References
- Y. Hong and S. Furnell, "Motivating information security policy compliance: Insights from perceived organizational formalization," J. of Computer Information Systems, vol. 62, no. 1, 2022, pp. 19-28. https://doi.org/10.1080/08874417.2019.1683781
- GrandViewResearch, "2022 cyber security market size, share & trends analysis report by component, by security type, by solution, by services, by deployment, by organization size, by applications, by region, and segment forecasts, 2023-2030," Report, Dec. 2022.
- Z. Tang, A. S. Miller, Z. Zhou, and M. Warkentin, "Does government social media promote users' information security behavior towards COVID-19 scams? Cultivation effects and protective motivations," Government Information Quarterly, vol. 38, no. 2, 2021, pp. 101572.
- I. Hwang, "The effect on the IS role stress on the IS compliance intention through IS self-determination: Focusing on the moderation of person-organization fit," J. of the Korea Institute of Electronic Communication Sciences, vol. 17, no. 2, 2022, pp. 375-386.
- Verizon, "2021 data breach investigations report," Report, Dec. 2021.
- C. Liu, H. Liang, N. Wang, and Y. Xue, "Ensuring employees' information security policy compliance by carrot and stick: The moderating roles of organizational commitment and gender," Information Technology & People, vol. 35, no. 2, 2021, pp. 802-834. https://doi.org/10.1108/ITP-09-2019-0452
- M. I. Merhi and P. Ahluwalia, "Examining the impact of deterrence factors and norms on resistance to information systems security," Computers in Human Behavior, vol. 92, 2019, pp. 37-46. https://doi.org/10.1016/j.chb.2018.10.031
- B. Bulgurcu, H. Cavusoglu, and I. Benbasat, "Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness," MIS Quarterly, vol. 34, no. 3, 2010, pp. 523-548. https://doi.org/10.2307/25750690
- T. Herath and H. R. Rao, "Protection motivation and deterrence: A framework for security policy compliance in organisations," European J. of Information Systems, vol. 18, 2009, pp. 106-125. https://doi.org/10.1057/ejis.2009.6
- S. Hong and J. Park, "Effective management of personal information & information security management system(ISMS-P) authentication systems," J. of the Korea Academia-Industrial Cooperation Society, vol. 21, no. 1, 2020, pp. 634-640.
- Nettgov, "Biden administration releases draft zero-trust guidance," Report, Sept. 2021.
- J. D'Arcy and P. L. Teh, "Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization," Information & Management, vol. 56, no. 7, 2019, pp. 103151.
- Y. Chen, K. Ramamurthy, and K. W. Wen, "Organizations' information security policy compliance: Stick or carrot approach?," J. of Management Information Systems, vol. 29, no. 3, 2012, pp. 157-188. https://doi.org/10.2753/MIS0742-1222290305
- H. Li, R. Sarathy, J. Zhang, and X. Luo, "Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance," Information Systems J., vol. 24, no. 6, 2014, pp. 479-502. https://doi.org/10.1111/isj.12037
- K. A. Alshare, P. L. Lane, and M. R. Lane, "Information security policy compliance: A higher education case study," Information & Computer Security, vol. 26 no. 1, 2018, pp. 91-108. https://doi.org/10.1108/ICS-09-2016-0073
- W. Lee and I. Hwang, "Sustainable information security behavior management: An empirical approach for the causes of employees' voice behavior," Sustainability, vol. 13, no. 11, 2021, pp. 6077.
- H. Zhang and N. C. Agarwal, "The mediating roles of organizational justice on the relationships between HR practices and workplace outcomes: An investigation in China," The Int. J. of Human Resource Management, vol. 20, no. 3, 2009, pp. 676-693. https://doi.org/10.1080/09585190802707482
- T. A. Judge and J. A. Colquitt, "Organizational justice and stress: The mediating role of work-family conflict," J. of Applied Psychology, vol. 89, no. 3, 2004, pp. 395-404. https://doi.org/10.1037/0021-9010.89.3.395
- I. Hwang, "Reinforcement of IS voice behavior within the organization: A perspective on mitigating role stress through organization justice and individual social-identity," J. of the Korea Institute of Electronic Communication Sciences, vol. 17, no. 4, 2022, pp. 649-662.
- M. L. Ambrose and M. Schminke, "The role of overall justice judgments in organizational justice research: A test of mediation," J. of Applied Psychology, vol. 94, no. 2, 2009, pp. 491-500. https://doi.org/10.1037/a0013203
- J. Son, "Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies," Information & Management, vol. 48, no. 7, 2011, pp. 296-302. https://doi.org/10.1016/j.im.2011.07.002
- K. H. Guo, Y. Yuan, N. P. Archer, and C. E. Connelly, "Understanding nonmalicious security violations in the workplace: A composite behavior model," J. of Management Information Systems, vol. 28, no. 2, 2011, pp. 203-236. https://doi.org/10.2753/MIS0742-1222280208
- Y. Xue, H. Liang, and L. Wu, "Punishment, justice, and compliance in mandatory IT settings," Information Systems Research, vol. 22, no. 2, 2011, pp. 400-414. https://doi.org/10.1287/isre.1090.0266
- L. Jaeger and A. Eckhardt, "Eyes wide open: The role of situational information security awareness for security related behaviour," Information Systems J., vol. 31, no. 3, 2021, pp. 429-472. https://doi.org/10.1111/isj.12317
- L. Li, W. He, L. Xu, I. Ash, M. Anwar, and X. Yuan, "Investigating the impact of cybersecurity policy awareness on employees' cybersecurity behavior," Int. J. of Information Management, vol. 45, 2019, pp. 13-24. https://doi.org/10.1016/j.ijinfomgt.2018.10.017
- J. D'Arcy, T. Herath, and M. K. Shoss, "Understanding employee responses to stressful information security requirements: A coping perspective," J. of Management Information Systems, vol. 31, no. 2, 2014, pp. 285-318. https://doi.org/10.2753/MIS0742-1222310210
- R. Cropanzano, L. Paddock, D. E. Rupp, J. Bagger, and A. Baldwin, "How regulatory focus impacts the process-by-outcome interaction for perceived fairness and emotions," Organizational Behavior and Human Decision Processes, vol. 105, no. 1, 2008, pp. 36-51. https://doi.org/10.1016/j.obhdp.2006.06.003
- M. Schmitt, M. Gollwitzer, J. Maes, and D. Arbach, "Justice sensitivity," European J. of Psychological Assessment, vol. 21, no. 3, 2005, pp. 202-211. https://doi.org/10.1027/1015-5759.21.3.202
- M. Gollwitzer, T. Rothmund, A. Pfeiffer, and C. Ensenbach, "Why and when justice sensitivity leads to pro-and antisocial behavior," J. of Research in Personality, vol. 43, no. 6, 2009, pp. 999-1005. https://doi.org/10.1016/j.jrp.2009.07.003
- J. C. Nunnally, Psychometric theory (2nd ed.). New York: McGraw-Hill, 1978.
- C. Fornell and D. F. Larcker, "Evaluating structural equation models with unobservable variables and measurement error," J. of Marketing Research, vol. 18, no. 1, 1981, pp. 39-50. https://doi.org/10.1177/002224378101800104
- A. F. Hayes, Introduction to mediation, moderation, and conditional process analysis: A regression-based approach. New York: Guilford Publications, 2017.