Changes

Jump to navigation Jump to search
304 bytes added ,  11:34, 1 March 2017
Line 17: Line 17:  
Commitment refers to a person’s  subjective notion and commitment towards socially accepted goals.  
 
Commitment refers to a person’s  subjective notion and commitment towards socially accepted goals.  
 
Involvement deals with individual’s dealing with conventional activities like family, work, social gatherings.
 
Involvement deals with individual’s dealing with conventional activities like family, work, social gatherings.
Finally individual with strong personal norms and value systems are less likely to engage in any deviant behavior.  
+
Finally individual with strong personal norms and value systems are less likely to engage in any deviant behavior.
 +
In IS literature this theory is mostly used to IS Security literature to understand employee's deviant behavior. 
    
== Diagram/schematic of theory ==
 
== Diagram/schematic of theory ==
Line 35: Line 36:     
== Links from this theory to other theories ==
 
== Links from this theory to other theories ==
N/A
+
[[Social learning theory]]
    
== IS articles that use the theory ==
 
== IS articles that use the theory ==
 +
Theoharidou, M., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2005). The insider threat to information systems and the effectiveness of ISO17799. Computers & Security, 24(6), 472-484.
 +
 
Cheng, L., Li, Y., Li, W., Holm, E., & Zhai, Q. (2013). Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39, 447-459.
 
Cheng, L., Li, Y., Li, W., Holm, E., & Zhai, Q. (2013). Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39, 447-459.
   −
Theoharidou, M., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2005). The insider threat to information systems and the effectiveness of ISO17799. Computers & Security, 24(6), 472-484.
+
Ifinedo, P. (2014). Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information & Management, 51(1), 69-79
   −
Ifinedo, P. (2014). Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information & Management, 51(1), 69-79
+
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. computers & security, 56, 70-82.
    
== Contributor(s) ==
 
== Contributor(s) ==
Line 48: Line 51:     
== Date last updated ==
 
== Date last updated ==
 +
 +
28th February 2017
13

edits

Navigation menu