000_ref061","article-title":"The nature and causes of job satisfaction","volume-title":"Handbook of Industrial and Organizational Psychology","year":"1976"},{"issue":"2","key":"key2023051713120992000_ref062","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.orgdyn.2004.01.003","article-title":"Human, social, and now positive psychological capital management: investing in people for competitive advantage","volume":"33","year":"2004","journal-title":"Organizational Dynamics"},{"key":"key2023051713120992000_ref063","volume-title":"Psychological Capital","year":"2007"},{"issue":"1","key":"key2023051713120992000_ref064","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1002\/hrdq.20034","article-title":"The development and resulting performance impact of positive psychological capital","volume":"21","year":"2010","journal-title":"Human Resource Development Quarterly"},{"issue":"3","key":"key2023051713120992000_ref065","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1111\/j.1744-6570.2007.00083.x","article-title":"Positive psychological capital: measurement and relationship with performance and satisfaction","volume":"60","year":"2007","journal-title":"Personnel Psychology"},{"issue":"2","key":"key2023051713120992000_ref066","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1111\/j.1740-8784.2005.00011.x","article-title":"The psychological capital of Chinese workers: exploring the relationship with performance","volume":"1","year":"2005","journal-title":"Management and Organization Review"},{"issue":"2","key":"key2023051713120992000_ref067","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1002\/job.507","article-title":"The mediating role of psychological capital in the supportive organizational climate\u2013employee performance relationship","volume":"29","year":"2008","journal-title":"Journal of Organizational Behavior"},{"key":"key2023051713120992000_ref068","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.chb.2018.11.002","article-title":"Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general","volume":"92","year":"2019","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"key2023051713120992000_ref069","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1080\/15332845.2012.690684","article-title":"The effects of perceived external prestige on positive psychological states in quick service restaurants","volume":"11","year":"2012","journal-title":"Journal of Human Resources in Hospitality and Tourism"},{"issue":"2","key":"key2023051713120992000_ref070","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1037\/0033-2909.108.2.171","article-title":"A review and meta-analysis of the antecedents, correlates, and consequences of organizational commitment","volume":"108","year":"1990","journal-title":"Psychological Bulletin"},{"issue":"2","key":"key2023051713120992000_ref071","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1177\/014920639402000207","article-title":"A review of current practices for evaluating causal models in organizational behavior and human resources management research","volume":"20","year":"1994","journal-title":"Journal of Management"},{"issue":"1","key":"key2023051713120992000_ref072","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/1053-4822(91)90011-Z","article-title":"A three-component conceptualization of organizational commitment","volume":"1","year":"1991","journal-title":"Human Resource Management Review"},{"issue":"1","key":"key2023051713120992000_ref073","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1006\/jvbe.2001.1842","article-title":"Affective, continuance, and normative commitment to the organization: a meta-analysis of antecedents, correlates, and consequences","volume":"61","year":"2002","journal-title":"Journal of Vocational Behavior"},{"key":"key2023051713120992000_ref074","volume-title":"Employee-Organization Linkages: The Psychology of Commitment, Absenteeism, and Turnover","year":"1982"},{"issue":"2","key":"key2023051713120992000_ref075","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/0001-8791(79)90072-1","article-title":"The measurement of organizational commitment","volume":"14","year":"1979","journal-title":"Journal of Vocational Behavior"},{"key":"key2023051713120992000_ref076","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.jvb.2017.09.005","article-title":"The effects of diversity climate on the work attitudes of refugee employees: the mediating role of psychological capital and moderating role of ethnic identity","volume":"105","year":"2018","journal-title":"Journal of Vocational Behavior"},{"issue":"S1","key":"key2023051713120992000_ref077","doi-asserted-by":"publisher","first-page":"S120","DOI":"10.1002\/job.1916","article-title":"Psychological capital: a review and synthesis","volume":"35","year":"2014","journal-title":"Journal of Organizational Behavior"},{"issue":"4","key":"key2023051713120992000_ref078","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1016\/j.dss.2008.11.010","article-title":"Studying users\u2019 computer security behavior: a health belief perspective","volume":"46","year":"2009","journal-title":"Decision Support Systems"},{"issue":"6","key":"key2023051713120992000_ref079","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1002\/tie.21510","article-title":"The impact of buddying on psychological capital and work engagement: an empirical study of socialization in the professional services sector","volume":"54","year":"2012","journal-title":"Thunderbird International Business Review"},{"issue":"3","key":"key2023051713120992000_ref080","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s11301-018-0138-6","article-title":"The concept of psychological capital: a comprehensive review","volume":"68","year":"2018","journal-title":"Management Review Quarterly"},{"key":"key2023051713120992000_ref081","volume-title":"Psychometric Theory","year":"1978","edition":"2nd ed"},{"issue":"7","key":"key2023051713120992000_ref082","doi-asserted-by":"publisher","first-page":"795","DOI":"10.1111\/jonm.12622","article-title":"Organizational citizenship behaviour: sensitization to an organisational phenomenon","volume":"26","year":"2018","journal-title":"Journal of Nursing Management"},{"issue":"3","key":"key2023051713120992000_ref083","doi-asserted-by":"publisher","first-page":"487","DOI":"10.5465\/256404","article-title":"People and organizational culture: a profile comparison approach to assessing person-organization fit","volume":"34","year":"1991","journal-title":"Academy of Management Journal"},{"issue":"6","key":"key2023051713120992000_ref084","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1002\/job.333","article-title":"Multiple perspectives of congruence: relationships between value congruence and employee attitudes","volume":"26","year":"2005","journal-title":"Journal of Organizational Behavior"},{"issue":"2","key":"key2023051713120992000_ref085","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1111\/1467-6486.00090","article-title":"Value incongruity and strategic choice","volume":"35","year":"1998","journal-title":"Journal of Management Studies"},{"issue":"1","key":"key2023051713120992000_ref086","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1108\/01437730310457302","article-title":"The positive impact and development of hopeful leaders","volume":"24","year":"2003","journal-title":"Leadership and Organization Development Journal"},{"issue":"4","key":"key2023051713120992000_ref087","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1177\/014920638601200408","article-title":"Self-reports in organizational research: problems and prospects","volume":"12","year":"1986","journal-title":"Journal of Management"},{"issue":"1","key":"key2023051713120992000_ref088","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1146\/annurev-psych-120710-100452","article-title":"Sources of method bias in social science research and recommendations on how to control it","volume":"63","year":"2012","journal-title":"Annual Review of Psychology"},{"issue":"9","key":"key2023051713120992000_ref089","doi-asserted-by":"publisher","first-page":"57","DOI":"10.5539\/ibr.v8n9p57","article-title":"The relationship between positive organizational behavior with job satisfaction, organizational citizenship behavior, and employee engagement","volume":"8","year":"2015","journal-title":"International Business Research"},{"issue":"2","key":"key2023051713120992000_ref090","first-page":"453","article-title":"Mediation of psychological capital between organizational climate and organizational citizenship behavior","volume":"8","year":"2014","journal-title":"Pakistan Journal of Commerce and Social Sciences"},{"issue":"8","key":"key2023051713120992000_ref091","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1016\/j.cose.2009.05.008","article-title":"Self-efficacy in information security: its influence on end users\u2019 information security practice behavior","volume":"28","year":"2009","journal-title":"Computers and Security"},{"key":"key2023051713120992000_ref092","unstructured":"Rogers, K. and Spring, B. (2020), \u201c\u2018We are outnumbered\u2019_ cybersecurity pros face a huge staffing shortage as attacks surge during the pandemic\u201d, CNBC, available at: www.cnbc.com\/2020\/09\/05\/cyber-security-workers-in-demand.html (accessed 22 July 2021)."},{"key":"key2023051713120992000_ref093","volume-title":"The Nature of Human Values","year":"1973"},{"key":"key2023051713120992000_ref094","first-page":"369","article-title":"Defining organizational culture","volume-title":"Classics of Organizational Theory","year":"1993"},{"issue":"1","key":"key2023051713120992000_ref095","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1037\/0003-066X.55.1.5","article-title":"Positive psychology: an introduction","volume":"55","year":"2000","journal-title":"American Psychologist"},{"issue":"4","key":"key2023051713120992000_ref096","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1037\/0022-3514.50.4.832","article-title":"Explanatory style as a predictor of productivity and quitting among life insurance sales agents","volume":"50","year":"1986","journal-title":"Journal of Personality and Social Psychology"},{"key":"key2023051713120992000_ref097","doi-asserted-by":"publisher","first-page":"101397","DOI":"10.1016\/j.cose.2018.09.005","article-title":"Do I really belong? Impact of employment status on information security policy compliance","volume":"87","year":"2019","journal-title":"Computers and Security"},{"issue":"3","key":"key2023051713120992000_ref098","doi-asserted-by":"publisher","first-page":"487","DOI":"10.2307\/25750688","article-title":"Neutralization: new insights into the problem of employee information systems security policy violations","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"key":"key2023051713120992000_ref099","volume-title":"The Psychology of Hope: You Can Get There from Here","year":"1994"},{"key":"key2023051713120992000_ref0100","unstructured":"Sobers, R. (2021), \u201c134 Cybersecurity Statistics and Trends for 2021\u201d, Varonis blog, available at: www.varonis.com\/blog\/cybersecurity-statistics (accessed 22 July 2021)."},{"issue":"2","key":"key2023051713120992000_ref0101","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1108\/ICS-04-2014-0025","article-title":"The sufficiency of the theory of planned behavior for explaining information security policy compliance","volume":"32","year":"2015","journal-title":"Information and Computer Security"},{"issue":"7","key":"key2023051713120992000_ref0102","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.im.2011.07.002","article-title":"Out of fear or desire? Toward a better understanding of employees\u2019 motivation to follow IS security policies","volume":"48","year":"2011","journal-title":"Information and Management"},{"issue":"2","key":"key2023051713120992000_ref0103","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1037\/0033-2909.124.2.240","article-title":"Self-efficacy and work-related performance: a meta-analysis","volume":"124","year":"1998","journal-title":"Psychological Bulletin"},{"issue":"2","key":"key2023051713120992000_ref0104","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.cose.2004.07.001","article-title":"Analysis of end user security behaviors","volume":"24","year":"2005","journal-title":"Computers and Security"},{"key":"key2023051713120992000_ref0105","volume-title":"Applied Multivariate Statistics for the Social Sciences","year":"1992","edition":"2nd ed"},{"issue":"3","key":"key2023051713120992000_ref0106","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1287\/isre.1.3.255","article-title":"Effective IS security: an empirical study","volume":"1","year":"1990","journal-title":"Information Systems Research"},{"issue":"3","key":"key2023051713120992000_ref0107","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/su13031284","article-title":"Implementing remote working policy in corporate offices in Thailand: strategic facility management perspective","volume":"13","year":"2021","journal-title":"Sustainability"},{"issue":"6","key":"key2023051713120992000_ref0108","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.5465\/3069429","article-title":"Creative self-efficacy: its potential antecedents and relationship to creative performance","volume":"45","year":"2002","journal-title":"Academy of Management Journal"},{"key":"key2023051713120992000_ref0109","first-page":"169","article-title":"Identifying factors that influence employees\u2019 security behavior for enhancing ISP compliance","volume-title":"International Conference on Trust and Privacy in Digital Business","year":"2015"},{"issue":"6","key":"key2023051713120992000_ref0110","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1007\/s10796-019-09956-4","article-title":"A meta-analysis of deterrence theory in information security policy compliance research","volume":"21","year":"2019","journal-title":"Information Systems Frontiers"},{"key":"key2023051713120992000_ref0111","volume-title":"The Cultures of Work Organizations","year":"1993"},{"issue":"2","key":"key2023051713120992000_ref0112","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1108\/ICS-06-2017-0042","article-title":"Strategic value alignment for information security management: a critical success factor analysis","volume":"26","year":"2018","journal-title":"Information and Computer Security"},{"issue":"1","key":"key2023051713120992000_ref0113","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1080\/08874417.2017.1400928","article-title":"Organizational citizenship behavior regarding security: leadership approach perspective","volume":"60","year":"2020","journal-title":"Journal of Computer Information Systems"},{"issue":"6","key":"key2023051713120992000_ref0114","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.5465\/amj.2005.19573114","article-title":"Can businesses effectively regulate employee conduct? The antecedents of rule following in work settings","volume":"48","year":"2005","journal-title":"Academy of Management Journal"},{"issue":"1","key":"key2023051713120992000_ref0115","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5281\/zenodo.1084127","article-title":"The effects of work values, work-value congruence and work centrality on organizational citizenship behavior","volume":"1","year":"2009","journal-title":"International Journal of Behavioral, Cognitive, Educational and Psychological Sciences"},{"issue":"4","key":"key2023051713120992000_ref0116","doi-asserted-by":"publisher","first-page":"765","DOI":"10.2307\/256600","article-title":"Organizational citizenship behavior: construct redefinition, measurement, and validation","volume":"37","year":"1994","journal-title":"Academy of Management Journal"},{"key":"key2023051713120992000_ref0117","article-title":"Our Global Information Security Survey 2018-19 sees spending on cybersecurity rise, but organizations need to take even more action","year":"2018"},{"issue":"2","key":"key2023051713120992000_ref0118","doi-asserted-by":"publisher","first-page":"315","DOI":"10.2307\/3857477","article-title":"Compliance and values oriented ethics programs: influences on employees\u2019 attitudes and behavior","volume":"9","year":"1999","journal-title":"Business Ethics Quarterly"},{"key":"key2023051713120992000_ref0119","article-title":"Assessing reliability and stability in panel models","volume-title":"Sociology Methodology","year":"1977"},{"issue":"1","key":"key2023051713120992000_ref0120","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1089\/cyber.2014.0179","article-title":"Individual differences in cyber security behaviors: an examination of who is sharing passwords","volume":"18","year":"2015","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"key":"key2023051713120992000_ref0121","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.dss.2016.09.009","article-title":"Employees\u2019 information security policy compliance: a norm activation perspective","volume":"92","year":"2016","journal-title":"Decision Support Systems"},{"issue":"5","key":"key2023051713120992000_ref0122","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1177\/009102601204100504","article-title":"The impact of organizational values on organizational citizenship behaviors","volume":"41","year":"2012","journal-title":"Public Personnel Management"},{"issue":"4","key":"key2023051713120992000_ref0123","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1108\/ITP-12-2012-0147","article-title":"Understanding computer security behavioral intention in the workplace: an empirical study of Korean firms","volume":"26","year":"2013","journal-title":"Information Technology and People"},{"key":"key2023051713120992000_ref0124","article-title":"An integrated model of psychological capital in the workplace","volume-title":"Oxford Handbook of Positive Psychology and Work","year":"2010"},{"issue":"9","key":"key2023051713120992000_ref0125","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1108\/01437729410074182","article-title":"Understanding employee turnover: the need for a contingency approach","volume":"15","year":"1994","journal-title":"International Journal of Manpower"},{"issue":"1","key":"key2023051713120992000_ref0126","doi-asserted-by":"publisher","first-page":"23","DOI":"10.5430\/ijba.v4n1p23","article-title":"Individual behavior: in-role and extra-role","volume":"4","year":"2013","journal-title":"International Journal of Business Administration"},{"issue":"2","key":"key2023051713120992000_ref0127","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/s10796-019-09951-9","article-title":"Insiders\u2019 adaptations to security-based demands in the workplace: an examination of security behavioral complexity","volume":"23","year":"2021","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"key2023051713120992000_ref0128","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.bushor.2020.10.005","article-title":"The work-from-home trend: an interview with Brian Kropp","volume":"64","year":"2021","journal-title":"Business Horizons"},{"issue":"1","key":"key2023051713120992000_ref0129","doi-asserted-by":"publisher","first-page":"1","DOI":"10.25300\/MISQ\/2022\/16359","article-title":"Helping older workers realize their full organizational potential: a moderated mediation model of age and it-enabled task performance","volume":"46","year":"2022","journal-title":"MIS Quarterly"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-10-2022-0156\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-10-2022-0156\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:23:16Z","timestamp":1753406596000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/31\/2\/172-198\/113607"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,15]]},"references-count":129,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,5,15]]},"published-print":{"date-parts":[[2023,5,19]]}},"alternative-id":["10.1108\/ICS-10-2022-0156"],"URL":"https:\/\/doi.org\/10.1108\/ics-10-2022-0156","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-4961","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,15]]}}}