ResearchSpace

A conceptual model of information security compliant behaviour based on the self-determination theory

Show simple item record

dc.contributor.author Gangire, Y
dc.contributor.author Da Veiga, A
dc.contributor.author Herselman, Martha E
dc.date.accessioned 2019-07-29T12:20:13Z
dc.date.available 2019-07-29T12:20:13Z
dc.date.issued 2019-03
dc.identifier.citation Gangire, Y., Da Veiga, A., and Herselman, M.E. 2019. A conceptual model of information security compliant behaviour based on the self-determination theory. Information Communications Technology and Society (ICTAS) 2019, Durban, South Africa, 6-8 March 2019 en_US
dc.identifier.isbn 978-1-5386-7365-2
dc.identifier.uri https://ieeexplore.ieee.org/document/8703629
dc.identifier.uri http://hdl.handle.net/10204/11048
dc.description Copyright: 2019 IEEE. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, kindly consult the publisher's website. en_US
dc.description.abstract The increase in threats to information systems resources in organisations has been attributed to the failure by employees to adhere to information security policies. Research into the information security behaviour of employees is still predominantly based on the extrinsic model, while the intrinsic model has not received as much attention. Therefore, this paper aims to contribute to the understanding of the intrinsic motivations that lead to information security compliant behaviour. To this end, a review of literature on this topic was conducted to understand what other researchers have found in this area. The results show that intrinsic motivational factors could provide alternative explanations for information security compliant behaviour. This paper proposes a conceptual framework for compliant behaviour based on the self-determination theory. en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.relation.ispartofseries Worklist;22451
dc.subject Information security behaviour en_US
dc.subject Information security policy compliance en_US
dc.subject Intrinsic motivation en_US
dc.subject Self-determination theory en_US
dc.subject SDT en_US
dc.title A conceptual model of information security compliant behaviour based on the self-determination theory en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Gangire, Y., Da Veiga, A., & Herselman, M. E. (2019). A conceptual model of information security compliant behaviour based on the self-determination theory. IEEE. http://hdl.handle.net/10204/11048 en_ZA
dc.identifier.chicagocitation Gangire, Y, A Da Veiga, and Martha E Herselman. "A conceptual model of information security compliant behaviour based on the self-determination theory." (2019): http://hdl.handle.net/10204/11048 en_ZA
dc.identifier.vancouvercitation Gangire Y, Da Veiga A, Herselman ME, A conceptual model of information security compliant behaviour based on the self-determination theory; IEEE; 2019. http://hdl.handle.net/10204/11048 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Gangire, Y AU - Da Veiga, A AU - Herselman, Martha E AB - The increase in threats to information systems resources in organisations has been attributed to the failure by employees to adhere to information security policies. Research into the information security behaviour of employees is still predominantly based on the extrinsic model, while the intrinsic model has not received as much attention. Therefore, this paper aims to contribute to the understanding of the intrinsic motivations that lead to information security compliant behaviour. To this end, a review of literature on this topic was conducted to understand what other researchers have found in this area. The results show that intrinsic motivational factors could provide alternative explanations for information security compliant behaviour. This paper proposes a conceptual framework for compliant behaviour based on the self-determination theory. DA - 2019-03 DB - ResearchSpace DP - CSIR KW - Information security behaviour KW - Information security policy compliance KW - Intrinsic motivation KW - Self-determination theory KW - SDT LK - https://researchspace.csir.co.za PY - 2019 SM - 978-1-5386-7365-2 T1 - A conceptual model of information security compliant behaviour based on the self-determination theory TI - A conceptual model of information security compliant behaviour based on the self-determination theory UR - http://hdl.handle.net/10204/11048 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record