Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Leader power and employees' information security policy compliance

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Hyungjin Lukas-
dc.contributor.authorChoi, HanByeol Stella-
dc.contributor.authorHan, Jinyoung-
dc.date.accessioned2021-08-31T22:43:27Z-
dc.date.available2021-08-31T22:43:27Z-
dc.date.created2021-06-19-
dc.date.issued2019-12-
dc.identifier.issn0955-1662-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/61384-
dc.description.abstractDependence on mobile and outside networks exposes businesses to information leakages by insiders, increasing the importance of information security. Consequently, companies need to implement security education training and awareness (SETA) programs, to ensure employees comply with information security policies (ISPs). The influence of supervisor leadership on the effectiveness of such programs has received little empirical attention. This study empirically analyzes the moderating role of leader power bases effect in the relationship between SETA programs and employees' ISP compliance intention using WarpPLS 5.0. The moderating effects differ by leader power base type, and expertise, reward, and legitimate power have a positive impact on the relationship. The findings have theoretical and practical implications for the execution of SETA programs and creation of organizational environments in the context of information security.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherPALGRAVE MACMILLAN LTD-
dc.subjectCHARISMATIC LEADERSHIP-
dc.subjectSOCIAL POWER-
dc.subjectMANAGEMENT-
dc.subjectAWARENESS-
dc.subjectTACTICS-
dc.subjectMODELS-
dc.subjectFRENCH-
dc.subjectBASES-
dc.subjectWORK-
dc.subjectRISK-
dc.titleLeader power and employees' information security policy compliance-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Hyungjin Lukas-
dc.identifier.doi10.1057/s41284-019-00168-8-
dc.identifier.scopusid2-s2.0-85060538245-
dc.identifier.wosid000501014300003-
dc.identifier.bibliographicCitationSECURITY JOURNAL, v.32, no.4, pp.391 - 409-
dc.relation.isPartOfSECURITY JOURNAL-
dc.citation.titleSECURITY JOURNAL-
dc.citation.volume32-
dc.citation.number4-
dc.citation.startPage391-
dc.citation.endPage409-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassssci-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaCriminology & Penology-
dc.relation.journalWebOfScienceCategoryCriminology & Penology-
dc.subject.keywordPlusCHARISMATIC LEADERSHIP-
dc.subject.keywordPlusSOCIAL POWER-
dc.subject.keywordPlusMANAGEMENT-
dc.subject.keywordPlusAWARENESS-
dc.subject.keywordPlusTACTICS-
dc.subject.keywordPlusMODELS-
dc.subject.keywordPlusFRENCH-
dc.subject.keywordPlusBASES-
dc.subject.keywordPlusWORK-
dc.subject.keywordPlusRISK-
dc.subject.keywordAuthorLeader power base-
dc.subject.keywordAuthorInformation security-
dc.subject.keywordAuthorInformation security policy (ISP)-
dc.subject.keywordAuthorSETA program-
dc.subject.keywordAuthorCompliance intention-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Executive Vice President for Research > Institute of Convergence Science > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE