{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T00:11:30Z","timestamp":1651795890497},"reference-count":95,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>This study tested the context of employees using their devices for both work and personal use, and non-compliant device usage of a person potentially resulting in Information Systems (IS) security threat to personal as well as work data and\/or the devices. Integrating bystander and protection motivation theory (PMT) perspectives this paper studies bystanders' responses to IS security threats and the extent to which a perceived security threat motivates individual intention to act, in the context of non-compliant mobile device usage behaviors. It tests the role of an individual's threat perceptions to protect their own IS security, and as a bystander, protecting their peers or the IS security of their organization. Data collected from 431 individuals support the hypotheses that security awareness predicts perceived severity and protection motivation. Evaluation apprehension and diffusion of responsibility inhibit bystander's intentions to act against non-compliant mobile device usage behaviors, while awareness facilitates it. Theoretical contributions and practical implications of the research are discussed.<\/jats:p>","DOI":"10.4018\/ijissc.2018010101","type":"journal-article","created":{"date-parts":[[2017,11,8]],"date-time":"2017-11-08T14:42:17Z","timestamp":1510152137000},"page":"1-25","source":"Crossref","is-referenced-by-count":0,"title":["Non-Compliant Mobile Device Usage and Information Systems Security: A Bystander Theory Perspective"],"prefix":"10.4018","volume":"9","author":[{"given":"Narasimha","family":"Paravastu","sequence":"first","affiliation":[{"name":"University of Central Missouri, Warrensburg, Missouri, United States"}]},{"given":"Claire A.","family":"Simmers","sequence":"additional","affiliation":[{"name":"Saint Joseph's University, Philadelphia, Pennsylvania, United States"}]},{"given":"Murugan","family":"Anandarajan","sequence":"additional","affiliation":[{"name":"Drexel University, Philadelphia, Pennsylvania, United States"}]}],"member":"2432","reference":[{"key":"IJISSC.2018010101-0","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-69746-3_2"},{"key":"IJISSC.2018010101-1","first-page":"1","volume":"Vol. 20","author":"I.Ajzen","year":"1987","journal-title":"Attitudes, traits, and actions: Dispositional prediction of behavior in personality and social psychology."},{"key":"IJISSC.2018010101-2","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"IJISSC.2018010101-3","unstructured":"Ajzen, I. (2005). Attitudes, personality, and behavior Mapping social psychology."},{"key":"IJISSC.2018010101-4","first-page":"3","article-title":"Predicting and changing behavior: A reasoned action approach","author":"I.Ajzen","year":"2007","journal-title":"Prediction and change of health behavior: Applying the reasoned action approach"},{"key":"IJISSC.2018010101-5","author":"I.Ajzen","year":"1980","journal-title":"Understanding attitudes and predicting social behavior"},{"key":"IJISSC.2018010101-6","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(86)90045-4"},{"key":"IJISSC.2018010101-7","unstructured":"AMT. (2015). Amazon mechanical turk \u2013 FAQ. Retrieved May 25, 2015, from https:\/\/requester.mturk.com\/help\/faq"},{"issue":"2","key":"IJISSC.2018010101-8","first-page":"43","article-title":"Online identity theft: A longitudinal study of individual threat-response and coping behaviors.","volume":"8","author":"M.Anandarajan","year":"2012","journal-title":"Journal of Information System Security"},{"key":"IJISSC.2018010101-9","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.84.2.191"},{"issue":"2","key":"IJISSC.2018010101-10","first-page":"285","article-title":"The partial least squares (pls) approach to causal modeling: Personal computer adoption and use as an illustration.","volume":"2","author":"D.Barclay","year":"1995","journal-title":"Technology Studies"},{"key":"IJISSC.2018010101-11","doi-asserted-by":"publisher","DOI":"10.1093\/pan\/mpr057"},{"key":"IJISSC.2018010101-12","doi-asserted-by":"publisher","DOI":"10.1080\/00224545.1971.9918547"},{"key":"IJISSC.2018010101-13","article-title":"Protection motivation theory","author":"H.Boer","year":"1996","journal-title":"Predicting health behaviour: Research and practice with social cognition models."},{"issue":"1","key":"IJISSC.2018010101-14","first-page":"1","article-title":"Mobile devices expose firms to compliance\/security risks.","volume":"8","year":"2007","journal-title":"Computer Security Update"},{"issue":"3","key":"IJISSC.2018010101-15","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness.","volume":"34","author":"B.Bulgurcu","year":"2010","journal-title":"Management Information Systems Quarterly"},{"key":"IJISSC.2018010101-16","unstructured":"Cavusoglu, H., Cavusoglu, H., Son, J.-Y., & Benbasat, I. (2009). Information security control resources in organizations: A multidimensional view and their key drivers (working paper). Sauder School of Business, University of British Columbia."},{"key":"IJISSC.2018010101-17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.09.009"},{"key":"IJISSC.2018010101-18","first-page":"viii","article-title":"The partial least squares approach for structural equation modelling","author":"W. W.Chin","year":"1998","journal-title":"Modern methods for business research"},{"key":"IJISSC.2018010101-19","doi-asserted-by":"publisher","DOI":"10.1287\/isre.14.2.189.16018"},{"key":"IJISSC.2018010101-20","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2008.2009794"},{"key":"IJISSC.2018010101-21","doi-asserted-by":"publisher","DOI":"10.1037\/h0036000"},{"key":"IJISSC.2018010101-22","first-page":"224","article-title":"Four kinds of validity","author":"T. D.Cook","year":"1976","journal-title":"Handbook of industrial and organizational psychology"},{"key":"IJISSC.2018010101-23","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1988.tb01198.x"},{"key":"IJISSC.2018010101-24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.11.002"},{"key":"IJISSC.2018010101-25","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"IJISSC.2018010101-26","doi-asserted-by":"publisher","DOI":"10.1037\/h0025589"},{"key":"IJISSC.2018010101-27","unstructured":"Davis, F. (1986). Technology acceptance model for empirically testing new end-user information systems: Theory and results [Doctoral Dissertation]. Massachusetts Institute of Technology, Boston, MA."},{"key":"IJISSC.2018010101-28","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"IJISSC.2018010101-29","doi-asserted-by":"publisher","DOI":"10.1362\/026725705775194111"},{"key":"IJISSC.2018010101-30","doi-asserted-by":"crossref","unstructured":"Dillard, J. P., & Anderson, J. W. (2004). The role of fear in persuasion. [Article]. Psychology & Marketing, 21(11), 909-926. doi:10. 1002\/mar.20040","DOI":"10.1002\/mar.20041"},{"key":"IJISSC.2018010101-31","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1985.4279105"},{"key":"IJISSC.2018010101-32","doi-asserted-by":"publisher","DOI":"10.1037\/a0023304"},{"key":"IJISSC.2018010101-33","doi-asserted-by":"publisher","DOI":"10.2307\/3151718"},{"key":"IJISSC.2018010101-34","doi-asserted-by":"publisher","DOI":"10.2307\/3151312"},{"key":"IJISSC.2018010101-35","doi-asserted-by":"crossref","unstructured":"Gefen, D., & Straub, D. (2005). A practical guide to factorial validity using pls-graph: Tutorial and annotated example. Communications of AIS, 2005(16), 91-109.","DOI":"10.17705\/1CAIS.01605"},{"key":"IJISSC.2018010101-36","doi-asserted-by":"publisher","DOI":"10.1027\/1864-9335\/a000215"},{"key":"IJISSC.2018010101-37","doi-asserted-by":"publisher","DOI":"10.3758\/BF03327696"},{"key":"IJISSC.2018010101-38","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"IJISSC.2018010101-39","doi-asserted-by":"publisher","DOI":"10.1080\/00224545.1971.9922471"},{"key":"IJISSC.2018010101-40","doi-asserted-by":"publisher","DOI":"10.1007\/s10683-011-9273-9"},{"key":"IJISSC.2018010101-41","doi-asserted-by":"publisher","DOI":"10.2307\/2786423"},{"key":"IJISSC.2018010101-42","unstructured":"Hoyle, R. H., Harris, M. J., & Judd, C. M. (2002). Research methods in social relations (7th ed.). Pacific Grove, CA: Wadsworth Publishing."},{"key":"IJISSC.2018010101-43","doi-asserted-by":"publisher","DOI":"10.1080\/00224545.1974.9923068"},{"key":"IJISSC.2018010101-44","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.007"},{"issue":"3","key":"IJISSC.2018010101-45","doi-asserted-by":"crossref","first-page":"549","DOI":"10.2307\/25750691","article-title":"Fear appeals and information security behaviors: An empirical study.","volume":"34","author":"A. C.Johnston","year":"2010","journal-title":"Management Information Systems Quarterly"},{"key":"IJISSC.2018010101-46","doi-asserted-by":"publisher","DOI":"10.1037\/h0026570"},{"key":"IJISSC.2018010101-47","doi-asserted-by":"publisher","DOI":"10.2307\/27828530"},{"key":"IJISSC.2018010101-48","author":"B.Latan\u00e9","year":"1970","journal-title":"The unresponsive bystander: Why doesn't he help?"},{"key":"IJISSC.2018010101-49","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.89.2.308"},{"key":"IJISSC.2018010101-50","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(69)90046-8"},{"key":"IJISSC.2018010101-51","doi-asserted-by":"publisher","DOI":"10.1177\/0146167283093007"},{"key":"IJISSC.2018010101-52","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2601(08)60091-X"},{"key":"IJISSC.2018010101-53","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2002.tb01446.x"},{"key":"IJISSC.2018010101-54","doi-asserted-by":"publisher","DOI":"10.1037\/h0020925"},{"key":"IJISSC.2018010101-55","doi-asserted-by":"publisher","DOI":"10.4018\/ijissc.2014040103"},{"key":"IJISSC.2018010101-56","doi-asserted-by":"publisher","DOI":"10.1080\/0267257X.2012.715092"},{"key":"IJISSC.2018010101-57","doi-asserted-by":"publisher","DOI":"10.2307\/255873"},{"key":"IJISSC.2018010101-58","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2015.0587"},{"key":"IJISSC.2018010101-59","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2.3.192"},{"key":"IJISSC.2018010101-60","doi-asserted-by":"publisher","DOI":"10.1509\/jmr.07.0364"},{"key":"IJISSC.2018010101-61","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.10"},{"key":"IJISSC.2018010101-62","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.71.1.137"},{"key":"IJISSC.2018010101-63","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2009.03.009"},{"key":"IJISSC.2018010101-64","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1982.tb00852.x"},{"key":"IJISSC.2018010101-65","doi-asserted-by":"crossref","unstructured":"Park, C., Im, G. P., & Keil, M. (2006). Overcoming the mum effect in it project reporting: The effect of time pressure and blame shifting.","DOI":"10.5465\/ambpp.2006.27169098"},{"key":"IJISSC.2018010101-66","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2009.00255.x"},{"key":"IJISSC.2018010101-67","doi-asserted-by":"publisher","DOI":"10.2307\/1250296"},{"key":"IJISSC.2018010101-68","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.52.3.596"},{"key":"IJISSC.2018010101-69","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"IJISSC.2018010101-70","article-title":"Cognitive and physiological processes in attitude change: A revised theory of protection motivation","author":"R. W.Rogers","year":"1983","journal-title":"Social psychophysiology"},{"key":"IJISSC.2018010101-71","doi-asserted-by":"publisher","DOI":"10.1037\/h0033964"},{"key":"IJISSC.2018010101-72","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6494.1969.tb01730.x"},{"key":"IJISSC.2018010101-73","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.34.6.1188"},{"key":"IJISSC.2018010101-74","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.39.3.418"},{"key":"IJISSC.2018010101-75","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.49.2.347"},{"issue":"3","key":"IJISSC.2018010101-76","doi-asserted-by":"crossref","first-page":"487","DOI":"10.2307\/25750688","article-title":"Neutralization: New insights into the problem of employee information systems security policy violations.","volume":"34","author":"M.Siponen","year":"2010","journal-title":"Management Information Systems Quarterly"},{"key":"IJISSC.2018010101-77","doi-asserted-by":"publisher","DOI":"10.1108\/09685220010371394"},{"key":"IJISSC.2018010101-78","doi-asserted-by":"publisher","DOI":"10.4018\/jissc.2012100104"},{"key":"IJISSC.2018010101-79","doi-asserted-by":"publisher","DOI":"10.3109\/10826088309039356"},{"key":"IJISSC.2018010101-80","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.07.001"},{"key":"IJISSC.2018010101-81","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1.3.255"},{"key":"IJISSC.2018010101-82","doi-asserted-by":"publisher","DOI":"10.2307\/249551"},{"key":"IJISSC.2018010101-83","doi-asserted-by":"publisher","DOI":"10.1037\/0278-6133.15.3.158"},{"key":"IJISSC.2018010101-84","doi-asserted-by":"publisher","DOI":"10.2307\/1252146"},{"key":"IJISSC.2018010101-85","doi-asserted-by":"publisher","DOI":"10.1080\/02640419608727734"},{"key":"IJISSC.2018010101-86","doi-asserted-by":"publisher","DOI":"10.1007\/BF00845103"},{"key":"IJISSC.2018010101-87","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.04.002"},{"key":"IJISSC.2018010101-88","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.2.186.11926"},{"issue":"3","key":"IJISSC.2018010101-89","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: Toward a unified view.","volume":"27","author":"V.Venkatesh","year":"2003","journal-title":"Management Information Systems Quarterly"},{"key":"IJISSC.2018010101-90","doi-asserted-by":"publisher","DOI":"10.1080\/03637759209376276"},{"key":"IJISSC.2018010101-91","doi-asserted-by":"publisher","DOI":"10.1177\/109019810002700506"},{"key":"IJISSC.2018010101-92","first-page":"423","author":"K.Witte","year":"1998","journal-title":"Fear as motivator, fear as inhibitor: Using the extended parallel process model to explain fear appeal successes and failures. In Handbook of communication and emotion: Research, theory, applications, and contexts"},{"key":"IJISSC.2018010101-93","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0042"},{"key":"IJISSC.2018010101-94","doi-asserted-by":"crossref","unstructured":"Wold, H. O. A. (1980). The fix-point approach to interdependent systems. Amsterdam; New York: North-Holland Pub. Co.","DOI":"10.1016\/B978-0-444-85451-3.50007-8"}],"container-title":["International Journal of Information Systems and Social Change"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=192092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T23:54:34Z","timestamp":1651794874000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISSC.2018010101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":95,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.4018\/ijissc.2018010101","relation":{},"ISSN":["1941-868X","1941-8698"],"issn-type":[{"value":"1941-868X","type":"print"},{"value":"1941-8698","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1]]}}}