Study | Antecedents of Security | Dependent variable | Respondents |
---|---|---|---|
[79] | Mandatoriness | Precautions Taken | Employees (system Users) |
[80] | Mimetic Pressure, Coercive Pressure, Normative Pressure | Level of information security control resources | Employees (system Users) |
[81] | Perceived certainty and severity of sanctions, Attachment, Commitment, Involvement, Belief, Subjective Norm, Co-worker Behavior | IS security policyviolation Intention | Employees (system Users) |
[11] | Perceived certainty of sanctions, PerceivedSeverity of sanctions, | IS misuse intention | Employees (system Users) |
[82] | Self-Efficacy, Attitude, Normative Beliefs | Intention to resist social engineering | Employees (system Users) |
[83] | Organizational Sanctions, Workgroup sanctions | intention to violate information security | Employees (system Users) |
[67] | Organizational commitment, Self-Efficacy, Security Policy Attitude, Punishment Severity, Detection Certainty, Subjective Norm, Descriptive Norm. | Security Policy Compliance Intention | Employees (system Users) |
[84] | Self-control | Information Security Violations | Undergraduate students |
[85] | Perceived vulnerability, Perceived severity, Response efficacy, Response cost, Self-efficacy, Attitude towardcompliance with ISSP, Subjective norms | Information security compliancebehavioral intention | business managers and IS professionals |
[68] | Attitude toward information security compliance, Subjective norms, self-efficacy, Locus of control | compliance behavioral intentions | Employees (system Users) |
[86] | Perceived threat Severity and certainty, ResponseEfficacy, Self-Efficacy, Perceived Cost, Vendor support, IT Budget, Firm Size | Intention to Adopt Anti-malware by SME Executives | Information systems experts |
[87] | Perceived susceptibility, Perceived severity, Perceived benefits, Perceived barriers, Cues to action, General security orientation, Self-efficacy, | Computer security behavior | Employees (system Users) |
[88] | Conservative Behavior, Exposure to Offence, Risk Perception | IS users’ risky behaviors threatening information security | IS users’ |
[89] | Self-Efficacy in Information Security | Security Practice Technology, Intention to Strengthen Security Effort, Security Practice Care Behavior | Business management students |
[90] | Severity, Vulnerability, Response efficacy, Self-efficacy, Attitude, Normative beliefs, Rewards | Intention to comply with information security policies | Employees (system Users) |
[91] | Intention, Trust, Organization Support, | Information security knowledge sharing | Employees (system Users) |
[92] | Attitude, subjective norm, behavioral control, Threat appraisal, Self-Efficacy | Information security conscious care behavior | Employees (system Users) |
[93] | Information security knowledge sharing, Information security collaboration, Information security intervention, Information security experience, Attachment, Commitment, Personal norms, Attitude | attitude towards compliance with information security policy compliance | Employees (system Users) |
[94] | Perceived severity, Perceived vulnerability, Response efficacy, Self-efficacy, Perceived realism, Response cost, Rewards | Intention to IS security compliance | Employees (system Users) |
[16] | Data Evaluation, Risk Analysis, Training, Integration, Policies, Legislation/Regulation, Architecture | Human Resource IS security | No data collection/No respondents |