Leader power and employees' information security policy compliance
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Hyungjin Lukas | - |
dc.contributor.author | Choi, HanByeol Stella | - |
dc.contributor.author | Han, Jinyoung | - |
dc.date.accessioned | 2021-08-31T22:43:27Z | - |
dc.date.available | 2021-08-31T22:43:27Z | - |
dc.date.created | 2021-06-19 | - |
dc.date.issued | 2019-12 | - |
dc.identifier.issn | 0955-1662 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/61384 | - |
dc.description.abstract | Dependence on mobile and outside networks exposes businesses to information leakages by insiders, increasing the importance of information security. Consequently, companies need to implement security education training and awareness (SETA) programs, to ensure employees comply with information security policies (ISPs). The influence of supervisor leadership on the effectiveness of such programs has received little empirical attention. This study empirically analyzes the moderating role of leader power bases effect in the relationship between SETA programs and employees' ISP compliance intention using WarpPLS 5.0. The moderating effects differ by leader power base type, and expertise, reward, and legitimate power have a positive impact on the relationship. The findings have theoretical and practical implications for the execution of SETA programs and creation of organizational environments in the context of information security. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | PALGRAVE MACMILLAN LTD | - |
dc.subject | CHARISMATIC LEADERSHIP | - |
dc.subject | SOCIAL POWER | - |
dc.subject | MANAGEMENT | - |
dc.subject | AWARENESS | - |
dc.subject | TACTICS | - |
dc.subject | MODELS | - |
dc.subject | FRENCH | - |
dc.subject | BASES | - |
dc.subject | WORK | - |
dc.subject | RISK | - |
dc.title | Leader power and employees' information security policy compliance | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Hyungjin Lukas | - |
dc.identifier.doi | 10.1057/s41284-019-00168-8 | - |
dc.identifier.scopusid | 2-s2.0-85060538245 | - |
dc.identifier.wosid | 000501014300003 | - |
dc.identifier.bibliographicCitation | SECURITY JOURNAL, v.32, no.4, pp.391 - 409 | - |
dc.relation.isPartOf | SECURITY JOURNAL | - |
dc.citation.title | SECURITY JOURNAL | - |
dc.citation.volume | 32 | - |
dc.citation.number | 4 | - |
dc.citation.startPage | 391 | - |
dc.citation.endPage | 409 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | ssci | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Criminology & Penology | - |
dc.relation.journalWebOfScienceCategory | Criminology & Penology | - |
dc.subject.keywordPlus | CHARISMATIC LEADERSHIP | - |
dc.subject.keywordPlus | SOCIAL POWER | - |
dc.subject.keywordPlus | MANAGEMENT | - |
dc.subject.keywordPlus | AWARENESS | - |
dc.subject.keywordPlus | TACTICS | - |
dc.subject.keywordPlus | MODELS | - |
dc.subject.keywordPlus | FRENCH | - |
dc.subject.keywordPlus | BASES | - |
dc.subject.keywordPlus | WORK | - |
dc.subject.keywordPlus | RISK | - |
dc.subject.keywordAuthor | Leader power base | - |
dc.subject.keywordAuthor | Information security | - |
dc.subject.keywordAuthor | Information security policy (ISP) | - |
dc.subject.keywordAuthor | SETA program | - |
dc.subject.keywordAuthor | Compliance intention | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.