<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Culture Matters - A Cross Cultural Examination of Information Security Behavior Theories</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sebastian Hengstler</string-name>
          <email>s.hengstler@stud.uni-goettingen.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>16th International Conference on Wirtschaftsinformatik</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Chair of Information Security and Compliance, University of Goettingen</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <fpage>78</fpage>
      <lpage>92</lpage>
      <abstract>
        <p>Ensuring information security is an international problem and poses particular challenges for international companies. Research proposes various solutions for ensuring information security based on several theories such as the deterrence theory or the protection motivation theory. What is currently missing is a comparison of these theories in an intercultural context to test their comparability and different effectiveness. In our study, we empirically tested the theories and determined their comparability with invariance testing and predictive power between Germany, India and the USA using a SEM approach. Our results show differences in the effectiveness of the theoretical models across the three cultures. The results provide initial insights into the use of the theories in an international context and offer a practical approach to design culturespecific security measures</p>
      </abstract>
      <kwd-group>
        <kwd>Information Security Policy Compliance Behavior</kwd>
        <kwd>Cross-cultural research</kwd>
        <kwd>Deterrence Theory</kwd>
        <kwd>Protection Motivation Theory</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        With the increasing relevance of information security for ensuring successful business
in the digital age, the need for effective measures to ensure secure employee behavior
within organizations is growing [
        <xref ref-type="bibr" rid="ref1 ref34 ref37 ref41 ref45 ref48">1</xref>
        ]. As a basis for ensuring security behavior,
companies define information security policies (ISP). ISPs are defined as “a set of
formalized procedures, guidelines, roles and responsibilities to which employees are
required to adhere to safeguard and use properly the information and technology
resources of their organizations [
        <xref ref-type="bibr" rid="ref2 ref35 ref38 ref42 ref46 ref49">2</xref>
        ]”. Research on ISP compliance behavior (ISPCB)
has already been developed a variety of contextualized theories to explain employee
behavior, mainly using theories from other disciplines such as sociology, psychology,
criminology or health care [
        <xref ref-type="bibr" rid="ref3 ref36 ref39 ref43 ref47 ref50">3</xref>
        ]. These approaches provide detailed insights into how
ISPCB can be explained and influenced positively or negatively and helps in practice
to design effective security measures [
        <xref ref-type="bibr" rid="ref4 ref40 ref44">4</xref>
        ].
      </p>
      <p>
        However, the results of current research still highlight some less considered
problems such as the analysis of cultural differences in ISPCB [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ]. This becomes
particularly relevant when internationally operating companies want to define their
security measures and use them in their heterogeneous cultural environment [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
Existing research partially considers this problem when analyzing ISPCB [
        <xref ref-type="bibr" rid="ref3 ref36 ref39 ref43 ref47 ref50 ref8">3, 8</xref>
        ].
Previous research shows, for example, that the effectiveness of established measures to
ensure information security can vary from one national culture to another [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Other
culture-related studies analyze the cultural differences in information security attitudes
and behavior of employees [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        Thus, there is still a need for the examination of aspects that have not yet been taken
into account to a sufficient extent. First, the current research describes that only a
limited set of cultures have been analyzed at the national level for differences in terms
of ISPCB [
        <xref ref-type="bibr" rid="ref10 ref5">5, 10</xref>
        ]. Second, existing approaches either do not use theories to describe
cultural differences regarding ISPCB in their basic form or consider specific contexts,
such as different security offenses [
        <xref ref-type="bibr" rid="ref11 ref8">8, 11</xref>
        ]. An analysis of theoretical mechanisms in a
general ISPCB context offer the possibility of better comparability and more specific
use of the results with existing and future research [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Currently, we cannot say
whether current analyzed theories in ISPCB research differ in their predictive power
and mechanisms in different countries because there is no common level of
comparability. Therefore, the aim of this study is to investigate whether the predictive
power of established theories and their mechanisms differ in different national cultures.
      </p>
      <p>
        Our study addresses the mentioned gaps as follows. Using two of the most widely
used theories in ISPCB research, the Deterrence Theory (DT) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] and the Protection
Motivation Theory (PMT) [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] we collected, analyzed and compared data sets with
different cultural values from Germany, the USA and India using an SEM-PLS
approach. We use the two theories mentioned above because they have different
perspectives on ISPCB [
        <xref ref-type="bibr" rid="ref3 ref36 ref39 ref43 ref47 ref50">3</xref>
        ]. Our analysis comprises of three aspects. First, we conduct
invariance testing to validate that the measurement instruments measure the same
theoretical construct across our cultures. Second, there is an established tradition in
information systems research in general, of comparing research models that have been
developed and tested in earlier work [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Thus, we follow this approach and compare
the predictive power and the mechanisms of the two theories [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. We test for statistical
differences between the explained variance in ISPCB using a Multi Group Analysis.
      </p>
      <p>The rest of the paper is structured as follows. In the second section, we look at the
cultural dimensions that are the basis for our cross-cultural comparison and describe
the analyzed theories DT and PMT. We then develop the research model and present
the explorative hypotheses underlying this study in the third section. Subsequently, the
results of the study are presented. The study concludes with a discussion, limitations,
contributions and an outlook on further research potentials.
2
2.1</p>
    </sec>
    <sec id="sec-2">
      <title>Theoretical Background</title>
      <sec id="sec-2-1">
        <title>The Concept of National Culture</title>
        <p>
          The factor culture is an essential dimension that shapes an individual’s behavior and
can be described as a summary of ideologies, beliefs, basic assumptions, shared norms
and values, that have an influence on the collective will [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. Existing research on
information security and culture indicates a wide range of studies in which the influence
of theoretical mechanisms on ISPCB are analyzed, based on national cultural
differences. To apply these cultural differences, Hofstede's cultural dimensions provide
a solid base for a comparison and are a widely used approach in information security
research [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. The dimensions consist of the constructs power distance (PD), uncertainty
avoidance (UA), individualism/collectivism (COL), Masculinity/Femininity (MAS)
and long-term orientation (LO). Power distance determines the degree to which people
accept and expect that power is distributed unequally. Uncertainty Avoidance defines
the degree to which people feel uncomfortable with uncertainty and ambiguity.
Individualism is defined as a preference of individuals to take care of only themselves
and their families. Collectivism is the opposite. Masculinity and Femininity can be
related to tough vs. Tender cultures. According to Hofstede (2011) Masculinity
represents values ass heroism, material rewards or success. Femininity is related to the
preference for cooperation, modesty and quality of life. This orientation defines the
degree to which long term values and traditions are balanced in contrast to thrift
encouragement and efforts in modern solutions [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. We used Hofstede’s cultural
dimensions for two reasons. First, the dimensions have been rigorously developed and
provide definitions for different cultural dimensions. Second, their application allows
us to better integrate our theoretical findings in this stream of literature [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].
We selected these three nations Germany, India and USA because, they have different
values in Hofstede's cultural dimensions and thus, form a good basis for analyzing
cultural differences at the national level. Table 1 shows that India has a higher value
for PD than Germany or the USA, which means in the Indian culture it is more likely
to accept the unequal distribution of power than in the national culture of Germany or
the USA. Uncertainty avoidance differs more between Germany and the USA and
India, which shows that in German culture uncertainty and ambiguity are described as
more uncomfortable than in the U.S. and India. The COL dimension is strongest for the
USA and lowest for India. It shows that the national culture of the U.S.A has a strong
bias for collective action in society instead of emphasizing individualism. The
dimension MAS shows similarly high values in all three cultures. LO is more
pronounced in India than in the USA or Germany and shows that Indian culture
emphasizes long-term values and traditions instead of thrift encouragement and efforts
in modern solutions. Overall, the three national cultures show a good distribution in the
characteristics of the cultural dimensions according to Hofstede and are therefore well
suited for carrying out an intercultural comparison at the national level.
2.2
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>Deterrence Theory in Information Security Research</title>
        <p>
          The DT has its origin in criminology and has been widely used in information security
research [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. The theory states that individuals will choose to commit an offence, if the
benefits outweigh the underlying penalties. The DT further describes that the trade-off
between benefits and the expected penalty can be further divided in different
mechanisms, namely sanction certainty, sanction severity and sanction celerity [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
When considering the DT in existing information security literature, a wide range of
uses can be identified. The application of the original form of DT concentrates on the
usage of formal sanctions to explain ISPCB, while other research additionally includes
more informal consequences, such as informal sanctions like guilt and shame. Formal
sanction severity is described as the formal expected amount of a penalty when a policy
violation is committed, such as a fine or a warning, while an example for informal
sanction severity could the loss of reputation among colleagues and superiors or shame.
Formal sanction certainty describes the perceived probability of being formally
punished if one is caught for an ISP non-compliant behavior, while informal sanction
certainty describes probability of being informally punished by the social environment
(e.g. at the workplace) [
          <xref ref-type="bibr" rid="ref3 ref36 ref39 ref43 ref47 ref50">3</xref>
          ]. Sanction celerity describes the velocity a person is punished
if a crime was committed [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ].
        </p>
        <p>
          Both formal and informal sanction certainty and sanction celerity find empirical support
in various contexts of information security research [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. Since sanction severity and
sanction celerity are considered as the two main components of deterrence theory, since
celerity has received less empirical support in information security research so far, we
only considered formal and informal sanction severity and sanction celerity in our
research model [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
2.3
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>Protection Motivation Theory in Information Security Research</title>
        <p>
          The PMT has its origins in healthcare research. The theory states that a person, when
confronted with a threat, cognitively weighs the threat and a possible related protective
measure [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ]. After assessing the threat and potential countermeasures to cope with it,
the individual decides to adopt an adaptive or non-adaptive behavior. Adaptive
behaviors are recommended responses designed to protect against a threat, whereas
non-adaptive responses involve behaviors in which the threat recipient avoids
implementing a recommended response. PMT assumes that the susceptibility to threats
and the severity of the threat have a positive effect on a person's behavior and
adaptation. Similarly, in its adapted form, the PMT contains further constructs used to
constitute the protection motivation, such as response effectiveness, self-efficacy to
comply and response costs, which have a direct influence on behavior [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]. Response
cost describe the perceived extrinsic or intrinsic personal costs of performing the
suggested adaptive behavior in terms of time, money or effort. Response efficacy is
described as the perceived effectiveness of the behavior in mitigating or avoiding the
perceived violation. Self-efficacy is defined as the confidence an individual possesses
in effectively performing a recommended response and to complying with given ISP’s.
Severity is defined as the perceptions of the seriousness of an information security
violation. Susceptibility refers to the degree to which someone feels vulnerable to a
specific violation of ISP's [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
        </p>
        <p>
          The constructs of the PMT find broad empirical support in information security
research. Menard et al. (2017) analyze the impact of PMT on the individual motivation
of information technology users. Johnston and Warkentin (2010) developed their
fearappeal model based on the PMT in order to convey the effectiveness of an antispyware
software [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]. Moody et al. (2018) show that PMT constructs such as response efficacy,
severity and susceptibility have an indirect effect on behavior [
          <xref ref-type="bibr" rid="ref3 ref36 ref39 ref43 ref47 ref50">3</xref>
          ]. However, current
information security research lacks on studies on the relationship between PMT
constructs and national culture [
          <xref ref-type="bibr" rid="ref13 ref20">13, 20</xref>
          ]. We, therefore, used the explained theoretical
constructs of the PMT for our cross-cultural analysis.
3
3.1
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Research Approach</title>
      <sec id="sec-3-1">
        <title>Hypotheses development and Research Design</title>
        <p>
          The hypotheses of a research project serve to answer the underlying research questions.
However, in order to answer our research questions, we need to operationalize the
theories we have introduced earlier in our study. The construct definitions from the DT
and PMT were used to transfer the theories into a structural model displayed in Figure
1. This becomes necessary because the results of the structural model are needed to
determine the effect strengths of the respective theory components on ISPCB. They are
used to determine the predictive power of the theories for ISPCB. We furthermore
analyze different effect sizes between the constructs along different cultures to identify
significant differences as it has been shown that differences in cultural values can have
an influence on behavior [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. We draw on this argumentation and propose the
following hypotheses:
        </p>
        <p>H1: The predictive power of DT and the model's mechanisms differ across cultures.</p>
        <p>H2: The predictive power of PMT and the model's mechanisms differ across
cultures.</p>
        <p>
          We conducted an empirical cross-cultural study to examine our underlying
hypotheses. The operationalization of their variables follows a context-independent
approach, measuring general ISPCB in order to make more generalized statements
about the effectiveness of the theories and to compare their explanatory power
throughout the culture samples [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. For the measurement of behavior, the items of
D'Arcy and Lowry (2019) were used and generalized for our study. Furthermore, we
used 7-point Likert scales for our questionnaires. The items for formal and informal
sanction severity and -certainty of the DT (3 items each) were adapted by Moody et al.
(2018) and rephrased for our study [
          <xref ref-type="bibr" rid="ref3 ref36 ref39 ref43 ref47 ref50">3</xref>
          ]. The items used for the constructs response cost
and response efficacy of the PMT were adapted by Floyd et al. (2000) (4 items each).
Self-efficacy, severity and susceptibility were taken from Menard et al. (2017) and
adapted (3 items each) [
          <xref ref-type="bibr" rid="ref13 ref20">13, 20</xref>
          ]. The used questions per item are listed in the appendix.
        </p>
        <p>
          We used an SEM approach and the partial least squares (PLS) method to test the
theoretical models, because it has fewer sample size requirements and is characterized
by excellent prediction [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ]. We performed a cross-model comparison by using a
multigroup analysis (MGA) to look for significant differences in the mean differences of the
explained variance of our models across our samples as well as in the path coefficients
of the analyzed theories (Welch-Satterthwait test) [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ].
3.2
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Data collection, Sample Characteristics and Common-Method Bias</title>
        <p>
          A pilot study was conducted by sending the survey to five academic experts for review.
A test run was then started with 60 participants for each sample, where at least 30 results
per sample were complete and valid. The crowdsourcing platforms Amazon
Mechanical Turk and Clickworker were used to collect the data, taking into account the
quality criteria for using crowd working platforms, defined by Lowry et al. (2016) [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ].
Only participants with their cultural background and origin from the respective sample
(USA, India, Germany) were able to participate in our study. Their job acceptance rate
on the platform must have been higher than 90%, and a certification of English language
skills must be registered on the platform. We only selected participants which were
employed, worked at least partially with a computer in their job and whose organization
had an ISP. Additional attention checks were built into the study (e.g., requests to select
a specific response) to avoid systematic response patterns. Participants were paid $1.65
for successful and conscientious participation in the study. In total, 767 people
participated in the German survey, 623 in the survey within the USA and 481 people in
the Indian survey. After applying the used quality criteria, the resulting samples consist
of 422 (57%) valid responses collected in Germany, 263 (42%) in the USA and 252
(52%) in India. Demographic characteristics of the respondents were adapted from
Hovav and D'Arcy (2012). The average age in all three countries is between 30 and 35
years. In all three countries, the proportion of men is higher than 60%. The majority of
the participants work in a company with more than 1000 employees.
        </p>
        <p>
          To carry out the common method bias test, we used the marker variable technique
[
          <xref ref-type="bibr" rid="ref27">27</xref>
          ] and chose the respondent's outside activities as the theoretically unrelated marker
variable [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ]. The highest variance that the marker shares with another construct is less
than 0.05. In addition, the path coefficients between the constructs showed no
significant size changes (&gt; 0.01 and not significant). In conclusion, the result suggests
that there is no evidence of a common method bias in our study.
4
4.1
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Data Analysis and Results</title>
      <sec id="sec-4-1">
        <title>Measurement Models and Invariance Testing</title>
        <p>
          To check our data for reliability, common quality criteria for reflective measurement
models in IS research were applied to our study [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ]. We used individual item
reliability, composite construct reliability (CR), and average variance extracted (AVE)
as indicators of convergent validity for our models. The factor loadings of the items for
the DT and PMT model were all above 0.70, which indicates sufficient item reliability
[
          <xref ref-type="bibr" rid="ref29">29</xref>
          ] (see appendix). The CR is higher than 0.70 for every variable used in each model,
and the AVE is higher than 0.5 [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ]. We furthermore used the Fornell and Larcker
criterion to confirm discriminant validity by showing that for each model, the AVE for
each construct is higher than the variance shared with other constructs (see square root
AVEs as bold numbers in Table 2). [
          <xref ref-type="bibr" rid="ref30 ref31">30, 31</xref>
          ]. In summary, our results indicate that our
measurement model is acceptable and reliable.
        </p>
        <p>ISC</p>
        <p>ISS</p>
        <p>ISPCB</p>
        <p>
          Additionally, we tested for configural and metric measurement invariance. This step
is necessary to create the ability to further analyze differences in the predictive power
of the theories in a cross cultural manner [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ]. Only if the charges of the similar items
are invariant across groups, differences in the item scores can be meaningfully
compared to the extent that they indicate similar group differences in the underlying
construct [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ]. To measure invariance, we performed a MGA and tested the differences
in item loadings for all models between the three samples. We were not able to find
significant differences between the item loadings of our samples and thus show metric
invariance and comparability of our results.
4.2
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>Testing Theoretical Mechanisms across Cultures</title>
        <p>
          We have tested the previously introduced path models with the PLS algorithm for
estimating the structural model. We used the bootstrapping method to determine the
significance of the path coefficients with 5000 bootstrap samples [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ]. An overview of
our significance levels of the individual path coefficients for all three models is given
in Table 3.
        </p>
        <p>While formal sanction certainty and informal sanction severity have a significant
impact in all three models, formal sanction severity only applies to India and informal
sanction certainty only to Germany. The mechanisms of PMT are almost equally
applicable to all three cultures. While response efficacy, self-efficacy and susceptibility
are applicable in all three models and severity has no significant effect in all of them,
response cost is only significantly applied in the USA model.</p>
        <p>We additionally identified some significant effects of our control variables (see
appendix). Age has a significant effect on ISPCB in at least one of the samples for each
theory. The company size and industry only have an influence in the DT model.
Education affects at least one sample for each theory. For gender, only one significant
effect can be found in the PMT model.
4.3</p>
      </sec>
      <sec id="sec-4-3">
        <title>Comparing the Predictive Power across Cultures</title>
        <p>
          In order to determine the predictive power of the theories and then compare them, we
first considered the path coefficients of the individual models and determined whether
significant differences exist in their height [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ]. In the second step we compared the
explained variance and also investigated whether significant differences exist. As
analyzed in the previous chapter, different significances can be identified in the path
coefficients of the DT models. However, it can be observed that only significant path
differences can be identified in the informal sanctions. For example, ISC in the USA
model is significantly higher than in the German model (significant at 0.1). The same
difference can be found for ISS. The PMT model was tested using five different
constructs. Response efficacy has a significant effect on ISPCB in all three models,
whereas the effect in the USA is significantly higher than in Germany and India. There
is a significant effect of self-efficacy on ISPCB in all models where the path coefficient
in the Indian is significantly higher as in the USA and German one (significant at 0.1).
        </p>
        <p>
          When interpreting the explained variance, the acceptable values depend on the
research context [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ]. In general, a proportion of the explained variance of an
endogenous variable is considered low up to 0.32, moderate from 0.33 and substantial
from 0.67. The R² adjusted in the DT model is in the medium range for the USA (0.350)
and India (0.327), for the German sample slightly below the 0.32 limit at 0.291.
However, the MGA showed that the difference between Germany and USA and
Germany and India is significant (significant at 0.05). For the PMT models, all R²
adjusted are in the medium range, whereas only the value for Germany is below 0.4
(0.358) and significantly different compared to the USA (0.520) and Indian (0.580)
sample (significant at 0.05). The R² adjusted values for the PMT and DT model are
above average [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. The differences in the R² values may result from the different
operationalisation of the theories, as we use basic models or have no further
contextspecific extensions in our models. Along the investigated theories we can see that there
are significant differences in the path coefficients of the theories as well as in the R² of
the models.
5
5.1
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Discussion</title>
      <sec id="sec-5-1">
        <title>Implications for Research and Practice</title>
        <p>
          Our results show implications for research as well as for practice. The main purpose of
this analysis was to empirically evaluate and compare the predictive power of the DT
and PMT along three different national cultures. The results of the analysis provide
different insights into the cultural differences when applying the theories and show
interesting theoretical contributions. First, by applying configural and metric invariance
between our cultural samples, we can show that our used models and items of the DT
and PMT are understood in the same way across different cultures [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ]. These results
are the basic prerequisite for a comparison of the theories between the national cultures.
Secondly, we were able to show that there are differences in the predictive power of
DT and PMT mechanisms. We could show for our context that the theories have a small
to medium-strong explanatory power. Significant differences along the cultures exist
in the DT model between USA and Germany. In addition, we were able to show in our
study that the PMT constructs response efficacy and self-efficacy explains the ISPCB
significantly better in India and the USA than in Germany. Furthermore, our results
show different effects for the effectiveness of formal sanctions in the USA than in
existing research [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. Our results provide important information on the effectiveness of
models on ISPCB in order to define what types of measures are appropriate to ensure
ISPCB in an international context. These findings indicate that ISPCB research needs
to consider cultural differences in the use of DT and PMT. Our results provide a basis
for more specific investigation, such as analysing the effects of individual cultural
dimensions on the mechanisms of the theories analysed. Finally, we can contribute to
a broader consideration of intercultural comparisons between more than two nations
since we integrated national samples such as Germany and India which were previously
less considered in cross-cultural research of ISPCB [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
        <p>Practitioners can also benefit from the conclusions of our results. Our findings
underline the relevance of a cultural differentiation of measures for the management of
security breaches. Overall, in the future, it will be important to consider cultural
differences when using security measures to positively influence ISPCB. Companies
should pay attention to the fact that the measures work differently in different
international locations. They should be designed with a culture-specific mode of
operation in mind. An example of such differences is the use of sanctions. While our
results show that the severity of an expected formal punishment in different cultures
tends to be less effective ISPCB, the sole high probability that a formal punishment is
to be expected is comparatively more effective.
5.2</p>
      </sec>
      <sec id="sec-5-2">
        <title>Limitations and Future Research</title>
        <p>
          For an adequate interpretation of our results, the following limitations of the study
should be considered. On the one hand, we measured general ISPCB and did not
specifically refer to one or more contexts. The general validity of our results cannot be
proven by the fact that cultural differences can be context specific. Future research can
take up this aspect and examine our results as a starting point for cultural differences in
specific ISPCB contexts. Secondly, in order to compare different cultures, we have used
three example cultures, which differ in their cultural dimensions according to [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ].
Thus, our results are limited to the cultures we selected. In order to find out more about
the differences between cultures, we need to involve further culture samples and take a
closer look at the direct influences of cultural dimensions on specific behaviour.
Furthermore, we could not consider the problem of a cultural shift in detail. For
example, our samples from the different countries could be influenced by the individual
cultural values of each subject. In order to obtain a detailed consideration of cultural
values on the studied theoretical constructs and ISPCB, future studies should also
measure culture on an individual level and investigate it in terms of its influence on
ISPCB. [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. Third, moderating factors could only partially be addressed in our work.
More detailed differences and the involvement or deepening of other factors, such as
an industry-specific investigation or an analysis based on different educational
backgrounds, will be subjected to future research.
6
        </p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>Studies on the analysis of ISPCB often show the need to consider their results from
different cultural perspectives. However, existing studies in this area rarely take an
empirical approach, look at given problems from different theoretical lenses and put
the results into context. This study is the first to empirically test and compare three
prominent theories that are often used to explain ISPCB. Furthermore, we were able to
identify different types of effects in different cultures and that their effect strength can
vary. Interestingly, both strong similarities and differences can be identified across
theories. Other interesting aspects are constant effects along the three cultures analyzed,
such as attitude or susceptibility as an effective factor for explaining ISPCB. Our results
give a first impression of cultural differences in the effectiveness of different theoretical
models and provide a starting point for the design and implementation of ISP’s in an
international environment. In summary, future research on ISPCB and culture should
be based on these results when deciding for or against a theoretical lens and should
conduct more specific analyses.</p>
    </sec>
    <sec id="sec-7">
      <title>Appendix</title>
      <p>Control
Variables
Age
Company Size
Education
Gender
Industry
Job Position
Construct
Formal
Sanction
Severity
Formal
Sanction
Certainty
Informal
Sanction
Severity
Susceptibility
ISPCB</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Barlow</surname>
            ,
            <given-names>J.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Warkentin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ormond</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dennis</surname>
            ,
            <given-names>A.R.</given-names>
          </string-name>
          :
          <source>Don't Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance. Journal of the Association for Information Systems</source>
          <volume>19</volume>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Lowry</surname>
          </string-name>
          , P.B., Moody, G.D.:
          <article-title>Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies</article-title>
          .
          <source>Info Systems J</source>
          <volume>25</volume>
          ,
          <fpage>433</fpage>
          -
          <lpage>463</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3. Moody, G.D.,
          <string-name>
            <surname>Siponen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pahnila</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Toward a Unified Model of Information Security Policy Compliance</article-title>
          .
          <source>MIS Quarterly</source>
          <volume>42</volume>
          ,
          <fpage>285</fpage>
          -
          <lpage>311</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Willison</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Warkentin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Johnston</surname>
            ,
            <given-names>A.C.</given-names>
          </string-name>
          :
          <article-title>Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives</article-title>
          .
          <source>Info Systems J</source>
          <volume>28</volume>
          ,
          <fpage>266</fpage>
          -
          <lpage>293</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Cram</surname>
            ,
            <given-names>W.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>D'Arcy</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Proudfoot</surname>
            ,
            <given-names>J.G.</given-names>
          </string-name>
          :
          <article-title>Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance</article-title>
          .
          <source>MISQ 43</source>
          ,
          <fpage>525</fpage>
          -
          <lpage>554</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Crossler</surname>
            ,
            <given-names>R.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Johnston</surname>
            ,
            <given-names>A.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lowry</surname>
            ,
            <given-names>P.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hu</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Warkentin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baskerville</surname>
          </string-name>
          , R.:
          <article-title>Future directions for behavioral information security research</article-title>
          .
          <source>Computers &amp; Security</source>
          <volume>32</volume>
          ,
          <fpage>90</fpage>
          -
          <lpage>101</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Hovav</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>D'Arcy</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <article-title>Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea</article-title>
          .
          <source>Information &amp; Management</source>
          <volume>49</volume>
          ,
          <fpage>99</fpage>
          -
          <lpage>110</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Trang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brendel</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research</article-title>
          .
          <source>Inf Syst Front</source>
          <volume>21</volume>
          ,
          <fpage>1265</fpage>
          -
          <lpage>1284</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Connolly</surname>
            ,
            <given-names>L.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lang</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wall</surname>
            ,
            <given-names>D.S.</given-names>
          </string-name>
          :
          <article-title>Information Security Behavior: A Cross-Cultural Comparison of Irish and US Employees</article-title>
          .
          <source>Information Systems Management</source>
          <volume>36</volume>
          ,
          <fpage>306</fpage>
          -
          <lpage>322</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zahedi</surname>
            ,
            <given-names>F.M.:</given-names>
          </string-name>
          <article-title>Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China</article-title>
          .
          <source>MISQ 40</source>
          ,
          <fpage>205</fpage>
          -
          <lpage>222</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>D'Arcy</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Herath</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings</article-title>
          .
          <source>European Journal of Information Systems</source>
          <volume>20</volume>
          ,
          <fpage>643</fpage>
          -
          <lpage>658</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Aurigemma</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mattson</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Generally Speaking, Context Matters: Making the Case for a Change from Universal to Particular ISP Research</article-title>
          .
          <source>Journal of the Association for Information Systems</source>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Menard</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bott</surname>
            ,
            <given-names>G.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Crossler</surname>
            ,
            <given-names>R.E.</given-names>
          </string-name>
          :
          <article-title>User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory</article-title>
          .
          <source>Journal of Management Information Systems</source>
          <volume>34</volume>
          ,
          <fpage>1203</fpage>
          -
          <lpage>1230</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Srite</surname>
          </string-name>
          ,
          <source>Karahanna: The Role of Espoused National Cultural Values in Technology Acceptance. MISQ 30</source>
          ,
          <issue>679</issue>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Brown</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Venkatesh</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hoehle</surname>
          </string-name>
          , H.:
          <article-title>Technology adoption decisions in the household: A seven-model comparison</article-title>
          .
          <source>J Assn Inf Sci Tec 66</source>
          ,
          <fpage>1933</fpage>
          -
          <lpage>1949</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Leidner</surname>
            ,
            <given-names>D.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kayworth</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Review: a review of culture in information systems research: toward a theory of information technology culture conflict</article-title>
          .
          <source>MIS Quarterly</source>
          <volume>30</volume>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Hofstede</surname>
          </string-name>
          , G.:
          <article-title>Culture's consequences. Comparing values, behaviors, institutions, and organizations across nations</article-title>
          .
          <source>Sage Publ, Thousand Oaks</source>
          , Calif. (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Vance</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Siponen</surname>
            ,
            <given-names>M.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Straub</surname>
            ,
            <given-names>D.W.:</given-names>
          </string-name>
          <article-title>Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures</article-title>
          .
          <source>Information &amp; Management</source>
          <volume>57</volume>
          ,
          <issue>103212</issue>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Willison</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lowry</surname>
            ,
            <given-names>P.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Paternoster</surname>
          </string-name>
          , R.:
          <article-title>A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research</article-title>
          . JAIS,
          <fpage>1187</fpage>
          -
          <lpage>1216</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Floyd</surname>
            ,
            <given-names>D.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prentice-Dunn</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rogers</surname>
            ,
            <given-names>R.W.:</given-names>
          </string-name>
          <article-title>A Meta-Analysis of Research on Protection Motivation Theory</article-title>
          .
          <source>Journal of Applied Social Psychology</source>
          <volume>30</volume>
          ,
          <fpage>407</fpage>
          -
          <lpage>429</lpage>
          (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>M. Warkentin</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Malimage</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <article-title>Malimage: Impact of Protection Motivation and Deterrence on IS Security Policy Compliance: A Multi-Cultural View</article-title>
          .
          <source>In: WISP</source>
          <year>2012</year>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Johnston</surname>
          </string-name>
          ,
          <article-title>Warkentin: Fear Appeals and Information Security Behaviors: An Empirical Study</article-title>
          .
          <source>MIS Quarterly</source>
          <volume>34</volume>
          ,
          <issue>549</issue>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>D'Arcy</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lowry</surname>
          </string-name>
          , P.B.:
          <article-title>Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study</article-title>
          .
          <source>Info Systems J</source>
          <volume>29</volume>
          ,
          <fpage>43</fpage>
          -
          <lpage>69</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Ringle</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Straub</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Editor's Comments: A Critical Look at the Use of PLS-SEM in "MIS Quarterly"</article-title>
          .
          <source>MIS Quarterly 36</source>
          ,
          <string-name>
            <surname>iii</surname>
          </string-name>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <given-names>Rocha</given-names>
            <surname>Flores</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            ,
            <surname>Antonsen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Ekstedt</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          :
          <article-title>Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture</article-title>
          .
          <source>Computers &amp; Security</source>
          <volume>43</volume>
          ,
          <fpage>90</fpage>
          -
          <lpage>110</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Lowry</surname>
          </string-name>
          , P.B.,
          <string-name>
            <surname>D'Arcy</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hammer</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          , Moody, G.D.:
          <article-title>“Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels</article-title>
          .
          <source>The Journal of Strategic Information Systems</source>
          <volume>25</volume>
          ,
          <fpage>232</fpage>
          -
          <lpage>240</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Lindell</surname>
            ,
            <given-names>M.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Whitney</surname>
            ,
            <given-names>D.J.</given-names>
          </string-name>
          :
          <article-title>Accounting for common method variance in cross-sectional research designs</article-title>
          .
          <source>Journal of Applied Psychology</source>
          <volume>86</volume>
          ,
          <fpage>114</fpage>
          -
          <lpage>121</lpage>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Hair</surname>
            ,
            <given-names>J.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hult</surname>
            ,
            <given-names>G.T.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ringle</surname>
            ,
            <given-names>C.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sarstedt</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A primer on partial least squares structural equation modeling (PLS-SEM)</article-title>
          .
          <source>SAGE</source>
          , Los Angeles, London, New Delhi, Singapore, Washington DC,
          <string-name>
            <surname>Melbourne</surname>
          </string-name>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Hair</surname>
            ,
            <given-names>J.F.</given-names>
          </string-name>
          :
          <article-title>A primer on partial least squares structural equation modeling (PLS-SEM)</article-title>
          .
          <source>Sage Publ</source>
          , Los Angeles (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Chin</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>Issues and Opinion on Structural Equation Modeling</article-title>
          .
          <source>MIS Quarterly</source>
          <volume>22</volume>
          (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Fornell</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Larcker</surname>
            ,
            <given-names>D.F.</given-names>
          </string-name>
          :
          <article-title>Evaluating Structural Equation Models with Unobservable Variables and Measurement Error</article-title>
          .
          <source>Journal of Marketing Research</source>
          <volume>18</volume>
          ,
          <issue>39</issue>
          (
          <year>1981</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Steelman</surname>
            ,
            <given-names>Z.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hammer</surname>
            ,
            <given-names>B.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Limayem</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Data Collection in the Digital Age: Innovative Alternatives to Student Samples</article-title>
          .
          <source>MISQ 38</source>
          ,
          <fpage>355</fpage>
          -
          <lpage>378</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Henseler</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ringle</surname>
            ,
            <given-names>C.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sarstedt</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Testing measurement invariance of composites using partial least squares</article-title>
          .
          <source>International Marketing Review</source>
          <volume>33</volume>
          ,
          <fpage>405</fpage>
          -
          <lpage>431</lpage>
          (
          <year>2016</year>
          )
          <article-title>3</article-title>
          .
          <article-title>It would create a problem in my life if I lost the respect of my manager for not complying with ISP procedures regularly</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          1.
          <article-title>How likely is it that you would lose the respect and good opinion of your business associates for violating company information security procedures?</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          2.
          <article-title>How likely is it that you would jeopardize your promotion prospects if management learned that you had violated company information security procedures?</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          3.
          <article-title>How likely is it that you would lose the respect and good opinion of your manager for violating company information security policies?</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          1.
          <article-title>Complying with information security procedures would be time consuming</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          2.
          <article-title>Complying with information security procedures would take work time</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          3.
          <article-title>Complying with information security procedures makes my work more difficult</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          4.
          <article-title>Complying with information security procedures inconveniences my work</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          1.
          <article-title>Complying with information security procedures in our organization keeps information security breaches down</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          2.
          <string-name>
            <surname>If</surname>
            <given-names>I</given-names>
          </string-name>
          <article-title>were to comply with information security procedures, IS security breaches would be scarce</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          3.
          <string-name>
            <surname>If</surname>
            <given-names>I</given-names>
          </string-name>
          <article-title>were to do the opposite to what Mattila did, it would keep IS security breaches down</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          4.
          <string-name>
            <surname>If</surname>
            <given-names>I</given-names>
          </string-name>
          <article-title>were to do the opposite to what Mattila did, IS security breaches would be minimal</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          1.
          <article-title>My information and technology resources are at risk for becoming attacked</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          2.
          <article-title>It is likely that my information and technology will become compromised</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          3.
          <article-title>It is possible that my information and technology resources will become compromised</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          <article-title>1. I complied with the requirements of the ISP</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          <article-title>2. I protected information and technology resources according to the requirements of the ISP</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          <article-title>3. I carried out my responsibilities prescribed in the ISP when I used information and technology</article-title>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>