{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:57:03Z","timestamp":1767085023378},"reference-count":59,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1,1]]},"abstract":"<p>Internal vulnerabilities and insider threats top the list of information security (InfoSec) incidents; prompting organizations to establish InfoSec policy (ISP). Yet, mitigating user's ISP non-compliance is still an arduous task. Hence, this study aims to minimize user's ISP non-compliance intention by investigating their perception and attitude toward ISP non-compliance. Specifically, protective measures drawing upon the protection motivation theory - perceived severity of ISP non-compliance, rewards and familiarity with ISP - analyze users' attitude toward ISP non-compliance. Further, the new construct, information technology (IT) vision conflict, is the mismatch between the values that users hold and those embedded in the ISP. The misalignment of the two conflicting values moderates the relationship between the protective measures and attitude toward ISP non-compliance. Findings show that IT vision conflict weakens the negative relationship between perceived severity of ISP non-compliance and attitude toward ISP non-compliance; indirectly affecting ISP non-compliance intention.<\/p>","DOI":"10.4018\/joeuc.2019010101","type":"journal-article","created":{"date-parts":[[2018,10,23]],"date-time":"2018-10-23T18:47:26Z","timestamp":1540320446000},"page":"1-21","source":"Crossref","is-referenced-by-count":35,"title":["Protective Measures and Security Policy Non-Compliance Intention"],"prefix":"10.4018","volume":"31","author":[{"given":"Kuo-Chung","family":"Chang","sequence":"first","affiliation":[{"name":"Yuan Ze University, Taoyuan, Taiwan"}]},{"given":"Yoke May","family":"Seow","sequence":"additional","affiliation":[{"name":"Yuan Ze University, Taoyuan, Taiwan"}]}],"member":"2432","reference":[{"key":"JOEUC.2019010101-0","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.01.003"},{"key":"JOEUC.2019010101-1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-59749-653-7.00001-3"},{"key":"JOEUC.2019010101-2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.29.5.530"},{"key":"JOEUC.2019010101-3","doi-asserted-by":"publisher","DOI":"10.2307\/249610"},{"key":"JOEUC.2019010101-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.006"},{"key":"JOEUC.2019010101-5","doi-asserted-by":"publisher","DOI":"10.1037\/1089-2680.7.2.115"},{"key":"JOEUC.2019010101-6","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.8"},{"key":"JOEUC.2019010101-7","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"JOEUC.2019010101-8","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2005.10855772"},{"key":"JOEUC.2019010101-9","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290305"},{"key":"JOEUC.2019010101-10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32827-8_29"},{"key":"JOEUC.2019010101-11","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2014.8.1.02"},{"key":"JOEUC.2019010101-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.05.003"},{"key":"JOEUC.2019010101-13","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2011.2136437"},{"key":"JOEUC.2019010101-14","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-008-9909-7"},{"key":"JOEUC.2019010101-15","doi-asserted-by":"publisher","DOI":"10.1080\/10580530701586136"},{"key":"JOEUC.2019010101-16","doi-asserted-by":"publisher","DOI":"10.1287\/isre.3.1.60"},{"key":"JOEUC.2019010101-17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2009.05.003"},{"key":"JOEUC.2019010101-18","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222280208"},{"key":"JOEUC.2019010101-19","doi-asserted-by":"publisher","DOI":"10.1108\/09685220810908796"},{"key":"JOEUC.2019010101-20","author":"J. F.Hair","year":"1998","journal-title":"Multivariate Data Analysis"},{"key":"JOEUC.2019010101-21","doi-asserted-by":"publisher","DOI":"10.2753\/MTP1069-6679190202"},{"key":"JOEUC.2019010101-22","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-08-2012-0043"},{"key":"JOEUC.2019010101-23","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"JOEUC.2019010101-24","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.02.005"},{"key":"JOEUC.2019010101-25","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2012.00361.x"},{"key":"JOEUC.2019010101-26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.007"},{"key":"JOEUC.2019010101-27","doi-asserted-by":"publisher","DOI":"10.1145\/1459352.1459356"},{"key":"JOEUC.2019010101-28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.07.001"},{"key":"JOEUC.2019010101-29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30436-1_28"},{"key":"JOEUC.2019010101-30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.07.001"},{"key":"JOEUC.2019010101-31","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-04-2012-0022"},{"key":"JOEUC.2019010101-32","doi-asserted-by":"crossref","unstructured":"Lowry, P. B., & Moody, G. D. (2013, January 7-10). Explaining Opposing Compliance Motivations towards Organizational Information Security Policies. Paper presented at the 2013 46th Hawaii International Conference on System Sciences (HICSS).","DOI":"10.1109\/HICSS.2013.5"},{"key":"JOEUC.2019010101-33","unstructured":"Lowry, P. B., Teh, N., Molyneux, B., & Bui, S. N. (2010, October 8-9). Using Theories of Formal Control, Mandatoriness, and Reactance to Explain Working Professionals\u2019 Intent to Comply with New IT Security Policies. Paper presented at theRoode Workshop on IS Security Research, Boston, MA."},{"key":"JOEUC.2019010101-34","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2.3.192"},{"key":"JOEUC.2019010101-35","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.10"},{"key":"JOEUC.2019010101-36","unstructured":"Norman, P., Boer, H., & Seydel, E. R. (2005). Protection motivation theory. In M. Conner & P. Norman (Eds.), Predicting Health Behaviour: Research and Practice with Social Cognition Models (2 ed., pp. 81-126). Maidenhead: Open University Press."},{"key":"JOEUC.2019010101-37","author":"J. C.Nunnally","year":"1994","journal-title":"Psychometric Theory"},{"key":"JOEUC.2019010101-38","unstructured":"Parsons, K., McCormac, A., Butavicius, M., & Ferguson, L. (2010). Human Factors and Information Security: Individual, Culture and Security Environment (DSTO-TR-2484). Retrieved from http:\/\/dspace.dsto.defence.gov.au\/dspace\/handle\/1947\/10094"},{"key":"JOEUC.2019010101-39","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2003.11045759"},{"key":"JOEUC.2019010101-40","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.4.09"},{"key":"JOEUC.2019010101-41","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2014.03.009"},{"key":"JOEUC.2019010101-42","unstructured":"PwC. (2015a). Global State of Information Security Survey. Retrieved from http:\/\/www.pwccn.com\/home\/eng\/rcs_info_security_2015.html"},{"key":"JOEUC.2019010101-43","unstructured":"PwC. (2015b). Information Security Breaches Survey 2015. Retrieved from https:\/\/www.gov.uk\/government\/publications\/information-security-breaches-survey-2015"},{"key":"JOEUC.2019010101-44","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.157"},{"key":"JOEUC.2019010101-45","doi-asserted-by":"publisher","DOI":"10.1108\/09685221211267666"},{"key":"JOEUC.2019010101-46","unstructured":"Ringle, C. M., Wende, S., & Will, A. (2005). SmartPLS 2.0 (beta). Retrieved from http:\/\/www.smartpls.de"},{"key":"JOEUC.2019010101-47","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"JOEUC.2019010101-48","first-page":"153","article-title":"Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation","author":"R. W.Rogers","year":"1983","journal-title":"Social Psychophysiology: A Sourcebook"},{"key":"JOEUC.2019010101-49","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.08.006"},{"key":"JOEUC.2019010101-50","doi-asserted-by":"publisher","DOI":"10.2307\/25750688"},{"key":"JOEUC.2019010101-51","doi-asserted-by":"publisher","DOI":"10.2307\/25750703"},{"key":"JOEUC.2019010101-52","doi-asserted-by":"publisher","DOI":"10.1108\/02635571111133551"},{"key":"JOEUC.2019010101-53","doi-asserted-by":"publisher","DOI":"10.1108\/09593841211254358"},{"key":"JOEUC.2019010101-54","doi-asserted-by":"publisher","DOI":"10.4018\/joeuc.2012010102"},{"key":"JOEUC.2019010101-55","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.04.002"},{"key":"JOEUC.2019010101-56","doi-asserted-by":"publisher","DOI":"10.1080\/1097198X.2010.10856507"},{"key":"JOEUC.2019010101-57","unstructured":"Wall, J. D., Iyer, L., & Salam, A. (2013). Are Conceptualizations of Employee Compliance and Noncompliance in Information Security Research Adequate? Developing Taxonomies of Compliance and Noncompliance. Paper presented at the 19th Americas Conference on Information Systems (AMCIS), Chicago, IL. Retrieved from http:\/\/aisel.aisnet.org\/amcis2013\/ISSecurity\/RoundTablePresentations\/15\/"},{"key":"JOEUC.2019010101-58","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.04.005"}],"container-title":["Journal of Organizational and End User Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=216969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T15:49:10Z","timestamp":1651852150000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/JOEUC.2019010101"}},"subtitle":["IT Vision Conflict as a Moderator"],"short-title":[],"issued":{"date-parts":[[2019,1,1]]},"references-count":59,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"URL":"https:\/\/doi.org\/10.4018\/joeuc.2019010101","relation":{},"ISSN":["1546-2234","1546-5012"],"issn-type":[{"value":"1546-2234","type":"print"},{"value":"1546-5012","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,1]]}}}