The role of collectivism, power distance, and neutralization techniques on deviant information security behavior
Author
Abstract
Suggested Citation
DOI: 10.1016/j.techsoc.2025.102857
Download full text from publisher
As the access to this document is restricted, you may want to
for a different version of it.References listed on IDEAS
- Detmar Straub & Karen Loch & Roberto Evaristo & Elena Karahanna & Mark Srite, 2002. "Toward a Theory-Based Measurement of Culture," Journal of Global Information Management (JGIM), IGI Global, vol. 10(1), pages 13-23, January.
- Prasanta Kr. Chopdar & V. J. Sivakumar, 2019. "Understanding continuance usage of mobile shopping applications in India: the role of espoused cultural values and perceived risk," Behaviour and Information Technology, Taylor & Francis Journals, vol. 38(1), pages 42-64, January.
- Bradley L Kirkman & Kevin B Lowe & Cristina B Gibson, 2006. "A quarter century of Culture's Consequences: a review of empirical research incorporating Hofstede's cultural values framework," Journal of International Business Studies, Palgrave Macmillan;Academy of International Business, vol. 37(3), pages 285-320, May.
- Simon Trang & Benedikt Brendel, 2019. "A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research," Information Systems Frontiers, Springer, vol. 21(6), pages 1265-1284, December.
- John D'Arcy & Anat Hovav & Dennis Galletta, 2009. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research, INFORMS, vol. 20(1), pages 79-98, March.
- Hartmut Hoehle & Xiaojun Zhang & Viswanath Venkatesh, 2015. "An espoused cultural perspective to understand continued intention to use mobile applications: a four-country study of mobile social media application usability," European Journal of Information Systems, Taylor & Francis Journals, vol. 24(3), pages 337-359, May.
- John D'Arcy & Tejaswini Herath, 2011. "A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings," European Journal of Information Systems, Taylor & Francis Journals, vol. 20(6), pages 643-658, November.
- Merrill Warkentin & Robert Willison, 2009. "Behavioral and policy issues in information systems security: the insider threat," European Journal of Information Systems, Taylor & Francis Journals, vol. 18(2), pages 101-105, April.
- James Anderson & David Gerbing, 1984. "The effect of sampling error on convergence, improper solutions, and goodness-of-fit indices for maximum likelihood confirmatory factor analysis," Psychometrika, Springer;The Psychometric Society, vol. 49(2), pages 155-173, June.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Li, Yuanxiang John & Hoffman, Elizabeth, 2023. "Designing an incentive mechanism for information security policy compliance: An experiment," Journal of Economic Behavior & Organization, Elsevier, vol. 212(C), pages 138-159.
- Zhang, Jinsui & Hu, Min & Jia, Yusheng & Gu, Yuanyuan & Chen, Wen, 2024. "How should regulatory schemes be optimized to enhance deterrence against medical insurance fraud by enrollees? Evidence from a discrete choice experiment in China," Social Science & Medicine, Elsevier, vol. 354(C).
- A. J. Burns & Tom L. Roberts & Clay Posey & Paul Benjamin Lowry & Bryan Fuller, 2023. "Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse," Information Systems Research, INFORMS, vol. 34(1), pages 342-362, March.
- Jeffrey D. Wall & Prashant Palvia & John D’Arcy, 2022. "Theorizing the Behavioral Effects of Control Complementarity in Security Control Portfolios," Information Systems Frontiers, Springer, vol. 24(2), pages 637-658, April.
- Eunkyung Kweon & Hansol Lee & Sangmi Chai & Kyeongwon Yoo, 2021. "The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence," Information Systems Frontiers, Springer, vol. 23(2), pages 361-373, April.
- Soomin Park & Junghoon Moon & Cheul Rhee & Young-Chan Choe, 2023. "Understanding Online Music Piracy Behavior via Private Communication Channels," Information Systems Frontiers, Springer, vol. 25(6), pages 2377-2392, December.
- Rao Faizan Ali & P.D.D. Dominic & Kashif Ali, 2020. "Organizational Governance, Social Bonds and Information Security Policy Compliance: A Perspective towards Oil and Gas Employees," Sustainability, MDPI, vol. 12(20), pages 1-27, October.
- Eun Hee Park & Jongwoo Kim & Lynn Wiles, 2023. "The role of collectivism and moderating effect of IT proficiency on intention to disclose protected health information," Information Technology and Management, Springer, vol. 24(2), pages 177-193, June.
- Godsway Korku Tetteh & Chuks Otioma, 2025. "Cyberattack, cyber risk mitigation capabilities, and firm productivity in Kenya," Small Business Economics, Springer, vol. 64(3), pages 1493-1514, March.
- Jason Chan & Shu He & Dandan Qiao & Andrew Whinston, 2024. "Shedding Light on the Dark: The Impact of Legal Enforcement on Darknet Transactions," Information Systems Research, INFORMS, vol. 35(1), pages 145-164, March.
- Yadong Luo & Huan Zhang & Juan Bu, 2019. "Developed country MNEs investing in developing economies: Progress and prospect," Journal of International Business Studies, Palgrave Macmillan;Academy of International Business, vol. 50(4), pages 633-667, June.
- Mei, Maggie Qiuzhu & Wang, Le & Yan, Jie, 2023. "Maintaining product quality consistency when offshoring to emerging markets: The role of subsidiary control," Journal of International Management, Elsevier, vol. 29(1).
- Luke Butcher & Ian Phau & Min Teah, 2016. "Brand prominence in luxury consumption: Will emotional value adjudicate our longing for status?," Journal of Brand Management, Palgrave Macmillan, vol. 23(6), pages 701-715, November.
- Ahammad, Mohammad Faisal & Tarba, Shlomo Yedidia & Liu, Yipeng & Glaister, Keith W., 2016. "Knowledge transfer and cross-border acquisition performance: The impact of cultural distance and employee retention," International Business Review, Elsevier, vol. 25(1), pages 66-75.
- Thuy-Van Tran & Sinikka Lepistö & Janne Järvinen, 2021. "The relationship between subjectivity in managerial performance evaluation and the three dimensions of justice perception," Journal of Management Control: Zeitschrift für Planung und Unternehmenssteuerung, Springer, vol. 32(3), pages 369-399, September.
- Enno Siemsen & Kenneth A. Bollen, 2007. "Least Absolute Deviation Estimation in Structural Equation Modeling," Sociological Methods & Research, , vol. 36(2), pages 227-265, November.
- Palmero, Alfredo Jiménez & Herrera, Juan José Durán & Sabaté, Juan Manuel de la Fuente, 2013. "The role of psychic distance stimuli on the East-West FDI location structure in the EU. Evidence from Spanish MNEs," Journal of East European Management Studies, Nomos Verlagsgesellschaft mbH & Co. KG, vol. 18(1), pages 36-65.
- Yuan, Ke-Hai & Chan, Wai, 2008. "Structural equation modeling with near singular covariance matrices," Computational Statistics & Data Analysis, Elsevier, vol. 52(10), pages 4842-4858, June.
- Saad, Mohsen & Samet, Anis, 2020. "Collectivism and commonality in liquidity," Journal of Business Research, Elsevier, vol. 116(C), pages 137-162.
- Kalinic, Igor & Brouthers, Keith D., 2022. "Entrepreneurial orientation, export channel selection, and export performance of SMEs," International Business Review, Elsevier, vol. 31(1).
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:teinso:v:81:y:2025:i:c:s0160791x25000478. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/technology-in-society .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.