Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Trinity University

2020

Information systems security

Articles 1 - 1 of 1

Full-Text Articles in Business

A Conceptual Replication Of The Unified Model Of Information Security Policy Compliance, Diana K. Young, D. Carpenter, A. Mcleod Jan 2020

A Conceptual Replication Of The Unified Model Of Information Security Policy Compliance, Diana K. Young, D. Carpenter, A. Mcleod

School of Business Faculty Research

Conceptual replications offer robust tests of theory by subjecting the relational notions of a scientific model to evaluation using alternate instruments, treatments, and subject pools. This study performs a conceptual replication of Moody, Siponen, and Pahnila’s 2018 empirical analysis that integrated elements of eleven theoretical models to produce the unified model of information security policy compliance (UMISPC). This replication employed a substantially more parsimonious instrument, using modestly revised treatment scenarios targeted toward a U.S. audience of 218 IT professionals as opposed to the Finnish graduate students used in the original study. Our results indicate that UMISPC is robust across variations …