{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T19:06:11Z","timestamp":1732043171943},"reference-count":143,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T00:00:00Z","timestamp":1700611200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Information Systems Journal"],"published-print":{"date-parts":[[2024,7]]},"abstract":"Abstract<\/jats:title>Organisational information security (ISec) protection is undergoing a turbulent shift in the workplace environment. In an environment of ever\u2010increasing risks of insider threats and external cyberattacks, individual employees are often expected to take the initiative to solve organisational security problems. This study therefore focuses on employees' proactive information security behaviours<\/jats:italic> (ISBs)\u2014behaviours that are self\u2010initiated, change\u2010oriented, and future\u2010focused\u2014and the motivations that compel employees to protect organisational assets. We ground our study in Parker et al. (2010) proactive motivation theory (ProMT) and develop an integrated multilevel model to examine the respective effects of proactive motivational states, that is, can\u2010do<\/jats:italic>, reason\u2010to<\/jats:italic>, and energised\u2010to<\/jats:italic> motivations, on employees' proactive ISBs. We also explore the roles of individual differences and contextual factors\u2014namely, proactive personality and supervisory ISec support\u2014and their influences on proactive motivational states. Data were collected from 210 employees situated in 55 departments distributed among multiple organisations located in China. The results show that supervisory ISec support positively influences employees' proactive motivational states and thereby boosts employees' proactive ISBs. Proactive personality negatively moderates the effect of supervisory ISec support on flexible security role orientation (reason\u2010to motivation). By identifying the antecedents of employees' proactive ISBs, we make key theoretical contributions to ISec research and valuable practical contributions to organisational ISec management.<\/jats:p>","DOI":"10.1111\/isj.12488","type":"journal-article","created":{"date-parts":[[2023,11,24]],"date-time":"2023-11-24T23:59:40Z","timestamp":1700870380000},"page":"1144-1174","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["The antecedents of employees' proactive information security behaviour: The perspective of proactive motivation"],"prefix":"10.1111","volume":"34","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4394-1631","authenticated-orcid":false,"given":"Feng","family":"Xu","sequence":"first","affiliation":[{"name":"College of Business University of Michigan\u2010Dearborn Dearborn Michigan USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6545-9467","authenticated-orcid":false,"given":"Carol","family":"Hsu","sequence":"additional","affiliation":[{"name":"Business School The University of Sydney Sydney New South Wales Australia"}]},{"given":"Tawei (David)","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Accounting & MIS DePaul University Chicago Illinois USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0187-5808","authenticated-orcid":false,"given":"Paul Benjamin","family":"Lowry","sequence":"additional","affiliation":[{"name":"Pamplin College of Business, Virginia Tech Blacksburg Virginia USA"}]}],"member":"311","published-online":{"date-parts":[[2023,11,22]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/02678370903282600"},{"key":"e_1_2_10_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102030"},{"key":"e_1_2_10_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224377701400320"},{"key":"e_1_2_10_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02723327"},{"key":"e_1_2_10_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2017.1318687"},{"key":"e_1_2_10_7_1","first-page":"154","volume-title":"Handbook of personality","author":"Bandura A.","year":"1999"},{"issue":"2","key":"e_1_2_10_8_1","first-page":"285","article-title":"The partial least squares (PLS) approach to causal modeling: Personal computer adoption and use as an illustration","volume":"2","author":"Barclay D.","year":"1995","journal-title":"Technology Studies"},{"issue":"8","key":"e_1_2_10_9_1","first-page":"308","article-title":"Don't even think about it! The effects of antineutralization, informational, and normative communication on information security compliance","volume":"19","author":"Barlow J. B.","year":"2018","journal-title":"Journal of the Association for Information Systems"},{"key":"e_1_2_10_10_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1990.tb00417.x"},{"key":"e_1_2_10_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.4030140202"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2019.0900"},{"key":"e_1_2_10_13_1","first-page":"401","volume-title":"Advances in measurement and data analysis","author":"Bliese P. D.","year":"2002"},{"key":"e_1_2_10_14_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.90.4.740"},{"key":"e_1_2_10_15_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.4.5"},{"key":"e_1_2_10_16_1","first-page":"349","volume-title":"Handbook of cross\u2010cultural psychology","author":"Brislin R. W.","year":"1980"},{"key":"e_1_2_10_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2014.03.019"},{"key":"e_1_2_10_18_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.91.3.717"},{"key":"e_1_2_10_19_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"e_1_2_10_20_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2019.0860"},{"key":"e_1_2_10_21_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2022.1133"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1108\/JMP-01-2016-0002"},{"key":"e_1_2_10_23_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0032663"},{"key":"e_1_2_10_24_1","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-12-2017-0421"},{"key":"e_1_2_10_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/peps.12104"},{"key":"e_1_2_10_26_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2021.1014"},{"issue":"22","key":"e_1_2_10_27_1","first-page":"1","article-title":"Is transformational leadership always good for employee task performance? Examining curvilinear and moderated relationships","volume":"12","author":"Chen Y.","year":"2018","journal-title":"Frontiers of Business Research in China"},{"key":"e_1_2_10_28_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222290305"},{"key":"e_1_2_10_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.09.009"},{"key":"e_1_2_10_30_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2020\/15477"},{"key":"e_1_2_10_31_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1464-0597.2005.00221.x"},{"key":"e_1_2_10_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.04.048"},{"key":"e_1_2_10_33_1","doi-asserted-by":"publisher","DOI":"10.2307\/249749"},{"key":"e_1_2_10_34_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2019\/15117"},{"key":"e_1_2_10_35_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.80.4.532"},{"key":"e_1_2_10_36_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"e_1_2_10_37_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12173"},{"key":"e_1_2_10_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.leaqua.2005.12.004"},{"key":"e_1_2_10_39_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.53.6.1024"},{"key":"e_1_2_10_40_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327965PLI1104_01"},{"key":"e_1_2_10_41_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0024903"},{"key":"e_1_2_10_42_1","first-page":"21","volume-title":"Trust and distrust in organizations: Dilemmas and approaches","author":"Dirks K. T.","year":"2004"},{"key":"e_1_2_10_43_1","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2016.0086"},{"key":"e_1_2_10_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.03.004"},{"key":"e_1_2_10_45_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"key":"e_1_2_10_46_1","doi-asserted-by":"publisher","DOI":"10.1037\/1089-2680.2.3.300"},{"key":"e_1_2_10_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0191-3085(01)23005-6"},{"key":"e_1_2_10_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvb.2009.05.008"},{"key":"e_1_2_10_49_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.1780"},{"key":"e_1_2_10_50_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.322"},{"key":"e_1_2_10_51_1","doi-asserted-by":"publisher","DOI":"10.2307\/23044042"},{"key":"e_1_2_10_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2014.2374011"},{"key":"e_1_2_10_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.riob.2008.04.002"},{"key":"e_1_2_10_54_1","doi-asserted-by":"publisher","DOI":"10.1108\/INTR-06-2019-0260"},{"key":"e_1_2_10_55_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12202"},{"key":"e_1_2_10_56_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.2319"},{"key":"e_1_2_10_57_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12257"},{"key":"e_1_2_10_58_1","volume-title":"Multivariate Data Analysis","author":"Hair J. F.","year":"2010"},{"key":"e_1_2_10_59_1","doi-asserted-by":"publisher","DOI":"10.2307\/249656"},{"key":"e_1_2_10_60_1","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.44.3.513"},{"key":"e_1_2_10_61_1","doi-asserted-by":"publisher","DOI":"10.1177\/0265407590074004"},{"key":"e_1_2_10_62_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.1.170"},{"key":"e_1_2_10_63_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2013.0501"},{"key":"e_1_2_10_64_1","doi-asserted-by":"publisher","DOI":"10.1037\/apl0000064"},{"key":"e_1_2_10_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2011.12.005"},{"key":"e_1_2_10_66_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2015.0569"},{"key":"e_1_2_10_67_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2012.00361.x"},{"key":"e_1_2_10_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103252"},{"key":"e_1_2_10_69_1","unstructured":"IBM. (2022).Definitive guide to ransomware 2022. Retrieved December 30 2022 fromhttps:\/\/www.ibm.com\/downloads\/cas\/EV6NAQR4"},{"key":"e_1_2_10_70_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.90.3.453"},{"key":"e_1_2_10_71_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12317"},{"key":"e_1_2_10_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10869-011-9234-5"},{"key":"e_1_2_10_73_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-orgpsych-032117-104406"},{"key":"e_1_2_10_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1435417.1435446"},{"key":"e_1_2_10_75_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750691"},{"key":"e_1_2_10_76_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2015.15"},{"key":"e_1_2_10_77_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.1.06"},{"key":"e_1_2_10_78_1","doi-asserted-by":"publisher","DOI":"10.1016\/0030-5073(78)90023-5"},{"key":"e_1_2_10_79_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10869-009-9094-4"},{"key":"e_1_2_10_80_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094428106296642"},{"key":"e_1_2_10_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10869-013-9320-y"},{"key":"e_1_2_10_82_1","doi-asserted-by":"publisher","DOI":"10.1111\/peps.12370"},{"key":"e_1_2_10_83_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12037y"},{"key":"e_1_2_10_84_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12144-016-9457-8"},{"key":"e_1_2_10_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2022.103650"},{"key":"e_1_2_10_86_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.86.1.114"},{"key":"e_1_2_10_87_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-014-2242-4"},{"key":"e_1_2_10_88_1","volume-title":"A theory of goal setting & task performance","author":"Locke E. A.","year":"1990"},{"key":"e_1_2_10_89_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-013-1705-3"},{"key":"e_1_2_10_90_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222270406"},{"key":"e_1_2_10_91_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-017-0066-x"},{"key":"e_1_2_10_92_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12043"},{"key":"e_1_2_10_93_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00646"},{"key":"e_1_2_10_94_1","doi-asserted-by":"publisher","DOI":"10.1080\/14719037.2017.1335342"},{"key":"e_1_2_10_95_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.0039-0402.2003.00252.x"},{"key":"e_1_2_10_96_1","doi-asserted-by":"publisher","DOI":"10.1027\/1614-2241.1.3.86"},{"key":"e_1_2_10_97_1","doi-asserted-by":"publisher","DOI":"10.2307\/3069309"},{"key":"e_1_2_10_98_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2018\/13853"},{"key":"e_1_2_10_99_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.91.6.1321"},{"key":"e_1_2_10_100_1","doi-asserted-by":"publisher","DOI":"10.2307\/257011"},{"key":"e_1_2_10_101_1","unstructured":"NCSAM. (2019).National cybersecurity awareness month. Retrieved April 19 2021 fromhttps:\/\/staysafeonline.org\/resource\/ncsam19-report\/"},{"key":"e_1_2_10_102_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvb.2017.07.012"},{"key":"e_1_2_10_103_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11031-006-9016-y"},{"key":"e_1_2_10_104_1","doi-asserted-by":"publisher","DOI":"10.2307\/256657"},{"key":"e_1_2_10_105_1","doi-asserted-by":"publisher","DOI":"10.1037\/apl0000391"},{"key":"e_1_2_10_106_1","doi-asserted-by":"publisher","DOI":"10.1037\/str0000048"},{"key":"e_1_2_10_107_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.83.6.835"},{"key":"e_1_2_10_108_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206310363732"},{"key":"e_1_2_10_109_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206308321554"},{"key":"e_1_2_10_110_1","first-page":"233","volume-title":"Work motivation: Past, present, and future","author":"Parker S. K.","year":"2008"},{"key":"e_1_2_10_111_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.84.6.925"},{"key":"e_1_2_10_112_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781452231518"},{"key":"e_1_2_10_113_1","doi-asserted-by":"publisher","DOI":"10.5465\/256952"},{"key":"e_1_2_10_114_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.91.3.636"},{"key":"e_1_2_10_115_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148814"},{"key":"e_1_2_10_116_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"e_1_2_10_117_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.05.002"},{"key":"e_1_2_10_118_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.4.09"},{"key":"e_1_2_10_119_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2015.1138374"},{"key":"e_1_2_10_120_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2004.02.004"},{"key":"e_1_2_10_121_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.07.020"},{"key":"e_1_2_10_122_1","unstructured":"Rockwood N. J. &Hayes A. F.(2017).MLmed: An SPSS macro for multilevel mediation and conditional process analysis [Poster presentation].Annual meeting of the Association of Psychological Science (APS)."},{"key":"e_1_2_10_123_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780429494000"},{"key":"e_1_2_10_124_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.110.1.145"},{"key":"e_1_2_10_125_1","doi-asserted-by":"publisher","DOI":"10.2307\/20159052"},{"key":"e_1_2_10_126_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.76.3.482"},{"key":"e_1_2_10_127_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101761"},{"key":"e_1_2_10_128_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.01.002p"},{"key":"e_1_2_10_129_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.08.006"},{"key":"e_1_2_10_130_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.3.518"},{"key":"e_1_2_10_131_1","doi-asserted-by":"publisher","DOI":"10.20547\/jms.2014.1704202"},{"key":"e_1_2_10_132_1","doi-asserted-by":"publisher","DOI":"10.1348\/096317910X502359"},{"key":"e_1_2_10_133_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.90.5.1011"},{"key":"e_1_2_10_134_1","doi-asserted-by":"publisher","DOI":"10.1037\/1076-8998.13.4.319"},{"key":"e_1_2_10_135_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2017.1400928"},{"key":"e_1_2_10_136_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.2.04"},{"key":"e_1_2_10_137_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2019.103212"},{"issue":"2","key":"e_1_2_10_138_1","first-page":"1","article-title":"Transformational leadership and employee voice: An affective perspective","volume":"13","author":"Wang Z.","year":"2019","journal-title":"Frontiers of Business Research in China"},{"key":"e_1_2_10_139_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2044-8325.1990.tb00521.x"},{"key":"e_1_2_10_140_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206314544745"},{"key":"e_1_2_10_141_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2016.09.009"},{"key":"e_1_2_10_142_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12271"},{"key":"e_1_2_10_143_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00794"},{"key":"e_1_2_10_144_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.1884"}],"container-title":["Information Systems Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/isj.12488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T06:54:55Z","timestamp":1717656895000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/isj.12488"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,22]]},"references-count":143,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["10.1111\/isj.12488"],"URL":"https:\/\/doi.org\/10.1111\/isj.12488","archive":["Portico"],"relation":{},"ISSN":["1350-1917","1365-2575"],"issn-type":[{"value":"1350-1917","type":"print"},{"value":"1365-2575","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,22]]},"assertion":[{"value":"2022-06-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-06","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}