Line 17: |
Line 17: |
| Commitment refers to a person’s subjective notion and commitment towards socially accepted goals. | | Commitment refers to a person’s subjective notion and commitment towards socially accepted goals. |
| Involvement deals with individual’s dealing with conventional activities like family, work, social gatherings. | | Involvement deals with individual’s dealing with conventional activities like family, work, social gatherings. |
− | Finally individual with strong personal norms and value systems are less likely to engage in any deviant behavior. | + | Finally individual with strong personal norms and value systems are less likely to engage in any deviant behavior. |
| + | In IS literature this theory is mostly used to IS Security literature to understand employee's deviant behavior. |
| | | |
| == Diagram/schematic of theory == | | == Diagram/schematic of theory == |
Line 35: |
Line 36: |
| | | |
| == Links from this theory to other theories == | | == Links from this theory to other theories == |
− | N/A
| + | [[Social learning theory]] |
| | | |
| == IS articles that use the theory == | | == IS articles that use the theory == |
| + | Theoharidou, M., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2005). The insider threat to information systems and the effectiveness of ISO17799. Computers & Security, 24(6), 472-484. |
| + | |
| Cheng, L., Li, Y., Li, W., Holm, E., & Zhai, Q. (2013). Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39, 447-459. | | Cheng, L., Li, Y., Li, W., Holm, E., & Zhai, Q. (2013). Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39, 447-459. |
| | | |
− | Theoharidou, M., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2005). The insider threat to information systems and the effectiveness of ISO17799. Computers & Security, 24(6), 472-484.
| + | Ifinedo, P. (2014). Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information & Management, 51(1), 69-79 |
| | | |
− | Ifinedo, P. (2014). Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information & Management, 51(1), 69-79
| + | Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. computers & security, 56, 70-82. |
| | | |
| == Contributor(s) == | | == Contributor(s) == |
Line 48: |
Line 51: |
| | | |
| == Date last updated == | | == Date last updated == |
| + | |
| + | 28th February 2017 |