Exploring the influences of implementation intention on information security behaviors

Gen Yih Liao*, Chia Min Wang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

Although information security knowledge is spreading and management tools are improving, information security incidents remain widely heard. Studies have investigated information security behaviors through motivational theories like the Theory of Planned Behavior. Since implementation intentions are considered as a behavior changing technique that may overcome goal deviations, this paper attempts to explore information security behaviors from the volitional perspective. Synthesizing the findings of twelve implementation intention studies, the proposed research model postulates that implementation intention intervention may affect information security behaviors. Besides, the moderating effects of two factors are included in the research model: difficulty of information security behaviors and strength of commitment to the goal intention. This research-in-progress paper describes the experimental methodology and provides instruments to validate the proposed model. The results are expected to establish the importance of action plans in improving information security behaviors.

Original languageEnglish
Title of host publication17th Americas Conference on Information Systems 2011, AMCIS 2011
Pages4153-4163
Number of pages11
StatePublished - 2011
Event17th Americas Conference on Information Systems 2011, AMCIS 2011 - Detroit, MI, United States
Duration: 04 08 201108 08 2011

Publication series

Name17th Americas Conference on Information Systems 2011, AMCIS 2011
Volume5

Conference

Conference17th Americas Conference on Information Systems 2011, AMCIS 2011
Country/TerritoryUnited States
CityDetroit, MI
Period04/08/1108/08/11

Keywords

  • Experimental design
  • Goal conflict
  • Implementation intention
  • Information security behavior

Fingerprint

Dive into the research topics of 'Exploring the influences of implementation intention on information security behaviors'. Together they form a unique fingerprint.

Cite this