{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T03:55:02Z","timestamp":1776830102803,"version":"3.51.2"},"reference-count":98,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Management Information Systems"],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.2753\/mis0742-1222280208","type":"journal-article","created":{"date-parts":[[2011,11,15]],"date-time":"2011-11-15T11:36:49Z","timestamp":1321357009000},"page":"203-236","source":"Crossref","is-referenced-by-count":279,"title":["Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model"],"prefix":"10.1080","volume":"28","author":[{"given":"Ken H.","family":"Guo","sequence":"first","affiliation":[{"name":"a College of Business, Western New England University"}]},{"given":"Yufei","family":"Yuan","sequence":"additional","affiliation":[{"name":"b DeGroote School of Business, McMaster University, Canada"}]},{"given":"Norman P.","family":"Archer","sequence":"additional","affiliation":[{"name":"b DeGroote School of Business, McMaster University, Canada"}]},{"given":"Catherine E.","family":"Connelly","sequence":"additional","affiliation":[{"name":"b DeGroote School of Business, McMaster University, Canada"}]}],"member":"301","published-online":{"date-parts":[[2014,12,8]]},"reference":[{"issue":"1-2","key":"1","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.ijhcs.2005.04.022","article-title":"Bridging the gap between organizational and user perspectives of security in the clinical domain","volume":"63","author":"A. Adams","year":"2005","journal-title":"International Journal of Human-Computer Studies"},{"issue":"2","key":"2","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behavior","volume":"50","author":"I. Ajzen","year":"1991","journal-title":"Organizational Behavior and Human Decision Processes"},{"key":"3","unstructured":"Ajzen, I. Constructing a TPB questionnaire: Conceptual and methodological considerations. University of Massachusetts, Amherst, 2006 (available at <a target=\"_blank\" href='http:\/\/people.umass.edu\/aizen\/pdf\/tpb.measurement.pdf'>http:\/\/people.umass.edu\/aizen\/pdf\/tpb.measurement.pdf<\/a>"},{"key":"4","volume-title":"Understanding Attitudes and Predicting Social Behavior","author":"I. Ajzen","year":"1980"},{"issue":"1","key":"5","doi-asserted-by":"crossref","first-page":"31","DOI":"10.2307\/249677","article-title":"Modeling IT ethics: A study in situational ethics","volume":"22","author":"D. Banerjee","year":"1998","journal-title":"MIS Quarterly"},{"issue":"5-6","key":"6","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1108\/09576050210447019","article-title":"An information security meta-policy for emergent organizations","volume":"15","author":"R. Baskerville","year":"2002","journal-title":"Logistics Information Management"},{"issue":"3","key":"7","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1016\/j.cose.2003.09.002","article-title":"Computer security impaired by legitimate users","volume":"23","author":"D. Besnard","year":"2004","journal-title":"Computers & Security"},{"issue":"4","key":"8","doi-asserted-by":"crossref","first-page":"805","DOI":"10.2307\/25148755","article-title":"Influence processes for information technology acceptance: An elaboration likelihood model","volume":"30","author":"A. Bhattacherjee","year":"2006","journal-title":"MIS Quarterly"},{"issue":"2","key":"9","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1037\/1089-2680.7.2.115","article-title":"Deviance regulation: A theory of action and identity","volume":"7","author":"H. Blanton","year":"2003","journal-title":"Review of General Psychology"},{"issue":"3","key":"10","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: An empirical study on rationality-based beliefs and information security awareness","volume":"34","author":"B. Bulgurcu","year":"2010","journal-title":"MIS Quarterly"},{"key":"11","unstructured":"Cenfetelli, R.T. The inhibitors of technology use. Ph.D. dissertation, University of British Columbia, 2004."},{"issue":"3","key":"12","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1080\/15536548.2005.10855772","article-title":"Perceptions of information security at the workplace: Linking information security climate to compliant behavior","volume":"1","author":"M. Chan","year":"2005","journal-title":"Journal of Information Privacy and Security"},{"issue":"4","key":"13","doi-asserted-by":"crossref","first-page":"303","DOI":"10.2307\/2786758","article-title":"Role identity and reasoned action in the prediction of repeated behavior","volume":"51","author":"H. Charng","year":"1988","journal-title":"Social Psychology Quarterly"},{"issue":"1","key":"14","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1002\/asi.20946","article-title":"User satisfaction with an Internet-based portal: An asymmetric and nonlinear approach","volume":"60","author":"C. Cheung","year":"2009","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"15","first-page":"295","volume-title":"Modern Methods for Business Research","author":"W. Chin","year":"1998"},{"issue":"1","key":"16","doi-asserted-by":"crossref","first-page":"64","DOI":"10.2307\/3150876","article-title":"A paradigm for developing better measures of marketing constructs","volume":"16","author":"G. Churchill Jr.","year":"1979","journal-title":"Journal of Marketing Research"},{"key":"17","volume-title":"Foundations of Social Theory","author":"J. Coleman","year":"1990"},{"issue":"1","key":"18","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1287\/isre.1070.0160","article-title":"User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach","volume":"20","author":"J. D'Arcy","year":"2009","journal-title":"Information Systems Research"},{"issue":"7","key":"19","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1145\/341852.341877","article-title":"Information systems security management in the new millennium","volume":"43","author":"G. Dhillon","year":"2000","journal-title":"Communications of the ACM"},{"key":"20","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/B978-0-7506-8333-3.50014-7","volume-title":"Dimensions of Dignity at Work","author":"B. Doolin","year":"2007"},{"issue":"6","key":"21","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/s00779-004-0308-5","article-title":"Security in the wild: User strategies for managing security as an everyday, practical problem","volume":"8","author":"P. Dourish","year":"2004","journal-title":"Personal and Ubiquitous Computing"},{"key":"22","unstructured":"Dubie, D. End users behaving badly. <i>Network World<\/i>, December 10, 2007 (available at <a target=\"_blank\" href='http:\/\/www.networkworld.com\/slideshows\/2007\/121007-end-users-behaving-badly.html'>http:\/\/www.networkworld.com\/slideshows\/2007\/121007-end-users-behaving-badly.html<\/a>"},{"key":"23","volume-title":"The Psychology of Attitudes","author":"A. Eagly","year":"1993"},{"key":"24","volume-title":"A Primer for Soft Modeling","author":"R. Falk","year":"1992"},{"issue":"1","key":"25","doi-asserted-by":"crossref","first-page":"39","DOI":"10.2307\/3151312","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","author":"C. Fornell","year":"1981","journal-title":"Journal of Marketing Research"},{"issue":"5","key":"26","doi-asserted-by":"crossref","first-page":"921","DOI":"10.2307\/256641","article-title":"Social construction of communication technology","volume":"36","author":"J. Fulk","year":"1993","journal-title":"Academy of Management Journal"},{"issue":"2","key":"27","doi-asserted-by":"crossref","first-page":"186","DOI":"10.2307\/3172650","article-title":"An updated paradigm for scale development incorporating unidimensionality and its assessment","volume":"25","author":"D. Gerbing","year":"1988","journal-title":"Journal of Marketing Research"},{"key":"28","volume-title":"Crime, Punishment, and Deterrence","author":"J. Gibbs","year":"1975"},{"issue":"4","key":"29","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1109\/3468.852434","article-title":"Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers","volume":"30","author":"S. Grazioli","year":"2000","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Human"},{"issue":"3","key":"30","doi-asserted-by":"crossref","first-page":"257","DOI":"10.2307\/249656","article-title":"The effects of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions","volume":"20","author":"S. Harrington","year":"1996","journal-title":"MIS Quarterly"},{"key":"31","first-page":"134","volume-title":"Goal Directed Behavior: The Concept of Action in Psychology","author":"H. Heckhausen","year":"1985"},{"issue":"2","key":"32","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.dss.2009.02.005","article-title":"Encouraging information security behaviors in organizations: Role of penalties, pressures, and perceived effectiveness","volume":"47","author":"T. Herath","year":"2009","journal-title":"Decision Support Systems"},{"issue":"2","key":"33","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1057\/ejis.2009.6","article-title":"Protection motivation an deterrence: A framework for security policy compliance in organizations","volume":"18","author":"T. Herath","year":"2009","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"34","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1037\/0033-295X.93.1.75","article-title":"Knowledge-based causal attribution-The abnormal conditions focus model","volume":"93","author":"D. Hilton","year":"1986","journal-title":"Psychological Review"},{"issue":"2","key":"35","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1002\/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7","article-title":"Use of partial least squares (PLS) in strategic management research: A review of four recent studies","volume":"20","author":"J. Hulland","year":"1999","journal-title":"Strategic Management Journal"},{"issue":"4","key":"36","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1145\/1104004.1104010","article-title":"A longitudinal study of information system threat categories: The enduring problem of human error","volume":"36","author":"G. Im","year":"2005","journal-title":"DATA BASE for Advances in Information Systems"},{"key":"37","unstructured":"Information security breaches survey 2008. Department for Business Enterprise & Regulatory Reform (BERR), London, 2008 (available at <a target=\"_blank\" href='http:\/\/www.bis.gov.uk\/files\/file45714.pdf'>http:\/\/www.bis.gov.uk\/files\/file45714.pdf<\/a>"},{"key":"38","doi-asserted-by":"crossref","first-page":"57","DOI":"10.4018\/978-1-59904-295-4.ch005","volume-title":"End User Computing Challenges and Technologies: Emerging Tools and Applications","author":"T. James","year":"2008"},{"issue":"1-2","key":"39","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1023\/A:1019104520776","article-title":"Consumer trust in an Internet store","volume":"1","author":"S. Jarvenpaa","year":"2000","journal-title":"Information Technology and Management"},{"issue":"4","key":"40","doi-asserted-by":"crossref","first-page":"741","DOI":"10.2307\/2667054","article-title":"Why differences make a difference: A field study of diversity, conflict, and performance in workgroups","volume":"44","author":"K. Jehn","year":"1999","journal-title":"Administrative Science Quarterly"},{"issue":"2","key":"41","doi-asserted-by":"crossref","first-page":"97","DOI":"10.2753\/MIS0742-1222250205","article-title":"Information risk of inadvertent disclosure: An analysis of file-sharing risk in the financial supply chain","volume":"25","author":"M. Johnson","year":"2008","journal-title":"Journal of Management Information Systems"},{"key":"42","unstructured":"J\u00f6reskog, K.G. How large can a standardized coefficient be? Scientific Software International, Chicago, 1999 (available at <a target=\"_blank\" href='http:\/\/www.ssicentral.com\/lisrel\/techdocs\/HowLargeCanaStandardizedCoefficientbe.pdf'>http:\/\/www.ssicentral.com\/lisrel\/techdocs\/HowLargeCanaStandardizedCoefficientbe.pdf<\/a>"},{"issue":"2","key":"43","doi-asserted-by":"crossref","first-page":"183","DOI":"10.2307\/249751","article-title":"Information technology adoption across time: A cross-sectional comparison of pre-adoption and post-adoption beliefs","volume":"23","author":"E. Karahanna","year":"1999","journal-title":"MIS Quarterly"},{"issue":"1-2","key":"44","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1111\/1468-2389.00201","article-title":"Self-reported counterproductive behaviors and organizational citizenship behaviors: Separate but related constructs","volume":"10","author":"E. Kelloway","year":"2002","journal-title":"International journal of Selection and Assessment"},{"issue":"2","key":"45","first-page":"186","article-title":"Computer abuse and computer crime as organizational activities","volume":"2","author":"R. Kling","year":"1980","journal-title":"Computer\/Law Journal"},{"issue":"1","key":"46","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1108\/09685220610648355","article-title":"Information security: Management's effect on culture and policy","volume":"14","author":"K. Knapp","year":"2006","journal-title":"Information Management & Computer Security"},{"key":"47","doi-asserted-by":"crossref","unstructured":"Kock, N. WarpPLS 1.0 user manual. ScriptWarp Systems, 2010 (available at <a target=\"_blank\" href='http:\/\/www.scriptwarp.com\/warppls\/UserManual.pdf'>http:\/\/www.scriptwarp.com\/warppls\/UserManual.pdf<\/a>","DOI":"10.4018\/jec.2010100101"},{"key":"48","unstructured":"Kock, N. Why are cross-loadings so low in WarpPLS? WarpPLS, 2010 (available at <a target=\"_blank\" href='http:\/\/warppls.blogspot.com\/2010\/01\/why-are-cross-loadings-so-low-in.html'>http:\/\/warppls.blogspot.com\/2010\/01\/why-are-cross-loadings-so-low-in.html<\/a>"},{"issue":"5","key":"49","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1016\/j.im.2003.08.001","article-title":"Why there aren't more information security research studies","volume":"41","author":"A. Kotulic","year":"2004","journal-title":"Information & Management"},{"issue":"3","key":"50","doi-asserted-by":"crossref","first-page":"461","DOI":"10.2307\/25148692","article-title":"A multilevel model of resistance to information technology implementation","volume":"29","author":"L. Lapointe","year":"2005","journal-title":"MIS Quarterly"},{"key":"51","volume-title":"Doing Research on Sensitive Topics","author":"R. Lee","year":"1993"},{"issue":"1","key":"52","doi-asserted-by":"crossref","DOI":"10.17705\/1jais.00012","article-title":"Illegal, inappropriate, and unethical behavior in an information technology context: A study to explain influences","volume":"1","author":"L. Leonard","year":"2001","journal-title":"Journal of the Association for Information Systems"},{"issue":"4","key":"53","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1057\/palgrave.ejis.3000552","article-title":"A methodology for construct development in MIS research","volume":"14","author":"B. Lewis","year":"2005","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"54","doi-asserted-by":"crossref","first-page":"59","DOI":"10.2307\/25148781","article-title":"Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management","volume":"31","author":"H. Liang","year":"2007","journal-title":"MIS Quarterly"},{"issue":"2","key":"55","doi-asserted-by":"crossref","first-page":"173","DOI":"10.2307\/249574","article-title":"Threats to information systems: Today's reality, yesterday's understanding","volume":"17","author":"K. Loch","year":"1992","journal-title":"MIS Quarterly"},{"issue":"4","key":"56","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model","volume":"15","author":"N. Malhotra","year":"2004","journal-title":"Information Systems Research"},{"issue":"3","key":"57","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1287\/isre.2.3.192","article-title":"Development of an instrument to measure the perceptions of adopting an information technology innovation","volume":"2","author":"G. Moore","year":"1991","journal-title":"Information Systems Research"},{"issue":"2","key":"58","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1057\/ejis.2009.10","article-title":"What levels of moral reasoning and values explain adherence to information security rules? An empirical study","volume":"18","author":"L. Myyry","year":"2009","journal-title":"European Journal of Information Systems"},{"key":"59","doi-asserted-by":"crossref","DOI":"10.1109\/HICSS.2007.206","article-title":"Employees' behavior towards IS security policy compliance","author":"S. Pahnila","year":"2007"},{"issue":"3","key":"60","first-page":"69","article-title":"Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model","volume":"7","author":"P. Pavlou","year":"2003","journal-title":"International Journal of Electronic Commerce"},{"issue":"1","key":"61","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1287\/isre.1040.0015","article-title":"Building effective online marketplaces with institution-based trust","volume":"15","author":"P. Pavlou","year":"2004","journal-title":"Information Systems Research"},{"key":"62","unstructured":"Perceptions and behaviors of remote workers: Keys to building a secure company. White Paper, Cisco Systems, San Jose, CA, 2006."},{"key":"63","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/S1475-9144(02)01030-5","volume-title":"The Many Faces of Multi-Level Issues","author":"R. Ployhart","year":"2002"},{"key":"64","first-page":"495","volume-title":"The Blackwell Handbook of Personnel Selection","author":"R. Ployhart","year":"2005"},{"issue":"4","key":"65","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1177\/014920638601200408","article-title":"Self-reports in organizational research: Problems and prospects","volume":"12","author":"P. Podasakoff","year":"1986","journal-title":"Journal of Management"},{"issue":"5","key":"66","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","article-title":"Common method biases in behavioral research: A critical review of the literature and recommended remedies","volume":"88","author":"P. Podasakoff","year":"2003","journal-title":"Journal of Applied Psychology"},{"issue":"3","key":"67","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/j.cose.2006.10.004","article-title":"Evaluating information security tradeoff: Restricting access can interfere with user tasks","volume":"26","author":"G. Post","year":"2007","journal-title":"Computers & Security"},{"key":"68","volume-title":"CSI computer crime and security survey","author":"R. Richardson","year":"2010"},{"key":"69","volume-title":"SmartPLS 2.0 (M3) beta","author":"C. Ringle","year":"2005"},{"issue":"4","key":"70","doi-asserted-by":"crossref","first-page":"685","DOI":"10.5465\/AMR.2005.18378873","article-title":"Changing faces: Professional image construction in diverse organizational settings","volume":"30","author":"L. Roberts","year":"2005","journal-title":"Academy of Management Review"},{"issue":"6","key":"71","doi-asserted-by":"crossref","first-page":"658","DOI":"10.2307\/256963","article-title":"Monkey see, monkey do: The influence of work groups on the antisocial behavior of employees","volume":"41","author":"S. Robinson","year":"1998","journal-title":"Academy of Management Journal"},{"issue":"2","key":"72","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1023\/A:1011902718709","article-title":"Transforming the \"weakest link\"-A human\/computer interaction approach to usable and effective security","volume":"19","author":"M. Sasse","year":"2001","journal-title":"BT Technology Journal"},{"key":"73","volume-title":"Secrets and Lies: Digital Security in a Networked World","author":"B. Schneier","year":"2000"},{"issue":"1","key":"74","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1111\/j.1464-0597.2009.00416.x","article-title":"Illegitimate tasks and counterproductive work behavior","volume":"59","author":"N. Semmer","year":"2010","journal-title":"Applied Psychology: An International Review"},{"issue":"1","key":"75","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1108\/09685220010371394","article-title":"A conceptual foundation for organizational information security awareness","volume":"8","author":"M. Siponen","year":"2000","journal-title":"Information Management & Computer Security"},{"issue":"3","key":"76","doi-asserted-by":"crossref","first-page":"487","DOI":"10.2307\/25750688","article-title":"Neutralization: New insight into the problem of employee information systems security policy violation","volume":"34","author":"M. Siponen","year":"2010","journal-title":"MIS Quarterly"},{"issue":"1","key":"77","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1509\/jmkg.66.1.15.18449","article-title":"Consumer trust, value, and loyalty in relational exchanges","volume":"65","author":"D. Sirdeshmukh","year":"2002","journal-title":"Journal of Marketing"},{"issue":"2","key":"78","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/0022-1031(82)90048-8","article-title":"Acting on one's attitudes: Procedures for linking attitude and behavior","volume":"18","author":"M. Snyder","year":"1982","journal-title":"Journal of Experimental Social Psychology"},{"issue":"3","key":"79","doi-asserted-by":"crossref","first-page":"503","DOI":"10.2307\/25750689","article-title":"User participation in information systems security risk management","volume":"34","author":"J. Spears","year":"2010","journal-title":"MIS Quarterly"},{"issue":"2","key":"80","doi-asserted-by":"crossref","first-page":"147","DOI":"10.2307\/248922","article-title":"Validating instruments in MIS research","volume":"13","author":"D. Straub","year":"1989","journal-title":"MIS Quarterly"},{"issue":"3","key":"81","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1287\/isre.1.3.255","article-title":"Effective IS security: An empirical study","volume":"1","author":"D. Straub","year":"1990","journal-title":"Information Systems Research"},{"issue":"1","key":"82","doi-asserted-by":"crossref","first-page":"45","DOI":"10.2307\/249307","article-title":"Discovering and disciplining computer abuse in organizations: A field study","volume":"14","author":"D. Straub","year":"1990","journal-title":"MIS Quarterly"},{"issue":"1","key":"83","first-page":"380","article-title":"Validation guidelines for IS positivist research","volume":"13","author":"D. Straub","year":"2004","journal-title":"Communications of the Association for Information Systems"},{"issue":"3","key":"84","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1348\/014466699164149","article-title":"The theory of planned behaviour: Self-identity, social identity and group norms","volume":"38","author":"D. Terry","year":"1999","journal-title":"British Journal of Social Psychology"},{"issue":"2","key":"85","doi-asserted-by":"crossref","first-page":"174","DOI":"10.2307\/2095103","article-title":"Multiple identities and psychological well-being: A reformulation and test of the social isolation hypothesis","volume":"48","author":"P. Thoits","year":"1983","journal-title":"American Sociological Review"},{"issue":"2","key":"86","doi-asserted-by":"crossref","first-page":"101","DOI":"10.2307\/2786929","article-title":"On merging identity theory and stress research","volume":"54","author":"P. Thoits","year":"1991","journal-title":"Social Psychology Quarterly"},{"issue":"4","key":"87","doi-asserted-by":"crossref","first-page":"827","DOI":"10.2307\/20650329","article-title":"Nonlinearities between attitude and subjective norms in information technology acceptance: A negative synergy?","volume":"33","author":"R. Titah","year":"2009","journal-title":"MIS Quarterly"},{"key":"88","volume-title":"Interpersonal Behavior","author":"H. Triandis","year":"1977"},{"issue":"6","key":"89","doi-asserted-by":"crossref","first-page":"1143","DOI":"10.5465\/AMJ.2005.19573114","article-title":"Can businesses effectively regulate employee conduct? The antecedents of rule following in work settings","volume":"48","author":"T. Tyler","year":"2005","journal-title":"Academy of Management Journal"},{"issue":"3","key":"90","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: Toward a unified view","volume":"27","author":"V. Venkatesh","year":"2003","journal-title":"MIS Quarterly"},{"issue":"3","key":"91","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/S1441-3582(02)70157-2","article-title":"Designing vignette studies in marketing","volume":"10","author":"K. Wason","year":"2002","journal-title":"Australasian Marketing Journal"},{"issue":"6","key":"92","doi-asserted-by":"crossref","first-page":"1544","DOI":"10.2307\/256843","article-title":"Rational and social theories as complementary explanations of communication media choices: Two policy-capturing studies","volume":"38","author":"J. Webster","year":"1995","journal-title":"Academy of Management Journal"},{"key":"93","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/S1361-3723(00)10029-6","article-title":"An unappreciated reason why information security policies fail","volume":"10","author":"C. Wood","year":"2000","journal-title":"Computer Fraud & Security"},{"issue":"2","key":"94","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1002\/asi.20474","article-title":"Punishment and ethics deterrents: A study of insider security contravention","volume":"58","author":"M. Workman","year":"2006","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"6","key":"95","doi-asserted-by":"crossref","first-page":"2799","DOI":"10.1016\/j.chb.2008.04.005","article-title":"Security lapses and the omission of information security measures: A threat control model and empirical test","volume":"24","author":"M. Workman","year":"2008","journal-title":"Computers in Human Behavior"},{"key":"96","article-title":"Predicting the usage of P2P sharing software: The role of trust and perceived risk","author":"H. Xu","year":"2005"},{"issue":"5","key":"97","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1016\/j.jretconser.2007.08.005","article-title":"Exploring asymmetric effects in the formation of retail price satisfaction","volume":"15","author":"S. Zielke","year":"2008","journal-title":"Journal of Retailing and Consumer Services"},{"issue":"4","key":"98","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1080\/07421222.1999.11518226","article-title":"Password security: An empirical study","volume":"15","author":"M. Zviran","year":"1999","journal-title":"Journal of Management Information Systems"}],"container-title":["Journal of Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.2753\/MIS0742-1222280208","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T02:49:14Z","timestamp":1741920554000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.2753\/MIS0742-1222280208"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":98,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2014,12,8]]},"published-print":{"date-parts":[[2011,10]]}},"alternative-id":["10.2753\/MIS0742-1222280208"],"URL":"https:\/\/doi.org\/10.2753\/mis0742-1222280208","relation":{},"ISSN":["0742-1222","1557-928X"],"issn-type":[{"value":"0742-1222","type":"print"},{"value":"1557-928X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,10]]}}}