Title Page
Contents
ABSTRACT 12
1. Introduction 15
1.1. Backgrounds and Motivation 15
1.2. The Objectives and Contributions 20
1.3. Research Procedure 21
1.4. Organization of the Thesis 22
2. Literature Review 23
2.1. Ethical Decision Making Theory 25
2.2. General Deterrence Theory 29
2.3. Neutralization Theory 33
2.4. Protection Motivation Theory 39
2.5. Social Bonding Theory 43
2.6. Social Learning Theory 48
2.7. Alternative Approach 51
3. Research Model and Hypotheses 55
3.1. Research Model 55
3.2. Hypotheses 61
3.2.1. Perceived Benefit 61
3.2.2. Techno-Stress 62
3.2.3. Organizational Commitment 63
3.2.4. Perceived Security Climate 63
3.2.5. Security Policy Effectiveness 64
3.2.6. Security Awareness Programs 66
3.2.7. Systems Quality 67
3.2.8. Systems Vulnerability 68
3.2.9. Persistent Attitude toward Compliance 68
3.2.10. Subjective Norms 69
3.2.11. Perceived Behavioral Control 70
3.3. Summary of Hypotheses 71
4. Research Methodology 72
4.1. Instrument Development 72
4.2. Data Collection and Subjects 82
4.3. Sample Characteristics 86
4.4. Non-response Bias Test 86
5. Data Analysis and Results 89
5.1. Control variables 89
5.2. Common Method Variance 90
5.3. Assessment of Measurement Model 98
5.4. Confirmatory Factor Analysis 105
5.5. Dimensionality 113
5.6. Hypotheses Testing 123
5.7. Mediation Analysis 132
6. Conclusions 137
6.1. Summary of Findings 137
6.2. Implications for Practice 140
6.3. Limitations of the Research 141
6.4. Directions of Future Research 141
REFERENCE 143
Appendix 163
APPENDIX A. THE FOUR DIMENSIONS OF IS SECURITY 163
APPENDIX B. COMPETING MODEL 164
APPENDIX C. QUESTIONNAIRE 169
APPENDIX D. A VARIETY OF STATISTICAL CRITERIA 177
〈Table 2.1〉 Terms Relating to the Ethical Behavior 23
〈Table 2.2〉 Terms Relating to the Ethical Behavior(Cont.) 24
〈Table 4.1〉 Demographic Characteristics of Respondents 84
〈Table 4.2〉 Relevant Characteristics of Respondents 85
〈Table 4.3〉 Independent Samples Test 88
〈Table 5.1〉 Partial Correlation of Latent Constructs 97
〈Table 5.2〉 KMO and Bartlett's Test 99
〈Table 5.3〉 Exploratory Factor Analysis and Reliability 102
〈Table 5.4〉 Exploratory Factor Analysis and Reliability(Cont.) 103
〈Table 5.5〉 Exploratory Factor Analysis and Reliability(Cont.) 104
〈Table 5.6〉 Confirmatory Factor Analysis 107
〈Table 5.7〉 Confirmatory Factor Analysis(Cont.) 108
〈Table 5.8〉 Confirmatory Factor Analysis(Cont.) 109
〈Table 5.9〉 Test for Discriminant Validity 112
〈Table 5.10〉 Model Comparison for Second-order Factor 122
〈Table 5.11〉 Overall Model Fit Indices 124
〈Table 5.12〉 Summary of Research Results 131
〈Table 5.13〉 Summary of Mediation Analysis Results 136
〈Table B.1〉 Overall Model Fit Indices 165
〈Table B.2〉 Fit Comparisons 168
〈Table D.1〉 Guidelines for Identifying Significant Factor Loadings 177
〈Table D.2〉 Cutoff Value Criteria for Reliability 177
〈Table D.3〉 Cutoff Value Criteria for Validity 178
〈Table D.4〉 Cutoff Value Criteria for Fit Indices 179
〈Figure 1.1〉 Overall Research Procedures of This Study 21
〈Figure 2.1〉 An Issue-Contingent Model of Ethical Decision Making in... 25
〈Figure 2.2〉 General Theory of Ethics(Hunt and Vitell 2006) 28
〈Figure 2.4〉 A Schema of Protection motivation Theory... 40
〈Figure 2.5〉 A Summary of Previous Studies with Variables 51
〈Figure 2.6〉 A Comprehensive Approach to Information Security 53
〈Figure 3.1〉 Research Model 59
〈Figure 5.1〉 Model 1 : One Factor Model 115
〈Figure 5.2〉 Model 2 : First-order model(Uncorrelated and Correlated with zero) 116
〈Figure 5.3〉 Model 3 : First-order model(Freely Correlated and Correlated with one) 117
〈Figure 5.4〉 Model 4 : Second-order Model 119
〈Figure 5.5〉 Model 5 : Independent Effects of Individual Dimensions 121
〈Figure 5.6〉 Model 5 : Complementarity of the Five Dimensions 122
〈Figure 5.7〉 Results of Structural Model Analysis 127
〈Figure 5.8〉 Results of Structural Model Analysis(Cont'd) 128
〈Figure 5.9〉 Direct and Indirect Effects 132
〈Figure A.1〉 The Four Dimensions of IS Security 163
〈Figure B.1〉 Results of Structural Model Analysis 164
〈Figure B.2〉 Results of Structural Model Analysis(Strong Attitude Group) 166
〈Figure B.3〉 Results of Structural Model Analysis(Weak Attitude Group) 167