Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy
Jeffrey D. Wall,
Prashant Palvia and
Paul Benjamin Lowry
Journal of Information Privacy and Security, 2013, vol. 9, issue 4, 52-79
Abstract:
Employees' failures to follow information security policy can be costly to organizations, causing organizations to implement security controls to motivate secure behavior. Information security research has explored many control-related motivations (e.g., self-efficacy, response efficacy, and behavioral control) in the context of ISP compliance; however, the behavioral effects of perceptions of autonomous functioning are not well understood in security contexts. This paper examines employee autonomy as a control-related motivation from the lens of self-determination theory and psychological reactance theory. Self-determination theory is widely used in other disciplines to explain intrinsically driven behavior, but has not been applied to security research. Psychological reactance theory is also widely used, but is only beginning to receive attention in security research. Self-determination and psychological reactance offer complementary yet opposite conceptualizations of trait-based autonomy. This paper posits that perceptions of trait-based autonomy influence self-efficacy and response efficacy. Through a survey of government employees, we provide support for several hypotheses. We also discuss important directions for the use of self-determination theory and psychological reactance theory in future research.
Date: 2013
References: Add references at CitEc
Citations: View citations in EconPapers (7)
Downloads: (external link)
http://hdl.handle.net/10.1080/15536548.2013.10845690 (text/html)
Access to full text is restricted to subscribers.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:taf:uipsxx:v:9:y:2013:i:4:p:52-79
Ordering information: This journal article can be ordered from
http://www.tandfonline.com/pricing/journal/uips20
DOI: 10.1080/15536548.2013.10845690
Access Statistics for this article
Journal of Information Privacy and Security is currently edited by Chuleeporn Changchit
More articles in Journal of Information Privacy and Security from Taylor & Francis Journals
Bibliographic data for series maintained by Chris Longhurst ().