Control-related motivations and information security policy compliance: The role of autonomy and efficacy

Jeffrey D. Wall, Prashant Palvia, Paul Benjamin Lowry

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

Abstract

Employees' failures to follow information security policy can be costly to organizations, causing organizations to implement security controls to motivate secure behavior. Information security research has explored many control-related motivations (e.g., self-efficacy, response efficacy, and behavioral control) in the context of ISP compliance; however, the behavioral effects of perceptions of autonomous functioning are not well understood in security contexts. This paper examines employee autonomy as a control-related motivation from the lens of self-determination theory and psychological reactance theory. Self-determination theory is widely used in other disciplines to explain intrinsically driven behavior, but has not been applied to security research. Psychological reactance theory is also widely used, but is only beginning to receive attention in security research. Self-determination and psychological reactance offer complementary yet opposite conceptualizations of trait-based autonomy. This paper posits that perceptions of trait-based autonomy influence self-efficacy and response efficacy. Through a survey of government employees, we provide support for several hypotheses. We also discuss important directions for the use of self-determination theory and psychological reactance theory in future research.
Original languageEnglish
Pages (from-to)52-79
JournalJournal of Information Privacy and Security
Volume9
Issue number4
DOIs
Publication statusPublished - 2013

Research Keywords

  • Self-determination
  • reactance
  • efficacy
  • information security policy

Fingerprint

Dive into the research topics of 'Control-related motivations and information security policy compliance: The role of autonomy and efficacy'. Together they form a unique fingerprint.

Cite this