Aebissa, B., Dhillon, G., & Meshesha, M. (2023). The direct and indirect effect of organizational justice on employee intention to comply with information security policy: The case of Ethiopian banks.
Computers & Security,
130, 103248.
https://doi.org/10.1016/j.cose.2023.103248
Afshari, P., Bayazidi, S., & Yazdani, S. (2024). Meta-synthesis as an original method to synthesize qualitative literature in chronic diseases: A narrative review.
Jundishapur Journal of Chronic Disease Care,
13(2). e139621.
https://doi.org/10.5812/jjcdc-139621
Ajzen, I. (1985). From intentions to actions: A theory of planned behavior (pp. 11-39). Springer Berlin Heidelberg.
Alassaf, M. & Alkhalifah, A. (2021). Exploring the Influence of Direct and Indirect Factors on Information Security Policy Compliance: A Systematic Literature Review.
IEEE Access, 9, 162687-162705.
https://doi.org/10.1109/ACCESS.2021.3132574
Ali, R. F., Dominic, P. D. D., Ali, S. E. A., Rehman, M., & Sohail, A. (2021). Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance.
Applied Sciences, 11(8), 3383.
https://doi.org/10.3390/app11083383
AlKalbani, A., Deng, H., & Kam, B. (2017). AlKalbani, A., Deng, H., Kam, B., & Zhang, X. (2017). Information security compliance in organizations: An institutional perspective.
Data and Information Management,
1(2), 104-114.
https://doi.org/10.1515/dim-2017-0006
Alraja, M. N., Butt, U. J., & Abbod, M. (2023). Information security policies compliance in a global setting: An employee's perspective.
Computers & Security,
129, 103208.
https://doi.org/10.1016/j.cose.2023.103208
Amankwa, E., Loock, M., & Kritzinger, E. (2022). The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors.
Information & Computer Security,
30(4), 583-614.
https://doi.org/10.1108/ICS-10-2021-0169
Ameen, N., Tarhini, A., Shah, M. H., Madichie, N., Paul, J., & Choudrie, J. (2021). Keeping customers' data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce.
Computers in Human Behavior,
114, 106531.
https://doi.org/10.1016/j.chb.2020.106531
Ameen, N., Tarhini, A., Shah, M. H., & Madichie, N. O. (2020). Employees’ behavioural intention to smartphone security: A gender-based, cross-national study.
Computers in Human Behavior,
104, 106184.
https://doi.org/10.1016/j.chb.2019.106184
Amiri, M. , Roozbehani, K. & Zamanian, M. (2015). Identifying the failure of implementation of information security management systems (ISMS) with a focus on Iranian organizations. Science and Technology Policy Letters, 05(2), 69-76.
Asfoor, A. H., Latif, A. B. A., & Rahim, F. B. A. (2023). Investigate the Roles of Sanctions, Psychological Capital, and Organizational Security Resources Factors in Information Security Policy Violation.
Asia pacific journal of information systems,
33(4), 863-898.
https://doi.org/10.14329/apjis.2023.33.4.863
Bansal, G., Muzatko, S., & Shin, S. I. (2021). Information system security policy noncompliance: the role of situation-specific ethical orientation.
Information Technology & People,
34(1), 250-296.
https://doi.org/10.1108/ITP-03-2019-0109
Bauer, S., & Bernroider, E. W. (2017). From information security awareness to reasoned compliant action: Analyzing information security policy compliance in a large banking organization.
ACM SIGMIS Database: the DATABASE for Advances in Information Systems,
48(3), 44–68.
https://doi.org/10.1145/3130515.3130519
Bauer, S., Bernroider, E. W., & Chudzikowski, K. (2017). Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks.
Computers & Security,
68, 145-159.
https://doi.org/10.1016/j.cose.2017.04.009
Bélanger, F., Collignon, S., & Kahle-Piasecki, L. (2017). Bélanger, F., Collignon, S., Enget, K., & Negangard, E. (2017). Determinants of early conformance with information security policies.
Information & Management,
54(7), 887-901.
https://doi.org/10.1016/j.im.2017.01.003
Bélanger, F., Maier, J., & Maier, M. (2022). A longitudinal study on improving employee information protective knowledge and behaviors.
Computers & Security,
116, 102641.
https://doi.org/10.1016/j.cose.2022.102641
Bulgurcu, B, Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness.
MIS Quarterly, 34(3), 523-548.
https://doi.org/10.2307/25750690
Butler, K. J., & Brown, I. (2023). COVID-19 pandemic-induced organisational cultural shifts and employee information security compliance behaviour: a South African case study.
Information & Computer Security,
31(2), 221-243.
https://doi.org/10.1108/ICS-09-2022-0152
Campbell, R., Pound, P., Pope, C., Britten, N., Pill, R., Morgan, M., & Donovan, J. (2003). Evaluating meta-ethnography: a synthesis of qualitative research on lay experiences of diabetes and diabetes care.
Social science & medicine,
56(4), 671-684.
https://doi.org/10.1016/S0277-9536(02)00064-3
Carmi, G., & Bouhnik, D. (2020). The effect of rational based beliefs and awareness on employee compliance with information security procedures: A case study of a financial corporation in Israel.
Interdisciplinary Journal of Information, Knowledge, and Management,
15, 109.
https://doi.org/10.28945/4596
Chen, Y., Xia, W., & Cousins, K. (2022). Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence.
Computers & Security,
113, 102568.
https://doi.org/10.1016/j.cose.2021.102568
Chen, X., Wu, D., Chen, L., & Teng, J. K. (2018). Sanction severity and employees’ information security policy compliance: Investigating mediating, moderating, and control variables.
Information & Management,
55(8), 1049-1060.
https://doi.org/10.1016/j.im.2018.05.011
Choi, Y. (2017). Human resource management and security policy compliance.
International Journal of Human Capital and Information Technology Professionals (IJHCITP),
8(3), 68-81.
http://dx.doi.org/10.4018/ijhcitp.2017070105
Choi, Y., & Yoo, T. (2014). Influence of HRM practices on privacy policy compliance intention: a study among bank employees in Korea.
International Journal of Security and Its Applications,
8(1), 9-18.
https://doi.org/10.14257/IJSIA.2014.8.1.02
Chua, H. N., Wong, S. F., Low, Y. C., & Chang, Y. (2018). Impact of employees’ demographic characteristics on the awareness and compliance of information security policy in organizations.
Telematics and Informatics,
35(6), 1770-1780.
https://doi.org/10.1016/j.tele.2018.05.005
Cram, W. A., Proudfoot, J. G., & D'Arcy, J. (2020). Maximizing Employee Compliance with Cybersecurity Policies.
MIS Quarterly Executive,
19(3), 183–198.
http://dx.doi.org/10.17705/2msqe.00032
D'Arcy, J., Herath, T., & Shoss, M. K. (2014). Understanding employee responses to stressful information security requirements: A coping perspective.
Journal of management information systems, 31(2), 285-318.
https://doi.org/10.2753/MIS0742-1222310210
D’Arcy, J., & Teh, P. L. (2019). Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization.
Information & Management,
56(7), 103151.
https://doi.org/10.1016/j.im.2019.02.006
Da Veiga, A., & Martins, N. (2015). Improving the information security culture through monitoring and implementation actions illustrated through a case study.
Computers & Security,
49, 162-176.
https://doi.org/10.1016/j.cose.2014.12.006
Da Veiga, A., Astakhova, L. V., Botha, A., & Herselman, M. (2020). Defining organisational information security culture—Perspectives from academia and industry.
Computers & Security,
92, 101713.
https://doi.org/10.1016/j.cose.2020.101713
Edwards, J., & Kaimal, G. (2016). Using meta-synthesis to support application of qualitative methods findings in practice: A discussion of meta-ethnography, narrative synthesis, and critical interpretive synthesis.
The Arts in Psychotherapy,
51, 30-35.
https://doi.org/10.1016/j.aip.2016.07.003
Eminağaoğlu, M., Uçar, E., & Eren, Ş. (2009). The positive outcomes of information security awareness training in companies–A case study.
information security technical report,
14(4), 223-229.
https://doi.org/10.1016/j.istr.2010.05.002
Farshadkhah, S., Van Slyke, C., & Fuller, B. (2021). Onlooker effect and affective responses in information security violation mitigation.
Computers & Security,
100, 102082.
https://doi.org/10.1016/j.cose.2020.102082
Gibbs, J. P. (1968). Crime, punishment, and deterrence. The Southwestern Social Science Quarterly, 48(4), 515-530.
Hadlington, L., Binder, J., & Stanulewicz, N. (2021). Exploring the role of moral disengagement and counterproductive work behaviours in information security awareness.
Computers in Human Behavior, 114, 106557.
https://doi.org/10.1016/j.chb.2020.106557
Han, J., Kim, Y. J., & Kim, H. (2017). An integrative model of information security policy compliance with psychological contract: Examining a bilateral perspective.
Computers & Security,
66, 52-65.
https://doi.org/10.1016/j.cose.2016.12.016
Hashemzadeh Aghdam, N. (2021). Data Security Policies: The Indirect Role of Management Support on Users' Adjustment behavior of Banks' Data Systems.
Quarterly Studies in Banking Management and Islamic Banking,
7(16), 77-98.
https://doi.org/10.22034/jifb.2022.153329 {In Persian}
Hengstler, S., Kuehnel, S., Masuch, K., Nastjuk, I., & Trang, S. (2023). Should i really do that? Using quantile regression to examine the impact of sanctions on information security policy compliance behavior.
Computers & Security,
133, 103370.
https://doi.org/10.1016/j.cose.2023.103370
Herath, T., & Rao, H. R. (2009). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness.
Decision support systems,
47(2), 154-165.
https://doi.org/10.1016/j.dss.2009.02.005
Hovav, A., & D’Arcy, J. (2012). Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the US and South Korea.
Information & Management,
49(2), 99-110.
https://doi.org/10.1016/j.im.2011.12.005
Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory.
Computers & Security, 31(1), 83-95.
https://doi.org/10.1016/j.cose.2011.10.007
Ifinedo, P. (2016). Critical times for organizations: what should be done to curb workers’ noncompliance with IS security policy guidelines?.
Information Systems Management, 33(1), 30-41.
https://doi.org/10.1080/10580530.2015.1117868
Jaeger, L., Eckhardt, A., & Kroenung, J. (2021). The role of deterrability for the effect of multi-level sanctions on information security policy compliance: Results of a multigroup analysis.
Information & Management,
58(3), 103318.
https://doi.org/10.1016/j.im.2020.103318
Järveläinen, J. (2016). Integrated business continuity planning and information security policy development approach. International Conference on Information Systems (ICIS), Dublin.
Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study.
MIS quarterly, 34(3), 549-566.
https://doi.org/10.2307/25750691
Kajtazi, M. & Bulgurcu, B. (2013). Information security policy compliance: An empirical study on escalation of commitment. In 19th Americas Conference on Information Systems, Chicago, Illinois.
Kam, H. J., Mattson, T., & Kim, D. J. (2021). The “Right” recipes for security culture: a competing values model perspective.
Information Technology & People,
34(5), 1490-1512.
https://doi.org/10.1108/ITP-08-2019-0438
Karjalainen, M., Siponen, M., & Sarker, S. (2020). Toward a stage theory of the development of employees’ information security behavior.
Computers & Security,
93, 101782.
https://doi.org/10.1016/j.cose.2020.101782
Karlsson, F., Kolkowska, E., & Petersson, J. (2022). Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis.
Computers & Security,
114, 102578.
https://doi.org/10.1016/j.cose.2021.102578
Koskosas, I. V. (2012). Cultural and organisational commitment in the context of e-banking.
International Journal of Internet Technology and Secured Transactions,
4(1), 26–41.
https://doi.org/10.1504/IJITST.2012.045147
Lee, C., Lee, C. C., & Kim, S. (2016). Understanding information security stress: Focusing on the type of information security compliance activity.
Computers & Security,
59, 60-70.
https://doi.org/10.1016/j.cose.2016.02.004
Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior.
International Journal of Information Management,
45, 13-24.
https://doi.org/10.1016/j.ijinfomgt.2018.10.017
Li, Y. J., & Hoffman, E. (2023). Designing an incentive mechanism for information security policy compliance: An experiment.
Journal of Economic Behavior & Organization,
212, 138-159.
https://doi.org/10.1016/j.jebo.2023.05.033
Liu, C., Wang, N., & Liang, H. (2020). Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment.
International Journal of Information Management,
54, 102152.
https://doi.org/10.1016/j.ijinfomgt.2020.102152
McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., & Pattinson, M. (2017). Individual differences and information security awareness.
Computers in Human Behavior,
69, 151-156.
https://doi.org/10.1016/j.chb.2016.11.065
Menard, P., Bott, G. J., & Crossler, R. E. (2017). User motivations in protecting information security: Protection motivation theory versus self-determination theory.
Journal of Management Information Systems,
34(4), 1203-1230.
https://doi.org/10.1080/07421222.2017.1394083
Merhi, M. I., & Ahluwalia, P. (2019). Examining the impact of deterrence factors and norms on resistance to information systems security.
Computers in Human Behavior,
92, 37-46.
https://doi.org/10.1016/j.chb.2018.10.031
Michie, S., Van Stralen, M. M., & West, R. (2011). The behaviour change wheel: a new method for characterising and designing behaviour change interventions.
Implementation science,
6(1), 42.
https://doi.org/10.1186/1748-5908-6-42
Mohammadi, F. , Kazempourian, S., & taghva, M. R. (2021). Technology Intelligence in High Tech Organizations. Science and Technology Policy Letters, 11(1), 51-68.
Musarurwa, A., Flowerday, S., & Cilliers, L. (2018). An information security behavioural model for the bring-your-own-device trend. South African Journal of Information Management, 20(1), 1-9.
https://doi.org/10.4102/sajim.v20i1.980
Musarurwa, A., Flowerday, S., & Cilliers, L. (2019). The bring‐your‐own‐device unintended administrator: A perspective from Zimbabwe.
The Electronic Journal of Information Systems in Developing Countries,
85(4), e12076.
https://doi.org/10.1002/isd2.12076
Nadelson, S., & Nadelson, L. S. (2014). Evidence‐based practice article reviews using CASP tools: a method for teaching EBP.
Worldviews on Evidence‐Based Nursing,
11(5), 344-346.
https://doi.org/10.1111/wvn.12059
Nazari, F. (2020). Factors Affecting Acceptance of Information Security Policy Among Employees of Tejarat Bank. Master’s thesis. Payame Noor University. {In Persian}
Ogbanufe, O., Crossler, R. E., & Biros, D. (2023). The valued coexistence of protection motivation and stewardship in information security behaviors.
Computers & Security,
124, 102960.
https://doi.org/10.1016/j.cose.2022.102960
Page, M. J., McKenzie, J. E., Bossuyt, P. M., Boutron, I., Hoffmann, T. C., Mulrow, C. D., ... & Moher, D. (2021). The PRISMA 2020 statement: an updated guideline for reporting systematic reviews.
bmj,
372.
https://doi.org/10.1136/bmj.n71
Parsons, K., McCormac, A., Butavicius, M., Pattinson, M., & Jerram, C. (2014). Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q).
Computers & security,
42, 165-176.
https://doi.org/10.1016/j.cose.2013.12.003
Pattinson, M., Butavicius, M., Parsons, K., McCormac, A., & Calic, D. (2017). Managing information security awareness at an Australian bank: A comparative study.
Information & Computer Security,
25(2), 181-189.
https://doi.org/10.1108/ICS-03-2017-0017
Petrič, G., & Orehek, Š. (2025). Expressing opinions about information security in an organization: the spiral of silence theory perspective.
Information & Computer Security,
33(2), 223-241.
https://doi.org/10.1108/ICS-04-2024-0083
Pham, H. C., El-Den, J., & Richardson, J. (2016). Stress-based security compliance model–an exploratory study.
Information & Computer Security,
24(4), 326-347.
https://doi.org/10.1108/ICS-10-2014-0067
Posey, C., & Folger, R. (2020). An exploratory examination of organizational insiders’ descriptive and normative perceptions of cyber-relevant rights and responsibilities.
Computers & Security,
99, 102038.
https://doi.org/10.1016/j.cose.2020.102038
Pourkarimi, J. , Abili, K. and Azizi, M. (2025). Educational Managers' Competencies in Turbulent Environments (A Meta-Synthesis Study).
Interdisciplinary Journal of Management Studies,
18(3), 565-581.
https://doi.org/10.22059/jipa.2024.372042.3469 {In Persian}
Rajab, M., & Eydgahi, A. (2019). Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education.
Computers & Security,
80, 211-223.
https://doi.org/10.1016/j.cose.2018.09.016
Rhee, H. S., Kim, C., & Ryu, Y. U. (2009). Self-efficacy in information security: Its influence on end users' information security practice behavior.
Computers & security,
28(8), 816-826.
https://doi.org/10.1016/j.cose.2009.05.008
Rogers, R. W. (1983). Cognitive and psychological processes in fear appeals and attitude change: A revised theory of protection motivation. Social psychophysiology: A sourcebook, 153-176.
Ruighaver, A. B., Maynard, S. B., & Warren, M. (2010). Ethical decision making: Improving the quality of acceptable use policies.
Computers & Security,
29(7), 731-736.
https://doi.org/10.1016/j.cose.2010.05.004
Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., & Herawan, T. (2015). Information security conscious care behaviour formation in organizations.
Computers & Security,
53, 65-78.
https://doi.org/10.1016/j.cose.2015.05.012
Safa, N. S., Maple, C., Watson, T., & Von Solms, R. (2018). Motivation and opportunity based model to reduce information security insider threats in organisations.
Journal of information security and applications,
40, 247-257.
https://doi.org/10.1016/j.jisa.2017.11.001
Sandelowski, M., & Barroso, J. (2007). Handbook for synthesizing qualitative research. New York, NY: Springer.
Silic, M., Barlow, J. B., & Back, A. (2017). A new perspective on neutralization and deterrence: Predicting shadow IT usage.
Information & management,
54(8), 1023-1037.
https://doi.org/10.1016/j.im.2017.02.007
Siponen, M., Mahmood, M. A., & Pahnila, S. (2014). Employees’ adherence to information security policies: An exploratory field study.
Information & management,
51(2), 217-224.
https://doi.org/10.1016/j.im.2013.08.006
Sykes, G., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency.
American sociological review,
22(6), 664-670.
https://doi.org/10.2307/2089195
Teh, P. L., Ahmed, P. K., & D'Arcy, J. (2015). What drives information security policy violations among banking employees?: insights from neutralization and social exchange theory.
Journal of Global Information Management (JGIM),
23(1), 44-64.
http://doi.org/10.4018/jgim.2015010103
Trang, S., & Nastjuk, I. (2021). Examining the role of stress and information security policy design in information security compliance behaviour: An experimental study of in-task behaviour.
Computers & Security,
104, 102222.
https://doi.org/10.1016/j.cose.2021.102222
Tsohou, A., Karyda, M., & Kokolakis, S. (2015). Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs.
Computers & security,
52, 128-141.
https://doi.org/10.1016/j.cose.2015.04.006
Van der Kleij, R., Wijn, R., & Hof, T. (2020). An application and empirical test of the Capability Opportunity Motivation-Behaviour model to data leakage prevention in financial organizations.
Computers & Security,
97, 101970.
http://dx.doi.org/10.1016/j.cose.2020.101970
Van Slyke, C., & Belanger, F. (2020). Explaining the interactions of humans and artifacts in insider security behaviors: The mangle of practice perspective.
Computers & Security,
99, 102064.
https://doi.org/10.1016/j.cose.2020.102064
Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory.
Information & management,
49(3-4), 190-198.
https://doi.org/10.1016/j.im.2012.04.002
Vance, A., Siponen, M. T., & Straub, D. W. (2020). Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures.
Information & Management,
57(4), 103212.
https://doi.org/10.1016/j.im.2019.103212
Wall, J. D., & Warkentin, M. (2019). Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics.
Information & Management,
56(8), 103157.
https://doi.org/10.1016/j.im.2019.03.002
Williams, A. S., Maharaj, M. S., & Ojo, A. I. (2019). Employee behavioural factors and information security standard compliance in Nigeria banks.
Int. J. Comput. Digit. Syst,
8(4).
https://doi.org/10.12785/ijcds/080407
Yevseyeva, I., Morisset, C., Turland, J., Coventry, L., Groß, T., Laing, C., & van Moorsel, A. (2014). Consumerisation of IT: Mitigating risky user actions and improving productivity with nudging.
Procedia Technology,
16, 508-517.
https://doi.org/10.1016/j.protcy.2014.10.118