ATTENTION: The works hosted here are being migrated to a new repository that will consolidate resources, improve discoverability, and better show UTA's research impact on the global community. We will update authors as the migration progresses. Please see MavMatrix for more information.
Show simple item record
dc.contributor.advisor | Wang, Jingguo | |
dc.creator | Yazdanmehr, Adel | |
dc.date.accessioned | 2023-09-11T13:33:31Z | |
dc.date.available | 2023-09-11T13:33:31Z | |
dc.date.created | 2017-08 | |
dc.date.submitted | August 2017 | |
dc.identifier.uri | http://hdl.handle.net/10106/31638 | |
dc.description.abstract | Motivating employees to comply with information security policies (ISP) is a major
challenge for organizations. Employees who do not comply with these policies can impose a
serious threat to the safety of organizational information assets. Information security scholars
drawing upon several theories have investigated various factors that can help motivate employees
to comply with the ISP. Among many factors, social influence proved to be an effective force in
motivating employee compliance behavior. However, its role and various effects on employee
ISP compliance as well as its utilization mechanisms have not been deeply investigated.
This dissertation is a collection of three papers addressing a series of related questions
including (1) through which psychological processes social influence may be internalized and
then affect employee compliance; (2) how social influence, at both organizational micro and
macro level, alter the effectiveness of well-established motivational rule-following models; and
finally (3) how we can utilize social influence to successfully motivate employees to comply.
Accordingly, the first essay focuses on how personal norms regarding ISP affect employee
compliance. In particular, it examines how such norms are shaped and activated to motivate
employee compliance. In addition, the second essay introduces a social contingency model
proposing that the well-established rule-following approaches of command-and-control and self-
5
regulatory are contingent upon organizational rules ethical climate as well as employee
susceptibility to interpersonal influence. Finally, the third essay discusses the role of collective
responsibility and peer monitoring in motivating ISP compliance. | |
dc.format.mimetype | application/pdf | |
dc.language.iso | en_US | |
dc.subject | Information Security Policy Compliance | |
dc.subject | Norm Activation Theory | |
dc.subject | Social Influence | |
dc.subject | Command-and-Control | |
dc.subject | Self-Regulatory | |
dc.subject | Susceptibility to Interpersonal Influence | |
dc.subject | Peer Monitoring | |
dc.subject | Collective Responsibility | |
dc.title | THREE ESSAYS ON INFORMATION SECURITY POLICY COMPLIANCE: THE ROLE OF SOCIAL INFLUENCE | |
dc.type | Thesis | |
dc.date.updated | 2023-09-11T13:33:32Z | |
thesis.degree.department | Information Systems and Operations Management | |
thesis.degree.grantor | The University of Texas at Arlington | |
thesis.degree.level | Doctoral | |
thesis.degree.name | Doctor of Philosophy in Information Systems | |
dc.type.material | text | |
dc.creator.orcid | 0000-0001-6815-2965 | |
Files in this item
- Name:
- YAZDANMEHR-DISSERTATION-2017.pdf
- Size:
- 812.8Kb
- Format:
- PDF
This item appears in the following Collection(s)
Show simple item record