Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 463870, 12 pages
Research Article

An Integrative Behavioral Model of Information Security Policy Compliance

1Department of Business Administration, Kwangwoon University, 26 Kwangwoon-gil, Nowon-gu, Seoul 139-701, Republic of Korea
2College of Business School, University of Wisconsin-La Crosse, 1725 State Street, La Crosse, WI 54601, USA
3Namyang R&D Center, Hyundai Motor Company, 772-1 Jangdeok-dong, Hwaseong-Si, Gyeonggi-do 445-706, Republic of Korea

Received 25 February 2014; Accepted 23 April 2014; Published 28 May 2014

Academic Editor: Hangbae Chang

Copyright © 2014 Sang Hoon Kim et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [6 citations]

The following is the list of published articles that have cited the current article.

  • Sadaf Hina, and Dhanapal Durai Dominic, “Need for information security policies compliance: A perspective in Higher Education Institutions,” 2017 International Conference on Research and Innovation in Information Systems (ICRIIS), pp. 1–6, . View at Publisher · View at Google Scholar
  • Unknown, Akhyari Nasir, Ruzaini Abdullah Arshah, and Mohd Rashid Ab Hamid, “Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture,” Proceedings of the 2017 International Conference on Information System and Data Mining - ICISDM '17, pp. 56–60, . View at Publisher · View at Google Scholar
  • Wayne D. Kearney, and Hennie A. Kruger, “Theorising on risk homeostasis in the context of information security behaviour,” Information and Computer Security, vol. 24, no. 5, pp. 496–513, 2016. View at Publisher · View at Google Scholar
  • Fredrik Karlsson, Martin Karlsson, and Joachim Åström, “Measuring employees' compliance - The importance of value pluralism,” Information and Computer Security, vol. 25, no. 3, pp. 279–299, 2017. View at Publisher · View at Google Scholar
  • P. Briggs, D. Jeske, and L. Coventry, “Behavior Change Interventions for Cybersecurity,” Behavior Change Research and Theory, pp. 115–136, 2017. View at Publisher · View at Google Scholar
  • Saad Altamimi, Timothy Storer, and Ahmed Alzahrani, “The role of neutralisation techniques in violating hospitals privacy policies in Saudi Arabia,” 2018 4th International Conference on Information Management, ICIM 2018, pp. 133–140, 2018. View at Publisher · View at Google Scholar