Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
173 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

The impact of an employee's psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation (2307.02916v1)

Published 6 Jul 2023 in cs.CY

Abstract: Despite the rapid rise in social engineering attacks, not all employees are as compliant with information security policies (ISPs) to the extent that organisations expect them to be. ISP non-compliance is caused by a variety of psychological motivation. This study investigates the effect of psychological contract breach (PCB) of employees on ISP compliance intention (ICI) by dividing them into intrinsic and extrinsic motivation using the theory of planned behaviour (TPB) and the general deterrence theory (GDT). Data analysis from UK employees (\textit{n=206}) showed that the higher the PCB, the lower the ICI. The study also found that PCBs significantly reduced intrinsic motivation (attitude and perceived fairness) for ICI, whereas PCBs did not moderate the relationship between extrinsic motivation (sanction severity and sanctions certainty) and ICI. As a result, this study successfully addresses the risks of PCBs in the field of IS security and proposes effective solutions for employees with high PCBs.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (55)
  1. The relationship between psychological contract breach and job-related attitudes within a manufacturing plant. SAGE Open, 9(1):2158244018822179, 2019. ISSN 2158-2440.
  2. Sherly Abraham. Information security behavior: Factors and research directions, 2011.
  3. Psychological contract and organizational misbehavior: Exploring the moderating and mediating effects of organizational health and psychological contract breach in iraqi oil tanks company. Cogent Business and Management, 6(1):1683123, 2019. ISSN 2331-1975.
  4. Rose Alinda Alias et al. Information security policy compliance: Systematic literature review. Procedia Computer Science, 161:1216–1224, 2019.
  5. Moneer Alshaikh. Developing cybersecurity culture to influence employee behavior: A practice perspective. Computers & Security, 98:102003, 2020.
  6. Information security policy compliance: Investigating the role of intrinsic motivation towards policy compliance in the organisation. In 2018 4th International Conference on Information Management (ICIM), pages 125–132. IEEE, 2018.
  7. Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672, 2019.
  8. Psychological contract breach and work performance: is social exchange a buffer or an intensifier? Journal of Managerial Psychology, 2010. ISSN 0268-3946.
  9. Dynamics of psychological contracts with work engagement and turnover intention: The influence of organizational tenure. European Journal of Work and Organizational Psychology, 22(1):107–122, 2013. ISSN 1359-432X.
  10. Intrinsic and extrinsic motivation. The review of economic studies, 70(3):489–520, 2003.
  11. Psychological contracts in local government: A preliminary survey. Review of public personnel administration, 23(4):267–285, 2003.
  12. Psychological contract, job satisfaction, commitment, and turnover intention: Exploring the moderating role of psychological contract breach in national collegiate athletic association coaches. International Journal of Sports Science & Coaching, 14(3):273–284, 2019.
  13. Timothy A Brown. Confirmatory factor analysis for applied research. Guilford publications, 2015.
  14. Roles of information security awareness and perceived fairness in information security policy compliance. AMCIS 2009 Proceedings, page 419, 2009.
  15. Quality and fairness of an information security policy as antecedents of employees’ security engagement in the workplace: An empirical investigation. In 2010 43rd Hawaii International Conference on System Sciences, pages 1–7. IEEE, 2010.
  16. Information security policy compliance: the role of fairness, commitment, and cost beliefs. In MCIS 2011 Proceedings, 2011.
  17. Holly H Chiu. Employees’ intrinsic and extrinsic motivations in innovation implementation: The moderation role of managers’ persuasive and assertive strategies. Journal of Change Management, 18(3):218–239, 2018.
  18. Mark Conner. Theory of planned behavior. Handbook of sport psychology, pages 1–18, 2020.
  19. Perceived contract violation and job satisfaction: buffering roles of emotion regulation skills and work-related self-efficacy. International Journal of Organizational Analysis, 2019. ISSN 1934-8835.
  20. When i’m 64: Psychological contract breach, work motivation and the moderating roles of future time perspective and regulatory focus. Work & Stress, 25(4):338–354, 2011.
  21. Everyday cyber security in organisations, 2018.
  22. Analysis of water level changes in lake urmia based on data characteristics and non-parametric test. International Journal of Hydrology Science and Technology, 4(1):18–38, 2014.
  23. Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. computers & security, 59:26–44, 2016.
  24. An integrative model of information security policy compliance with psychological contract: Examining a bilateral perspective. Computers & Security, 66:52–65, 2017a. ISSN 0167-4048.
  25. An integrative model of information security policy compliance with psychological contract: Examining a bilateral perspective. Computers & Security, 66:52–65, 2017b. ISSN 0167-4048.
  26. What drives perceived fairness of performance appraisal? exploring the effects of psychological contract fulfillment on employees’ perceived fairness of performance appraisal in us federal agencies. Public Personnel Management, 44(2):214–238, 2015.
  27. Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2):154–165, 2009a.
  28. Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems, 18(2):106–125, 2009b.
  29. Princely Ifinedo. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1):83–95, 2012.
  30. ISF. Human-centred security, 2020. URL https://www.securityforum.org/human-centred-security-positively-influencing-security-behaviour/.
  31. Douglas J Landoll. Information Security Policies, Procedures, and Standards: A Practitioner’s Reference. CRC Press, 2017.
  32. John Leach. Improving user security behaviour. Computers & Security, 22(8):685–692, 2003. ISSN 0167-4048.
  33. Employees’ information security awareness and behavior: A literature review. In 2013 46th Hawaii International Conference on System Sciences, pages 2978–2987. IEEE, 2013.
  34. Information security awareness and behavior: a theory-based literature review. Management Research Review, 2014.
  35. User resistance to the implementation of information systems: A psychological contract breach perspective. Journal of the Association for Information Systems, 19(4):2, 2018. ISSN 1536-9323.
  36. The relationships between job insecurity, psychological contract breach and counterproductive workplace behavior. Personnel Review, 2019. ISSN 0048-3486.
  37. Examining the effects of turnover intentions on organizational citizenship behaviors and deviance behaviors: A psychological contract approach. Journal of Applied Psychology, 101(8):1067, 2016a. ISSN 1939-1854.
  38. Examining the effects of turnover intentions on organizational citizenship behaviors and deviance behaviors: A psychological contract approach. Journal of Applied Psychology, 101(8):1067, 2016b.
  39. Influence of intrinsic and extrinsic motivation on employee’s task performance. Studies in Asian social science, 4(1):38–43, 2017.
  40. When employees feel betrayed: A model of how psychological contract violation develops. Academy of management Review, 22(1):226–256, 1997.
  41. MRC. What thresholds should i use for factor loading cut-offs?, 2013. URL https://imaging.mrc-cbu.cam.ac.uk/statswiki/FAQ/thresholds.
  42. Information security policy compliance behavior based on comprehensive dimensions of information security culture: A conceptual framework. In Proceedings of the 2017 International Conference on Information System and Data Mining, pages 56–60, 2017.
  43. The impact of psychological contract violation on employee attitudes and behaviour. Employee Relations, 2003. ISSN 0142-5455.
  44. Sandra L Robinson. Trust and breach of the psychological contract. Administrative science quarterly, pages 574–599, 1996.
  45. Violating the psychological contract: Not the exception but the norm. Journal of organizational behavior, 15(3):245–259, 1994.
  46. The development of psychological contract breach and violation: A longitudinal study. Journal of organizational Behavior, 21(5):525–546, 2000. ISSN 0894-3796.
  47. Changing obligations and the psychological contract: A longitudinal study. Academy of management Journal, 37(1):137–152, 1994.
  48. Denise M Rousseau. Psychological and implied contracts in organizations. Employee responsibilities and rights journal, 2(2):121–139, 1989.
  49. Deterrence and prevention-based model to mitigate information security insider threats in organisations. Future Generation Computer Systems, 97:587–597, 2019.
  50. Identifying factors that influence employees’ security behavior for enhancing isp compliance. In International Conference on Trust and Privacy in Digital Business, pages 169–179. Springer, 2015.
  51. The mediating role of psychological contract violation between psychological contract breach and nurses’ organizational attitudes. Nursing economics, 34(6):296–303, 2016. ISSN 0746-1739.
  52. The role of remediation in mitigating the negative consequences of psychological contract breach: a qualitative study in the banking sector. Journal of Change Management, 20(3):264–282, 2020.
  53. Justyna Wiktorowicz et al. Exploratory factor analysis in the measurement of the competencies of older people. Ekonometria, 2016.
  54. Perceptual research on general deterrence: A critical review. Law and Society Review, pages 545–572, 1986. ISSN 0023-9216.
  55. The impact of psychological contract breach on work‐related outcomes: a meta‐analysis. Personnel psychology, 60(3):647–680, 2007. ISSN 0031-5826.
Citations (6)

Summary

We haven't generated a summary for this paper yet.