{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T02:00:05Z","timestamp":1760061605097,"version":"3.28.0"},"reference-count":59,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1109\/ictas.2019.8703629","type":"proceedings-article","created":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T22:41:45Z","timestamp":1556836905000},"page":"1-6","source":"Crossref","is-referenced-by-count":12,"title":["A conceptual model of information security compliant behaviour based on the self-determination theory"],"prefix":"10.1109","author":[{"given":"Yotamu","family":"Gangire","sequence":"first","affiliation":[]},{"given":"Adele","family":"Da Veiga","sequence":"additional","affiliation":[]},{"given":"Marlien","family":"Herselman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1108\/MRR-04-2013-0085"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1006\/ceps.1999.1020"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2011.07.002"},{"key":"ref32","first-page":"1","article-title":"Why Deterrence is not Enough: The Role of Endogenous Motivations on Employees' Information Security Behavior","author":"kranz","year":"2014","journal-title":"International Conference on Information Systems"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.09.009"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-097086-8.92142-1"},{"key":"ref37","article-title":"Information security policy compliance: the role of fairness, commitment, and cost beliefs","author":"bulgurcu","year":"2011","journal-title":"Proceedings of MCIS 2011"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.02.005"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INFOMAN.2018.8392822"},{"key":"ref34","first-page":"1","article-title":"Motivating Employees to Comply with Information Security Policies Security Policies","author":"sikolia","year":"2016","journal-title":"The Eleventh Midwest Association for Information Systems Conference"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.trf.2015.01.014"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2014.11.001"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1037\/a0026377"},{"key":"ref2","first-page":"118","article-title":"Organizational Climate and Individual Factors Effects on Information Security Faculty of Business and Accountancy","volume":"4","author":"jaafar","year":"2013","journal-title":"International Journal of Business and Social Science"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2017.8252194"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-08-2012-0045"},{"key":"ref22","first-page":"1","article-title":"The Theory of Planned Behavior and Information Security Policy Compliance The Theory of Planned Behavior and Information Security Policy Compliance","author":"sommestad","year":"2017","journal-title":"J Comput Inf Syst"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2015.508"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.1.01"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2018\/13853"},{"key":"ref26","first-page":"1","article-title":"Beyond Compliance: Empowering Employees' Extra-Role Security Behaviors in Dynamic Environments","author":"li","year":"2017","journal-title":"AMCIS 2017 Proc"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.10.003"},{"key":"ref50","first-page":"71","article-title":"Self-Efficacy","volume":"4","author":"bandura","year":"1994","journal-title":"Encyclopedia of Human Behaviour"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.05.008"},{"key":"ref59","first-page":"103","article-title":"Unpacking security policy compliance: The motivators and barriers of employees' security behaviors","author":"blythe","year":"2015","journal-title":"Eleventh Symposium On Usable Privacy and Security"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-12r1"},{"journal-title":"Security in Computing","year":"2010","author":"pfleeger","key":"ref57"},{"journal-title":"Security and Privacy Controls for Federal Information Systems and Organizations Security and Privacy Controls for Federal Information Systems and Organizations","year":"2013","key":"ref56"},{"key":"ref55","first-page":"17","article-title":"Indirect effect of management support on users' compliance behaviour towards information security policies","volume":"47","author":"humaidi","year":"2017","journal-title":"J Healthc Inf Manag"},{"key":"ref54","article-title":"Willingness and Ability To Perform Information Security Compliance Behavior: Psychological Ownership and Self-Efficacy Perspective","author":"huang","year":"2016","journal-title":"Pacific Asia Conference on Information Systems"},{"key":"ref53","first-page":"70","article-title":"The moderating effect of working experience on health information system security policies","volume":"28","author":"humaidi","year":"2015","journal-title":"Malaysian J Comput Sci"},{"key":"ref52","first-page":"438","article-title":"Which Factors Explain Employees' Adherence to Information Security Policies? An Empirical Study","author":"pahnila","year":"2007","journal-title":"Pacific Asia Conference on Information Systems"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2017.01.003"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4018\/IRMJ.2018010103"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2013.10845690"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-09-2016-0073"},{"journal-title":"Ponemon Institute's 2017 Cost of Data Breach Study Global Overview","year":"2017","key":"ref13"},{"journal-title":"The Global State of Information Security Survey 2018 PwC","year":"2017","key":"ref14"},{"key":"ref15","first-page":"47","article-title":"Information security culture: A Behaviour Compliance Conceptual Framework","volume":"105","author":"alfawaz","year":"2010","journal-title":"Proceedings of 8th Australasian Conference on Information Security and Privacy"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.04.009"},{"key":"ref17","first-page":"1","article-title":"Fostering Information Security Culture In Organizations: A Research Agenda","author":"karyda","year":"2017","journal-title":"The 11 th Mediterranean Conference on Information Systems (MCIS)"},{"key":"ref18","first-page":"2419","article-title":"Information Security Policies Compliance among Employees in Cybersecurity Malausia","author":"kadir","year":"2016","journal-title":"Proceedings of the 28th International Business Information Management Association Conference"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1063\/1.4982022"},{"key":"ref4","first-page":"33","article-title":"The Effect of Organisational Culture on Employee Security Behaviour: A Qualitative Study","author":"connolly","year":"2016","journal-title":"Proceedings of the Tenth International Symposium on Human Aspects of Information Security and Assurance"},{"key":"ref3","first-page":"1","article-title":"Employees' intended information security behaviour in real estate organisations: A Protection Motivation perspective","author":"mani","year":"2015","journal-title":"Americas Conference on Information Systems (AMCIS) 2015"},{"key":"ref6","first-page":"12","article-title":"A Model for Investigating Organizational Impact on Information Security Behavior","author":"flores","year":"2012","journal-title":"Workshop of Information Security and Privacy"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.12.022"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.04.004"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.05.012"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.007"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3098986"},{"key":"ref46","first-page":"894","article-title":"Control-related motivations and information security policy compliance: The effect of reflective and reactive autonomy","volume":"2","author":"wall","year":"2013","journal-title":"Proceedings of Ninth Americas Conference on Information Systems"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-orgpsych-032516-113108"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1002\/job.322"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3127\/ajis.v21i0.1321"},{"key":"ref42","first-page":"63","article-title":"Self-determination theory: A theoretical and empirical overview in occupational health psychology","author":"van den broeck","year":"2008","journal-title":"Occupational Health Psychology European Perspectives On Research Education and Practice"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.55.1.68"},{"journal-title":"Self-Determination Theory","year":"2017","author":"legault","key":"ref44"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-097086-8.26036-4"}],"event":{"name":"2019 Conference on Information Communications Technology and Society (ICTAS)","start":{"date-parts":[[2019,3,6]]},"location":"Durban, South Africa","end":{"date-parts":[[2019,3,8]]}},"container-title":["2019 Conference on Information Communications Technology and Society (ICTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8693291\/8703516\/08703629.pdf?arnumber=8703629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:15:38Z","timestamp":1657854938000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8703629\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/ictas.2019.8703629","relation":{},"subject":[],"published":{"date-parts":[[2019,3]]}}}