<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Culture Matters -A Cross Cultural Examination of Information Security Behavior Theories</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Sebastian</forename><surname>Hengstler</surname></persName>
							<email>s.hengstler@stud.uni-goettingen.de</email>
							<affiliation key="aff0">
								<orgName type="department">Chair of Information Security and Compliance</orgName>
								<orgName type="institution">University of Goettingen</orgName>
								<address>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Culture Matters -A Cross Cultural Examination of Information Security Behavior Theories</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">4D582086DE2E7769495664000A822F5B</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T16:59+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Information Security Policy Compliance Behavior</term>
					<term>Cross-cultural research</term>
					<term>Deterrence Theory</term>
					<term>Protection Motivation Theory</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Ensuring information security is an international problem and poses particular challenges for international companies. Research proposes various solutions for ensuring information security based on several theories such as the deterrence theory or the protection motivation theory. What is currently missing is a comparison of these theories in an intercultural context to test their comparability and different effectiveness. In our study, we empirically tested the theories and determined their comparability with invariance testing and predictive power between Germany, India and the USA using a SEM approach. Our results show differences in the effectiveness of the theoretical models across the three cultures. The results provide initial insights into the use of the theories in an international context and offer a practical approach to design culturespecific security measures</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>With the increasing relevance of information security for ensuring successful business in the digital age, the need for effective measures to ensure secure employee behavior within organizations is growing <ref type="bibr" target="#b0">[1]</ref>. As a basis for ensuring security behavior, companies define information security policies (ISP). ISPs are defined as "a set of formalized procedures, guidelines, roles and responsibilities to which employees are required to adhere to safeguard and use properly the information and technology resources of their organizations <ref type="bibr" target="#b1">[2]</ref>". Research on ISP compliance behavior (ISPCB) has already been developed a variety of contextualized theories to explain employee behavior, mainly using theories from other disciplines such as sociology, psychology, criminology or health care <ref type="bibr" target="#b2">[3]</ref>. These approaches provide detailed insights into how ISPCB can be explained and influenced positively or negatively and helps in practice to design effective security measures <ref type="bibr" target="#b3">[4]</ref>. However, the results of current research still highlight some less considered problems such as the analysis of cultural differences in ISPCB <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref>. This becomes particularly relevant when internationally operating companies want to define their security measures and use them in their heterogeneous cultural environment <ref type="bibr" target="#b6">[7]</ref>.</p><p>Existing research partially considers this problem when analyzing ISPCB <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b7">8]</ref>. Previous research shows, for example, that the effectiveness of established measures to ensure information security can vary from one national culture to another <ref type="bibr" target="#b6">[7]</ref>. Other culture-related studies analyze the cultural differences in information security attitudes and behavior of employees <ref type="bibr" target="#b8">[9]</ref>.</p><p>Thus, there is still a need for the examination of aspects that have not yet been taken into account to a sufficient extent. First, the current research describes that only a limited set of cultures have been analyzed at the national level for differences in terms of ISPCB <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b9">10]</ref>. Second, existing approaches either do not use theories to describe cultural differences regarding ISPCB in their basic form or consider specific contexts, such as different security offenses <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b10">11]</ref>. An analysis of theoretical mechanisms in a general ISPCB context offer the possibility of better comparability and more specific use of the results with existing and future research <ref type="bibr" target="#b11">[12]</ref>. Currently, we cannot say whether current analyzed theories in ISPCB research differ in their predictive power and mechanisms in different countries because there is no common level of comparability. Therefore, the aim of this study is to investigate whether the predictive power of established theories and their mechanisms differ in different national cultures.</p><p>Our study addresses the mentioned gaps as follows. Using two of the most widely used theories in ISPCB research, the Deterrence Theory (DT) <ref type="bibr" target="#b7">[8]</ref> and the Protection Motivation Theory (PMT) <ref type="bibr" target="#b12">[13]</ref> we collected, analyzed and compared data sets with different cultural values from Germany, the USA and India using an SEM-PLS approach. We use the two theories mentioned above because they have different perspectives on ISPCB <ref type="bibr" target="#b2">[3]</ref>. Our analysis comprises of three aspects. First, we conduct invariance testing to validate that the measurement instruments measure the same theoretical construct across our cultures. Second, there is an established tradition in information systems research in general, of comparing research models that have been developed and tested in earlier work <ref type="bibr" target="#b13">[14]</ref>. Thus, we follow this approach and compare the predictive power and the mechanisms of the two theories <ref type="bibr" target="#b14">[15]</ref>. We test for statistical differences between the explained variance in ISPCB using a Multi Group Analysis.</p><p>The rest of the paper is structured as follows. In the second section, we look at the cultural dimensions that are the basis for our cross-cultural comparison and describe the analyzed theories DT and PMT. We then develop the research model and present the explorative hypotheses underlying this study in the third section. Subsequently, the results of the study are presented. The study concludes with a discussion, limitations, contributions and an outlook on further research potentials.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>2</head><p>Theoretical Background</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">The Concept of National Culture</head><p>The factor culture is an essential dimension that shapes an individual's behavior and can be described as a summary of ideologies, beliefs, basic assumptions, shared norms and values, that have an influence on the collective will <ref type="bibr" target="#b15">[16]</ref>. Existing research on information security and culture indicates a wide range of studies in which the influence of theoretical mechanisms on ISPCB are analyzed, based on national cultural differences. To apply these cultural differences, Hofstede's cultural dimensions provide a solid base for a comparison and are a widely used approach in information security research <ref type="bibr" target="#b8">[9]</ref>. The dimensions consist of the constructs power distance (PD), uncertainty avoidance (UA), individualism/collectivism (COL), Masculinity/Femininity (MAS) and long-term orientation (LO). Power distance determines the degree to which people accept and expect that power is distributed unequally. Uncertainty Avoidance defines the degree to which people feel uncomfortable with uncertainty and ambiguity.</p><p>Individualism is defined as a preference of individuals to take care of only themselves and their families. Collectivism is the opposite. Masculinity and Femininity can be related to tough vs. Tender cultures. According to Hofstede (2011) Masculinity represents values ass heroism, material rewards or success. Femininity is related to the preference for cooperation, modesty and quality of life. This orientation defines the degree to which long term values and traditions are balanced in contrast to thrift encouragement and efforts in modern solutions <ref type="bibr" target="#b16">[17]</ref>. We used Hofstede's cultural dimensions for two reasons. First, the dimensions have been rigorously developed and provide definitions for different cultural dimensions. Second, their application allows us to better integrate our theoretical findings in this stream of literature <ref type="bibr" target="#b6">[7]</ref>. We selected these three nations Germany, India and USA because, they have different values in Hofstede's cultural dimensions and thus, form a good basis for analyzing cultural differences at the national level. Table <ref type="table" target="#tab_0">1</ref> shows that India has a higher value for PD than Germany or the USA, which means in the Indian culture it is more likely to accept the unequal distribution of power than in the national culture of Germany or the USA. Uncertainty avoidance differs more between Germany and the USA and India, which shows that in German culture uncertainty and ambiguity are described as more uncomfortable than in the U.S. and India. The COL dimension is strongest for the USA and lowest for India. It shows that the national culture of the U.S.A has a strong bias for collective action in society instead of emphasizing individualism. The dimension MAS shows similarly high values in all three cultures. LO is more pronounced in India than in the USA or Germany and shows that Indian culture emphasizes long-term values and traditions instead of thrift encouragement and efforts in modern solutions. Overall, the three national cultures show a good distribution in the characteristics of the cultural dimensions according to Hofstede and are therefore well suited for carrying out an intercultural comparison at the national level.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Deterrence Theory in Information Security Research</head><p>The DT has its origin in criminology and has been widely used in information security research <ref type="bibr" target="#b7">[8]</ref>. The theory states that individuals will choose to commit an offence, if the benefits outweigh the underlying penalties. The DT further describes that the trade-off between benefits and the expected penalty can be further divided in different mechanisms, namely sanction certainty, sanction severity and sanction celerity <ref type="bibr" target="#b10">[11]</ref>.</p><p>When considering the DT in existing information security literature, a wide range of uses can be identified. The application of the original form of DT concentrates on the usage of formal sanctions to explain ISPCB, while other research additionally includes more informal consequences, such as informal sanctions like guilt and shame. Formal sanction severity is described as the formal expected amount of a penalty when a policy violation is committed, such as a fine or a warning, while an example for informal sanction severity could the loss of reputation among colleagues and superiors or shame. Formal sanction certainty describes the perceived probability of being formally punished if one is caught for an ISP non-compliant behavior, while informal sanction certainty describes probability of being informally punished by the social environment (e.g. at the workplace) <ref type="bibr" target="#b2">[3]</ref>. Sanction celerity describes the velocity a person is punished if a crime was committed <ref type="bibr" target="#b17">[18]</ref>. Both formal and informal sanction certainty and sanction celerity find empirical support in various contexts of information security research <ref type="bibr" target="#b18">[19]</ref>. Since sanction severity and sanction celerity are considered as the two main components of deterrence theory, since celerity has received less empirical support in information security research so far, we only considered formal and informal sanction severity and sanction celerity in our research model <ref type="bibr" target="#b10">[11]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Protection Motivation Theory in Information Security Research</head><p>The PMT has its origins in healthcare research. The theory states that a person, when confronted with a threat, cognitively weighs the threat and a possible related protective measure <ref type="bibr" target="#b19">[20]</ref>. After assessing the threat and potential countermeasures to cope with it, the individual decides to adopt an adaptive or non-adaptive behavior. Adaptive behaviors are recommended responses designed to protect against a threat, whereas non-adaptive responses involve behaviors in which the threat recipient avoids implementing a recommended response. PMT assumes that the susceptibility to threats and the severity of the threat have a positive effect on a person's behavior and adaptation. Similarly, in its adapted form, the PMT contains further constructs used to constitute the protection motivation, such as response effectiveness, self-efficacy to comply and response costs, which have a direct influence on behavior <ref type="bibr" target="#b20">[21]</ref>. Response cost describe the perceived extrinsic or intrinsic personal costs of performing the suggested adaptive behavior in terms of time, money or effort. Response efficacy is described as the perceived effectiveness of the behavior in mitigating or avoiding the perceived violation. Self-efficacy is defined as the confidence an individual possesses in effectively performing a recommended response and to complying with given ISP's.</p><p>Severity is defined as the perceptions of the seriousness of an information security violation. Susceptibility refers to the degree to which someone feels vulnerable to a specific violation of ISP's <ref type="bibr" target="#b12">[13]</ref>.</p><p>The constructs of the PMT find broad empirical support in information security research. <ref type="bibr" target="#b12">Menard et al. (2017)</ref> analyze the impact of PMT on the individual motivation of information technology users. Johnston and Warkentin (2010) developed their fearappeal model based on the PMT in order to convey the effectiveness of an antispyware software <ref type="bibr" target="#b21">[22]</ref>. <ref type="bibr" target="#b2">Moody et al. (2018)</ref> show that PMT constructs such as response efficacy, severity and susceptibility have an indirect effect on behavior <ref type="bibr" target="#b2">[3]</ref>. However, current information security research lacks on studies on the relationship between PMT constructs and national culture <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b19">20]</ref>. We, therefore, used the explained theoretical constructs of the PMT for our cross-cultural analysis.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>3</head><p>Research Approach</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Hypotheses development and Research Design</head><p>The hypotheses of a research project serve to answer the underlying research questions. However, in order to answer our research questions, we need to operationalize the theories we have introduced earlier in our study. The construct definitions from the DT and PMT were used to transfer the theories into a structural model displayed in Figure <ref type="figure" target="#fig_1">1</ref>. This becomes necessary because the results of the structural model are needed to determine the effect strengths of the respective theory components on ISPCB. They are used to determine the predictive power of the theories for ISPCB. We furthermore analyze different effect sizes between the constructs along different cultures to identify significant differences as it has been shown that differences in cultural values can have an influence on behavior <ref type="bibr" target="#b16">[17]</ref>. We draw on this argumentation and propose the following hypotheses: H1: The predictive power of DT and the model's mechanisms differ across cultures. H2: The predictive power of PMT and the model's mechanisms differ across cultures.</p><p>We conducted an empirical cross-cultural study to examine our underlying hypotheses. The operationalization of their variables follows a context-independent approach, measuring general ISPCB in order to make more generalized statements about the effectiveness of the theories and to compare their explanatory power throughout the culture samples <ref type="bibr" target="#b11">[12]</ref>. For the measurement of behavior, the items of D'Arcy and Lowry (2019) were used and generalized for our study. Furthermore, we used 7-point Likert scales for our questionnaires. The items for formal and informal  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>DT PMT</head><p>We used an SEM approach and the partial least squares (PLS) method to test the theoretical models, because it has fewer sample size requirements and is characterized by excellent prediction <ref type="bibr" target="#b23">[24]</ref>. We performed a cross-model comparison by using a multigroup analysis (MGA) to look for significant differences in the mean differences of the explained variance of our models across our samples as well as in the path coefficients of the analyzed theories (Welch-Satterthwait test) <ref type="bibr" target="#b24">[25]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Data collection, Sample Characteristics and Common-Method Bias</head><p>A pilot study was conducted by sending the survey to five academic experts for review. A test run was then started with 60 participants for each sample, where at least 30 results per sample were complete and valid. The crowdsourcing platforms Amazon Mechanical Turk and Clickworker were used to collect the data, taking into account the quality criteria for using crowd working platforms, defined by Lowry et al. ( <ref type="formula">2016</ref>) <ref type="bibr" target="#b25">[26]</ref>.</p><p>Only participants with their cultural background and origin from the respective sample (USA, India, Germany) were able to participate in our study. Their job acceptance rate on the platform must have been higher than 90%, and a certification of English language skills must be registered on the platform. We only selected participants which were employed, worked at least partially with a computer in their job and whose organization had an ISP. Additional attention checks were built into the study (e.g., requests to select a specific response) to avoid systematic response patterns. Participants were paid $1.65 for successful and conscientious participation in the study. In total, 767 people participated in the German survey, 623 in the survey within the USA and 481 people in the Indian survey. After applying the used quality criteria, the resulting samples consist of 422 (57%) valid responses collected in Germany, 263 (42%) in the USA and 252 (52%) in India. Demographic characteristics of the respondents were adapted from Hovav and D'Arcy (2012). The average age in all three countries is between 30 and 35 years. In all three countries, the proportion of men is higher than 60%. The majority of the participants work in a company with more than 1000 employees.</p><p>To carry out the common method bias test, we used the marker variable technique <ref type="bibr" target="#b26">[27]</ref> and chose the respondent's outside activities as the theoretically unrelated marker variable <ref type="bibr" target="#b22">[23]</ref>. The highest variance that the marker shares with another construct is less than 0.05. In addition, the path coefficients between the constructs showed no significant size changes (&gt; and not significant). In conclusion, the result suggests that there is no evidence of a common method bias in our study.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>4</head><p>Data Analysis and Results</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Measurement Models and Invariance Testing</head><p>To check our data for reliability, common quality criteria for reflective measurement models in IS research were applied to our study <ref type="bibr" target="#b27">[28]</ref>. We used individual item reliability, composite construct reliability (CR), and average variance extracted (AVE) as indicators of convergent validity for our models. The factor loadings of the items for the DT and PMT model were all above 0.70, which indicates sufficient item reliability <ref type="bibr" target="#b28">[29]</ref> (see appendix). The CR is higher than 0.70 for every variable used in each model, and the AVE is higher than 0.5 <ref type="bibr" target="#b27">[28]</ref>. We furthermore used the Fornell and Larcker criterion to confirm discriminant validity by showing that for each model, the AVE for each construct is higher than the variance shared with other constructs (see square root AVEs as bold numbers in Table <ref type="table" target="#tab_1">2</ref>). <ref type="bibr" target="#b29">[30,</ref><ref type="bibr" target="#b30">31]</ref>. In summary, our results indicate that our measurement model is acceptable and reliable. Additionally, we tested for configural and metric measurement invariance. This step is necessary to create the ability to further analyze differences in the predictive power of the theories in a cross cultural manner <ref type="bibr" target="#b31">[32]</ref>. Only if the charges of the similar items are invariant across groups, differences in the item scores can be meaningfully compared to the extent that they indicate similar group differences in the underlying construct <ref type="bibr" target="#b32">[33]</ref>. To measure invariance, we performed a MGA and tested the differences in item loadings for all models between the three samples. We were not able to find significant differences between the item loadings of our samples and thus show metric invariance and comparability of our results.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Testing Theoretical Mechanisms across Cultures</head><p>We have tested the previously introduced path models with the PLS algorithm for estimating the structural model. We used the bootstrapping method to determine the significance of the path coefficients with 5000 bootstrap samples <ref type="bibr" target="#b27">[28]</ref>. An overview of our significance levels of the individual path coefficients for all three models is given in Table <ref type="table" target="#tab_2">3</ref>. While formal sanction certainty and informal sanction severity have a significant impact in all three models, formal sanction severity only applies to India and informal sanction certainty only to Germany. The mechanisms of PMT are almost equally applicable to all three cultures. While response efficacy, self-efficacy and susceptibility are applicable in all three models and severity has no significant effect in all of them, response cost is only significantly applied in the USA model.</p><p>We additionally identified some significant effects of our control variables (see appendix). Age has a significant effect on ISPCB in at least one of the samples for each theory. The company size and industry only have an influence in the DT model. Education affects at least one sample for each theory. For gender, only one significant effect can be found in the PMT model.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3">Comparing the Predictive Power across Cultures</head><p>In order to determine the predictive power of the theories and then compare them, we first considered the path coefficients of the individual models and determined whether significant differences exist in their height <ref type="bibr" target="#b24">[25]</ref>. In the second step we compared the explained variance and also investigated whether significant differences exist. As analyzed in the previous chapter, different significances can be identified in the path coefficients of the DT models. However, it can be observed that only significant path differences can be identified in the informal sanctions. For example, ISC in the USA model is significantly higher than in the German model (significant at 0.1). The same difference can be found for ISS. The PMT model was tested using five different constructs. Response efficacy has a significant effect on ISPCB in all three models, whereas the effect in the USA is significantly higher than in Germany and India. There is a significant effect of self-efficacy on ISPCB in all models where the path coefficient in the Indian is significantly higher as in the USA and German one (significant at 0.1). When interpreting the explained variance, the acceptable values depend on the research context <ref type="bibr" target="#b28">[29]</ref>. In general, a proportion of the explained variance of an endogenous variable is considered low up to 0.32, moderate from 0.33 and substantial from 0.67. The R² adjusted in the DT model is in the medium range for the USA (0.350) and India (0.327), for the German sample slightly below the 0.32 limit at 0.291. However, the MGA showed that the difference between Germany and USA and Germany and India is significant (significant at 0.05). For the PMT models, all R² adjusted are in the medium range, whereas only the value for Germany is below 0.4 (0.358) and significantly different compared to the USA (0.520) and Indian (0.580) sample (significant at 0.05). The R² adjusted values for the PMT and DT model are above average <ref type="bibr" target="#b7">[8]</ref>. The differences in the R² values may result from the different operationalisation of the theories, as we use basic models or have no further contextspecific extensions in our models. Along the investigated theories we can see that there are significant differences in the path coefficients of the theories as well as in the R² of the models.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Discussion</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1">Implications for Research and Practice</head><p>Our results show implications for research as well as for practice. The main purpose of this analysis was to empirically evaluate and compare the predictive power of the DT and PMT along three different national cultures. The results of the analysis provide different insights into the cultural differences when applying the theories and show interesting theoretical contributions. First, by applying configural and metric invariance between our cultural samples, we can show that our used models and items of the DT and PMT are understood in the same way across different cultures <ref type="bibr" target="#b32">[33]</ref>. These results are the basic prerequisite for a comparison of the theories between the national cultures. Secondly, we were able to show that there are differences in the predictive power of DT and PMT mechanisms. We could show for our context that the theories have a small to medium-strong explanatory power. Significant differences along the cultures exist in the DT model between USA and Germany. In addition, we were able to show in our study that the PMT constructs response efficacy and self-efficacy explains the ISPCB significantly better in India and the USA than in Germany. Furthermore, our results show different effects for the effectiveness of formal sanctions in the USA than in existing research <ref type="bibr" target="#b6">[7]</ref>. Our results provide important information on the effectiveness of models on ISPCB in order to define what types of measures are appropriate to ensure ISPCB in an international context. These findings indicate that ISPCB research needs to consider cultural differences in the use of DT and PMT. Our results provide a basis for more specific investigation, such as analysing the effects of individual cultural dimensions on the mechanisms of the theories analysed. Finally, we can contribute to a broader consideration of intercultural comparisons between more than two nations since we integrated national samples such as Germany and India which were previously less considered in cross-cultural research of ISPCB <ref type="bibr" target="#b5">[6]</ref>. Practitioners can also benefit from the conclusions of our results. Our findings underline the relevance of a cultural differentiation of measures for the management of security breaches. Overall, in the future, it will be important to consider cultural differences when using security measures to positively influence ISPCB. Companies should pay attention to the fact that the measures work differently in different international locations. They should be designed with a culture-specific mode of operation in mind. An example of such differences is the use of sanctions. While our results show that the severity of an expected formal punishment in different cultures tends to be less effective ISPCB, the sole high probability that a formal punishment is to be expected is comparatively more effective.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2">Limitations and Future Research</head><p>For an adequate interpretation of our results, the following limitations of the study should be considered. On the one hand, we measured general ISPCB and did not specifically refer to one or more contexts. The general validity of our results cannot be proven by the fact that cultural differences can be context specific. Future research can take up this aspect and examine our results as a starting point for cultural differences in specific ISPCB contexts. Secondly, in order to compare different cultures, we have used three example cultures, which differ in their cultural dimensions according to <ref type="bibr" target="#b16">[17]</ref>. Thus, our results are limited to the cultures we selected. In order to find out more about the differences between cultures, we need to involve further culture samples and take a closer look at the direct influences of cultural dimensions on specific behaviour. Furthermore, we could not consider the problem of a cultural shift in detail. For example, our samples from the different countries could be influenced by the individual cultural values of each subject. In order to obtain a detailed consideration of cultural values on the studied theoretical constructs and ISPCB, future studies should also measure culture on an individual level and investigate it in terms of its influence on ISPCB. <ref type="bibr" target="#b6">[7]</ref>. Third, moderating factors could only partially be addressed in our work. More detailed differences and the involvement or deepening of other factors, such as an industry-specific investigation or an analysis based on different educational backgrounds, will be subjected to future research.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusion</head><p>Studies on the analysis of ISPCB often show the need to consider their results from different cultural perspectives. However, existing studies in this area rarely take an empirical approach, look at given problems from different theoretical lenses and put the results into context. This study is the first to empirically test and compare three prominent theories that are often used to explain ISPCB. Furthermore, we were able to identify different types of effects in different cultures and that their effect strength can vary. Interestingly, both strong similarities and differences can be identified across theories. Other interesting aspects are constant effects along the three cultures analyzed, such as attitude or susceptibility as an effective factor for explaining ISPCB. Our results give a first impression of cultural differences in the effectiveness of different theoretical models and provide a starting point for the design and implementation of ISP's in an international environment. In summary, future research on ISPCB and culture should be based on these results when deciding for or against a theoretical lens and should conduct more specific analyses.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>sanction severity and -certainty of the DT (3 items each) were adapted by Moody et al. (2018) and rephrased for our study [3]. The items used for the constructs response cost and response efficacy of the PMT were adapted by Floyd et al. (2000) (4 items each). Self-efficacy, severity and susceptibility were taken from Menard et al. (2017) and adapted (3 items each)<ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b19">20]</ref>. The used questions per item are listed in the appendix.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 1 .</head><label>1</label><figDesc>Figure 1. Research Models of DT and PMT.</figDesc><graphic coords="6,130.32,261.36,141.48,129.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 .</head><label>1</label><figDesc>Comparison of Cultural Dimensions between Nations</figDesc><table><row><cell>Cultural Dimension</cell><cell cols="2">Country Score</cell><cell></cell></row><row><cell></cell><cell>Germany</cell><cell>USA</cell><cell>India</cell></row><row><cell>Power Distance</cell><cell>35</cell><cell>40</cell><cell>77</cell></row><row><cell>Uncertainty Avoidance</cell><cell>65</cell><cell>46</cell><cell>40</cell></row><row><cell>Collectivism</cell><cell>67</cell><cell>91</cell><cell>48</cell></row><row><cell>Masculinity/Femininity</cell><cell>66</cell><cell>62</cell><cell>56</cell></row><row><cell>Long Term Orientation</cell><cell>31</cell><cell>29</cell><cell>61</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2 .</head><label>2</label><figDesc>Inter-construct correlations, construct reliability, and average variance extracted of Deterrence Theory Model.</figDesc><table><row><cell cols="2">Samples and Items</cell><cell>CR</cell><cell>AVE</cell><cell>FSC</cell><cell>FSS</cell><cell>ISC</cell><cell>ISS</cell><cell>ISPCB</cell></row><row><cell>Germany</cell><cell>FSC FSS ISC</cell><cell>0.884 0.917 0.913</cell><cell>0.719 0.786 0.778</cell><cell>0.848 0.581 0.468</cell><cell>0.887 0.496</cell><cell>0.882</cell><cell></cell></row><row><cell></cell><cell>ISS</cell><cell>0.919</cell><cell>0.79</cell><cell>0.409</cell><cell>0.551</cell><cell>0.649</cell><cell>0.889</cell></row><row><cell></cell><cell>ISPCB</cell><cell>0.938</cell><cell>0.834</cell><cell>0.347</cell><cell>0.318</cell><cell>0.428</cell><cell>0.378</cell><cell>0.913</cell></row><row><cell></cell><cell>FSC</cell><cell>0.85</cell><cell>0.654</cell><cell>0.809</cell><cell></cell><cell></cell><cell></cell></row><row><cell>USA</cell><cell>FSS ISC</cell><cell>0.87 0.903</cell><cell>0.693 0.757</cell><cell>0.618 0.404</cell><cell>0.832 0.447</cell><cell>0.87</cell><cell></cell></row><row><cell></cell><cell>ISS</cell><cell>0.881</cell><cell>0.713</cell><cell>0.366</cell><cell>0.451</cell><cell>0.667</cell><cell>0.844</cell></row><row><cell></cell><cell>ISPCB</cell><cell>0.918</cell><cell>0.789</cell><cell>0.399</cell><cell>0.373</cell><cell>0.394</cell><cell>0.491</cell><cell>0.888</cell></row></table><note>Notes (also for following tables): FSC = Formal Sanction Certainty. FSS = Formal Sanction Severity. ISC = Informal Sanction Certainty. ISS = Informal Sanction Severity. RC = Response Cost. REF = Response Efficacy. SEF = Self Efficacy. SEV = Severity. SUS = Susceptibility. The bold numbers on the leading diagonal are the square root of the AVE. *significant at 0.1; ** significant at 0.05; *** significant at 0.01.</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 3 .</head><label>3</label><figDesc>Structural Models of DT and PMT Research Model.</figDesc><table><row><cell></cell><cell>Germany</cell><cell>USA</cell><cell>India</cell><cell>Germany /</cell><cell>Germany /</cell><cell>USA /</cell></row><row><cell>Model Path</cell><cell></cell><cell></cell><cell></cell><cell>USA</cell><cell>India</cell><cell>India</cell></row><row><cell></cell><cell cols="2">Path Coefficients</cell><cell></cell><cell cols="2">Significant Effect Differences</cell><cell></cell></row><row><cell cols="2">Deterrence Theory</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>FSC -&gt; ISPC</cell><cell>0.150***</cell><cell>0.211***</cell><cell>0.252***</cell><cell>NS</cell><cell>NS</cell><cell>NS</cell></row><row><cell>FSC -&gt; ISPCB</cell><cell>0.018</cell><cell>0.052</cell><cell>0.124*</cell><cell>NS</cell><cell>NS</cell><cell>NS</cell></row><row><cell>ISC -&gt; ISPCB</cell><cell>0.196***</cell><cell>0.058</cell><cell>0.105</cell><cell>S*</cell><cell>NS</cell><cell>NS</cell></row><row><cell>ISS -&gt; ISPCB</cell><cell>0.164***</cell><cell>0.372***</cell><cell>0.213***</cell><cell>S*</cell><cell>NS</cell><cell>NS</cell></row><row><cell cols="2">Protection Motivation Theory</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>RC -&gt; ISPCB</cell><cell>-0.049</cell><cell>-0.086*</cell><cell>-0.011</cell><cell>NS</cell><cell>NS</cell><cell>NS</cell></row><row><cell>REF -&gt; ISPCB</cell><cell>0.149***</cell><cell>0.307***</cell><cell>0.207***</cell><cell>S*</cell><cell>NS</cell><cell>S**</cell></row><row><cell>SEF -&gt; ISPCB</cell><cell>0.324***</cell><cell>0.296***</cell><cell>0.467***</cell><cell>NS</cell><cell>S*</cell><cell>S*</cell></row><row><cell>SEV -&gt; ISPCB</cell><cell>-0.062</cell><cell>-0.033</cell><cell>-0.049</cell><cell>NS</cell><cell>NS</cell><cell>NS</cell></row><row><cell>SUS -&gt; ISPCB</cell><cell>0.279***</cell><cell>0.220***</cell><cell>0.279***</cell><cell>NS</cell><cell>NS</cell><cell>NS</cell></row></table></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Appendix</head></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Don&apos;t Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">B</forename><surname>Barlow</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Warkentin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Ormond</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">R</forename><surname>Dennis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of the Association for Information Systems</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">B</forename><surname>Lowry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">D</forename><surname>Moody</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Info Systems J</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="page" from="433" to="463" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Toward a Unified Model of Information Security Policy Compliance</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">D</forename><surname>Moody</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Siponen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Pahnila</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">MIS Quarterly</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="page" from="285" to="311" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives</title>
		<author>
			<persName><forename type="first">R</forename><surname>Willison</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Warkentin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">C</forename><surname>Johnston</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Info Systems J</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="page" from="266" to="293" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">A</forename><surname>Cram</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>D'arcy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">G</forename><surname>Proudfoot</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">MISQ</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="page" from="525" to="554" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Future directions for behavioral information security research</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">E</forename><surname>Crossler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">C</forename><surname>Johnston</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">B</forename><surname>Lowry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Warkentin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Baskerville</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Security</title>
		<imprint>
			<biblScope unit="volume">32</biblScope>
			<biblScope unit="page" from="90" to="101" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea</title>
		<author>
			<persName><forename type="first">A</forename><surname>Hovav</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>D'arcy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information &amp; Management</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="page" from="99" to="110" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research</title>
		<author>
			<persName><forename type="first">S</forename><surname>Trang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Brendel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Inf Syst Front</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="page" from="1265" to="1284" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Information Security Behavior: A Cross-Cultural Comparison of Irish and US Employees</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">Y</forename><surname>Connolly</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">S</forename><surname>Wall</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems Management</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="page" from="306" to="322" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Individuals&apos; Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">M</forename><surname>Zahedi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">MISQ</title>
		<imprint>
			<biblScope unit="volume">40</biblScope>
			<biblScope unit="page" from="205" to="222" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings</title>
		<author>
			<persName><forename type="first">J</forename><surname>D'arcy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Herath</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">European Journal of Information Systems</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="page" from="643" to="658" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Generally Speaking, Context Matters: Making the Case for a Change from Universal to Particular ISP Research</title>
		<author>
			<persName><forename type="first">S</forename><surname>Aurigemma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Mattson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of the Association for Information Systems</title>
		<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory</title>
		<author>
			<persName><forename type="first">P</forename><surname>Menard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">J</forename><surname>Bott</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">E</forename><surname>Crossler</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Management Information Systems</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="page" from="1203" to="1230" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">The Role of Espoused National Cultural Values in Technology Acceptance</title>
		<author>
			<persName><forename type="first">Karahanna</forename><surname>Srite</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">MISQ</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="page">679</biblScope>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Technology adoption decisions in the household: A seven-model comparison</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Brown</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Venkatesh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Hoehle</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J Assn Inf Sci Tec</title>
		<imprint>
			<biblScope unit="volume">66</biblScope>
			<biblScope unit="page" from="1933" to="1949" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Review: a review of culture in information systems research: toward a theory of information technology culture conflict</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">F</forename><surname>Leidner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Kayworth</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">MIS Quarterly</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<author>
			<persName><forename type="first">G</forename><surname>Hofstede</surname></persName>
		</author>
		<title level="m">Culture&apos;s consequences. Comparing values, behaviors, institutions, and organizations across nations</title>
				<meeting><address><addrLine>Thousand Oaks, Calif</addrLine></address></meeting>
		<imprint>
			<publisher>Sage Publ</publisher>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures</title>
		<author>
			<persName><forename type="first">A</forename><surname>Vance</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Siponen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">W</forename><surname>Straub</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information &amp; Management</title>
		<imprint>
			<biblScope unit="volume">57</biblScope>
			<biblScope unit="page">103212</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research</title>
		<author>
			<persName><forename type="first">R</forename><surname>Willison</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">B</forename><surname>Lowry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Paternoster</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">JAIS</title>
		<imprint>
			<biblScope unit="page" from="1187" to="1216" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">A Meta-Analysis of Research on Protection Motivation Theory</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">L</forename><surname>Floyd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Prentice-Dunn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">W</forename><surname>Rogers</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Applied Social Psychology</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="page" from="407" to="429" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Impact of Protection Motivation and Deterrence on IS Security Policy Compliance: A Multi-Cultural View</title>
		<author>
			<persName><forename type="first">M</forename><surname>Warkentin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Malimage</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Malimage</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">WISP</title>
		<imprint>
			<biblScope unit="volume">2012</biblScope>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Fear Appeals and Information Security Behaviors: An Empirical Study</title>
		<author>
			<persName><forename type="first">Warkentin</forename><surname>Johnston</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">MIS Quarterly</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="page">549</biblScope>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Cognitive-affective drivers of employees&apos; daily compliance with information security policies: A multilevel, longitudinal study</title>
		<author>
			<persName><forename type="first">J</forename><surname>D'arcy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">B</forename><surname>Lowry</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Info Systems J</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="page" from="43" to="69" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Editor&apos;s Comments: A Critical Look at the Use of PLS-SEM in</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ringle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Straub</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">MIS Quarterly</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
	<note>MIS Quarterly</note>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture</title>
		<author>
			<persName><forename type="first">W</forename><surname>Rocha Flores</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Antonsen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ekstedt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Security</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="page" from="90" to="110" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Cargo Cult&quot; science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">B</forename><surname>Lowry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>D'arcy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Hammer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">D</forename><surname>Moody</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Journal of Strategic Information Systems</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="page" from="232" to="240" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Accounting for common method variance in cross-sectional research designs</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">K</forename><surname>Lindell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">J</forename><surname>Whitney</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Applied Psychology</title>
		<imprint>
			<biblScope unit="volume">86</biblScope>
			<biblScope unit="page" from="114" to="121" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">F</forename><surname>Hair</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">T M</forename><surname>Hult</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">M</forename><surname>Ringle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sarstedt</surname></persName>
		</author>
		<title level="m">A primer on partial least squares structural equation modeling (PLS-SEM)</title>
				<meeting><address><addrLine>Los Angeles, London, New Delhi, Singapore, Washington DC, Melbourne</addrLine></address></meeting>
		<imprint>
			<publisher>SAGE</publisher>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">F</forename><surname>Hair</surname></persName>
		</author>
		<title level="m">A primer on partial least squares structural equation modeling (PLS-SEM</title>
				<meeting><address><addrLine>Los Angeles</addrLine></address></meeting>
		<imprint>
			<publisher>Sage Publ</publisher>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Issues and Opinion on Structural Equation Modeling</title>
		<author>
			<persName><forename type="first">W</forename><surname>Chin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">MIS Quarterly</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Evaluating Structural Equation Models with Unobservable Variables and Measurement Error</title>
		<author>
			<persName><forename type="first">C</forename><surname>Fornell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">F</forename><surname>Larcker</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Marketing Research</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="page">39</biblScope>
			<date type="published" when="1981">1981</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Data Collection in the Digital Age: Innovative Alternatives to Student Samples</title>
		<author>
			<persName><forename type="first">Z</forename><forename type="middle">R</forename><surname>Steelman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">I</forename><surname>Hammer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Limayem</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">MISQ</title>
		<imprint>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="page" from="355" to="378" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Testing measurement invariance of composites using partial least squares</title>
		<author>
			<persName><forename type="first">J</forename><surname>Henseler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">M</forename><surname>Ringle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sarstedt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Marketing Review</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="page" from="405" to="431" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
