Reference Hub4
Believe It or Not: Employees Intend to Comply With Information Security Policy Because of the Desire for Trade-Offs

Believe It or Not: Employees Intend to Comply With Information Security Policy Because of the Desire for Trade-Offs

Hung-Pin Shih, Kee-hung Lai, Xitong Guo, Xitong Guo, T. C. E. Cheng
Copyright: © 2021 |Volume: 29 |Issue: 6 |Pages: 20
ISSN: 1062-7375|EISSN: 1533-7995|EISBN13: 9781799872627|DOI: 10.4018/JGIM.294329
Cite Article Cite Article

MLA

Shih, Hung-Pin, et al. "Believe It or Not: Employees Intend to Comply With Information Security Policy Because of the Desire for Trade-Offs." JGIM vol.29, no.6 2021: pp.1-20. http://doi.org/10.4018/JGIM.294329

APA

Shih, H., Lai, K., Guo, X., Guo, X., & Cheng, T. C. (2021). Believe It or Not: Employees Intend to Comply With Information Security Policy Because of the Desire for Trade-Offs. Journal of Global Information Management (JGIM), 29(6), 1-20. http://doi.org/10.4018/JGIM.294329

Chicago

Shih, Hung-Pin, et al. "Believe It or Not: Employees Intend to Comply With Information Security Policy Because of the Desire for Trade-Offs," Journal of Global Information Management (JGIM) 29, no.6: 1-20. http://doi.org/10.4018/JGIM.294329

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Most theories of information security policy (ISP), except a few focused on the insider-centric view, are grounded in the control-centric perspective, and most ISP compliance models stem from Western countries. Regulatory focus theory (RFT) proposes two modes of motivational regulation, promotion and prevention focused that are supposed to motivate employee compliance in a trade-off. Culture is crucial to the study of ISP that puts control over human connections. Chinese guanxi, a specific dimension of Chinese culture, is better understood underlying the trust-distrust frame. To bridge the theoretical gap between the control-centric and the insider-centric perspectives, we develop an ISP behavioral model by taking an integrated approach from RFT and the trust-distrust frame. We employed scenario-based events about information security misconduct in the workplace to examine employees’ compliance intention and non-violation choice of ISP upon counterfactual thinking. Our empirical results improve the theoretical and practical implications of security practices.