Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders’ Awareness of Organizational SETA Efforts
ABSTRACT In contemporary organizations, the protection of an organization's information assets is reliant on the behavior of those entrusted with access to organizational information and information systems (IS). Because of this reliance, organizations increasingly prioritize the training and e...
Gespeichert in:
Veröffentlicht in: | Decision sciences 2018-12, Vol.49 (6), p.1187-1228 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1228 |
---|---|
container_issue | 6 |
container_start_page | 1187 |
container_title | Decision sciences |
container_volume | 49 |
creator | Burns, A. J. Roberts, Tom L. Posey, Clay Bennett, Rebecca J. Courtney, James F. |
description | ABSTRACT
In contemporary organizations, the protection of an organization's information assets is reliant on the behavior of those entrusted with access to organizational information and information systems (IS). Because of this reliance, organizations increasingly prioritize the training and education of employees through security education, training, and awareness (SETA) initiatives. Through expectancy theory and its central components of valence, instrumentality, and expectancy (VIE), we investigate the role of insiders’ awareness of organizational SETA efforts on two similar, yet distinct, security‐related intentions: intention to comply with information security policies (ISPs) and intention to protect the organization's information assets from their threats. Not only do we show how distinct these two concepts are from a quantitative standpoint, we also demonstrate differences between insiders’ compliance and protection intentions, as well as their motivational antecedents. Moreover, we demonstrate how our powerful, yet parsimonious, model based on expectancy theory explains a significant portion of the variance in these two important concepts: 52.7% in intentions to comply with ISPs and 68.1% in intentions to protect organizational information assets. We discuss the implications of our findings for research and practice and offer future research opportunities. |
doi_str_mv | 10.1111/deci.12304 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2160689315</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2160689315</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3334-e144ad8ab7da4f7678e336412d244af122329d03003c8d76544e354872c7c9cc3</originalsourceid><addsrcrecordid>eNp9kbtOwzAYhS0EEqWw8ASW2JBS7Ni5lC0qASpVKhJt18g4f9pUqV1sV1WYeA0m3o0nwaEsLHixrPP9l-OD0CUlA-rPTQmyHtCQEX6EejTiJIiGNDpGPUIoDRJGo1N0Zu2aEBJHnPXQ51g5UK7WymKn8Uhvtk2LF2DszuK_2pPRDqS7xRlejHM8W4E2Lc62W6OFXHXEXJW-0AlV1mqJ3Qp8h6rZgZKAdeUftu6Ar_cPnO2FAQXWdsLULIWq30Q3SjT4OZ9lOK8qbZw9RyeVaCxc_N59NL_PZ6PHYDJ9GI-ySSAZYzwAyrkoU_GSlIJXSZykwFjMaViGXqhoGLJwWBJGCJNpmXjvHFjE0ySUiRxKyfro6tDXu3ndgXXFWu-M38YWIY1JnA7933nq-kBJo601UBVbU2-EaQtKii6Aogug-AnAw_QA7-sG2n_I4i4fjQ813xiCie4</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2160689315</pqid></control><display><type>article</type><title>Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders’ Awareness of Organizational SETA Efforts</title><source>Wiley Online Library - AutoHoldings Journals</source><source>EBSCOhost Business Source Complete</source><creator>Burns, A. J. ; Roberts, Tom L. ; Posey, Clay ; Bennett, Rebecca J. ; Courtney, James F.</creator><creatorcontrib>Burns, A. J. ; Roberts, Tom L. ; Posey, Clay ; Bennett, Rebecca J. ; Courtney, James F.</creatorcontrib><description>ABSTRACT
In contemporary organizations, the protection of an organization's information assets is reliant on the behavior of those entrusted with access to organizational information and information systems (IS). Because of this reliance, organizations increasingly prioritize the training and education of employees through security education, training, and awareness (SETA) initiatives. Through expectancy theory and its central components of valence, instrumentality, and expectancy (VIE), we investigate the role of insiders’ awareness of organizational SETA efforts on two similar, yet distinct, security‐related intentions: intention to comply with information security policies (ISPs) and intention to protect the organization's information assets from their threats. Not only do we show how distinct these two concepts are from a quantitative standpoint, we also demonstrate differences between insiders’ compliance and protection intentions, as well as their motivational antecedents. Moreover, we demonstrate how our powerful, yet parsimonious, model based on expectancy theory explains a significant portion of the variance in these two important concepts: 52.7% in intentions to comply with ISPs and 68.1% in intentions to protect organizational information assets. We discuss the implications of our findings for research and practice and offer future research opportunities.</description><identifier>ISSN: 0011-7315</identifier><identifier>EISSN: 1540-5915</identifier><identifier>DOI: 10.1111/deci.12304</identifier><language>eng</language><publisher>Atlanta: American Institute for Decision Sciences</publisher><subject>Assets ; Behavior ; Compliance ; Cybersecurity ; Education ; Expectancy theories ; Expectancy Theory ; Information systems ; Organizations ; Policy Compliance ; Reliance ; Security Intentions ; Security Training ; Training ; VIE Theory</subject><ispartof>Decision sciences, 2018-12, Vol.49 (6), p.1187-1228</ispartof><rights>2017 Decision Sciences Institute</rights><rights>2018 Decision Sciences Institute</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c3334-e144ad8ab7da4f7678e336412d244af122329d03003c8d76544e354872c7c9cc3</citedby><cites>FETCH-LOGICAL-c3334-e144ad8ab7da4f7678e336412d244af122329d03003c8d76544e354872c7c9cc3</cites><orcidid>0000-0001-8222-4144</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1111%2Fdeci.12304$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1111%2Fdeci.12304$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,780,784,1417,27924,27925,45574,45575</link.rule.ids></links><search><creatorcontrib>Burns, A. J.</creatorcontrib><creatorcontrib>Roberts, Tom L.</creatorcontrib><creatorcontrib>Posey, Clay</creatorcontrib><creatorcontrib>Bennett, Rebecca J.</creatorcontrib><creatorcontrib>Courtney, James F.</creatorcontrib><title>Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders’ Awareness of Organizational SETA Efforts</title><title>Decision sciences</title><description>ABSTRACT
In contemporary organizations, the protection of an organization's information assets is reliant on the behavior of those entrusted with access to organizational information and information systems (IS). Because of this reliance, organizations increasingly prioritize the training and education of employees through security education, training, and awareness (SETA) initiatives. Through expectancy theory and its central components of valence, instrumentality, and expectancy (VIE), we investigate the role of insiders’ awareness of organizational SETA efforts on two similar, yet distinct, security‐related intentions: intention to comply with information security policies (ISPs) and intention to protect the organization's information assets from their threats. Not only do we show how distinct these two concepts are from a quantitative standpoint, we also demonstrate differences between insiders’ compliance and protection intentions, as well as their motivational antecedents. Moreover, we demonstrate how our powerful, yet parsimonious, model based on expectancy theory explains a significant portion of the variance in these two important concepts: 52.7% in intentions to comply with ISPs and 68.1% in intentions to protect organizational information assets. We discuss the implications of our findings for research and practice and offer future research opportunities.</description><subject>Assets</subject><subject>Behavior</subject><subject>Compliance</subject><subject>Cybersecurity</subject><subject>Education</subject><subject>Expectancy theories</subject><subject>Expectancy Theory</subject><subject>Information systems</subject><subject>Organizations</subject><subject>Policy Compliance</subject><subject>Reliance</subject><subject>Security Intentions</subject><subject>Security Training</subject><subject>Training</subject><subject>VIE Theory</subject><issn>0011-7315</issn><issn>1540-5915</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNp9kbtOwzAYhS0EEqWw8ASW2JBS7Ni5lC0qASpVKhJt18g4f9pUqV1sV1WYeA0m3o0nwaEsLHixrPP9l-OD0CUlA-rPTQmyHtCQEX6EejTiJIiGNDpGPUIoDRJGo1N0Zu2aEBJHnPXQ51g5UK7WymKn8Uhvtk2LF2DszuK_2pPRDqS7xRlejHM8W4E2Lc62W6OFXHXEXJW-0AlV1mqJ3Qp8h6rZgZKAdeUftu6Ar_cPnO2FAQXWdsLULIWq30Q3SjT4OZ9lOK8qbZw9RyeVaCxc_N59NL_PZ6PHYDJ9GI-ySSAZYzwAyrkoU_GSlIJXSZykwFjMaViGXqhoGLJwWBJGCJNpmXjvHFjE0ySUiRxKyfro6tDXu3ndgXXFWu-M38YWIY1JnA7933nq-kBJo601UBVbU2-EaQtKii6Aogug-AnAw_QA7-sG2n_I4i4fjQ813xiCie4</recordid><startdate>201812</startdate><enddate>201812</enddate><creator>Burns, A. J.</creator><creator>Roberts, Tom L.</creator><creator>Posey, Clay</creator><creator>Bennett, Rebecca J.</creator><creator>Courtney, James F.</creator><general>American Institute for Decision Sciences</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7TB</scope><scope>8BJ</scope><scope>8FD</scope><scope>FQK</scope><scope>FR3</scope><scope>JBE</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-8222-4144</orcidid></search><sort><creationdate>201812</creationdate><title>Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders’ Awareness of Organizational SETA Efforts</title><author>Burns, A. J. ; Roberts, Tom L. ; Posey, Clay ; Bennett, Rebecca J. ; Courtney, James F.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3334-e144ad8ab7da4f7678e336412d244af122329d03003c8d76544e354872c7c9cc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Assets</topic><topic>Behavior</topic><topic>Compliance</topic><topic>Cybersecurity</topic><topic>Education</topic><topic>Expectancy theories</topic><topic>Expectancy Theory</topic><topic>Information systems</topic><topic>Organizations</topic><topic>Policy Compliance</topic><topic>Reliance</topic><topic>Security Intentions</topic><topic>Security Training</topic><topic>Training</topic><topic>VIE Theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Burns, A. J.</creatorcontrib><creatorcontrib>Roberts, Tom L.</creatorcontrib><creatorcontrib>Posey, Clay</creatorcontrib><creatorcontrib>Bennett, Rebecca J.</creatorcontrib><creatorcontrib>Courtney, James F.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>International Bibliography of the Social Sciences (IBSS)</collection><collection>Technology Research Database</collection><collection>International Bibliography of the Social Sciences</collection><collection>Engineering Research Database</collection><collection>International Bibliography of the Social Sciences</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Decision sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Burns, A. J.</au><au>Roberts, Tom L.</au><au>Posey, Clay</au><au>Bennett, Rebecca J.</au><au>Courtney, James F.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders’ Awareness of Organizational SETA Efforts</atitle><jtitle>Decision sciences</jtitle><date>2018-12</date><risdate>2018</risdate><volume>49</volume><issue>6</issue><spage>1187</spage><epage>1228</epage><pages>1187-1228</pages><issn>0011-7315</issn><eissn>1540-5915</eissn><abstract>ABSTRACT
In contemporary organizations, the protection of an organization's information assets is reliant on the behavior of those entrusted with access to organizational information and information systems (IS). Because of this reliance, organizations increasingly prioritize the training and education of employees through security education, training, and awareness (SETA) initiatives. Through expectancy theory and its central components of valence, instrumentality, and expectancy (VIE), we investigate the role of insiders’ awareness of organizational SETA efforts on two similar, yet distinct, security‐related intentions: intention to comply with information security policies (ISPs) and intention to protect the organization's information assets from their threats. Not only do we show how distinct these two concepts are from a quantitative standpoint, we also demonstrate differences between insiders’ compliance and protection intentions, as well as their motivational antecedents. Moreover, we demonstrate how our powerful, yet parsimonious, model based on expectancy theory explains a significant portion of the variance in these two important concepts: 52.7% in intentions to comply with ISPs and 68.1% in intentions to protect organizational information assets. We discuss the implications of our findings for research and practice and offer future research opportunities.</abstract><cop>Atlanta</cop><pub>American Institute for Decision Sciences</pub><doi>10.1111/deci.12304</doi><tpages>42</tpages><orcidid>https://orcid.org/0000-0001-8222-4144</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0011-7315 |
ispartof | Decision sciences, 2018-12, Vol.49 (6), p.1187-1228 |
issn | 0011-7315 1540-5915 |
language | eng |
recordid | cdi_proquest_journals_2160689315 |
source | Wiley Online Library - AutoHoldings Journals; EBSCOhost Business Source Complete |
subjects | Assets Behavior Compliance Cybersecurity Education Expectancy theories Expectancy Theory Information systems Organizations Policy Compliance Reliance Security Intentions Security Training Training VIE Theory |
title | Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders’ Awareness of Organizational SETA Efforts |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T17%3A32%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Intentions%20to%20Comply%20Versus%20Intentions%20to%20Protect:%20A%20VIE%20Theory%20Approach%20to%20Understanding%20the%20Influence%20of%20Insiders%E2%80%99%20Awareness%20of%20Organizational%20SETA%20Efforts&rft.jtitle=Decision%20sciences&rft.au=Burns,%20A.%20J.&rft.date=2018-12&rft.volume=49&rft.issue=6&rft.spage=1187&rft.epage=1228&rft.pages=1187-1228&rft.issn=0011-7315&rft.eissn=1540-5915&rft_id=info:doi/10.1111/deci.12304&rft_dat=%3Cproquest_cross%3E2160689315%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2160689315&rft_id=info:pmid/&rfr_iscdi=true |