Skip to main content
Erschienen in: Global Journal of Flexible Systems Management 4/2022

25.10.2022 | Original Research

Do Leadership Styles Influence Employee Information Systems Security Intention? A Study of the Banking Industry

verfasst von: Murilo Catussi Almeida, Adilson Carlos Yoshikuni, Rajeev Dwivedi, Cláudio Luís Carvalho Larieira

Erschienen in: Global Journal of Flexible Systems Management | Ausgabe 4/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The banking industry is highly prone to Information Systems (IS) security breaches from outside organizations and inside organizations. There are processes to monitor, detect, measure, and prevent IS security threats from an outside organization. However, inside organization threats to IS security are very challenging to monitor and detect, especially employee-related. The paper aims to understand how leadership plays a vital role in employee information systems security intention in the banking industry. Therefore, research applied full-range leadership style theory (FRLT) to assess the role of leadership style on employees’ information systems security intention. The study collects 517 responses from non-managerial bank employees from Brazilian banks using questionnaires and tested the theoretical relationship using partial least square structural equation modeling. The findings reveal that transformational leadership has a positive impact on the development of employee information systems security intention, whereas passive leadership harms employee intention toward information systems security. In addition to that results also show that age, education level, and work experience have moderating effects on employee intention toward information systems security. The research will help the banking industry to influence employee IS security intention through proactive and transformational leadership. In addition, it will also help leaders to understand employee intention toward information systems security aspects. The leadership role will enable IS security and flexibility in the organization.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Ajzen, I. (1991). ‘The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211.CrossRef Ajzen, I. (1991). ‘The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211.CrossRef
Zurück zum Zitat Ajzen, I. (2011). The theory of planned behavior: Reactions and reflections. Psychology and Health, 26(9), 1113–1127.CrossRef Ajzen, I. (2011). The theory of planned behavior: Reactions and reflections. Psychology and Health, 26(9), 1113–1127.CrossRef
Zurück zum Zitat Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613–643.CrossRef Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613–643.CrossRef
Zurück zum Zitat Avolio, B. J., & Bass, B. M. (2004). multifactor leadership questionnaire: Manual and sample set (3rd ed.). Mind Garden. Avolio, B. J., & Bass, B. M. (2004). multifactor leadership questionnaire: Manual and sample set (3rd ed.). Mind Garden.
Zurück zum Zitat Bass, B. M., et al. (1987). Transformational leadership and the falling dominoes effect. Group & Organization Management, 12(1), 73–87.CrossRef Bass, B. M., et al. (1987). Transformational leadership and the falling dominoes effect. Group & Organization Management, 12(1), 73–87.CrossRef
Zurück zum Zitat Bass, B. M., et al. (2003). ‘Predicting unit performance by assessing transformational and transactional leadership. Journal of Applied Psychology, 88(2), 207–218.CrossRef Bass, B. M., et al. (2003). ‘Predicting unit performance by assessing transformational and transactional leadership. Journal of Applied Psychology, 88(2), 207–218.CrossRef
Zurück zum Zitat Bass, B. M., & Avolio, B. J. (1994). Improving organizational effectiveness through transformational leadership. Sage Publications. Bass, B. M., & Avolio, B. J. (1994). Improving organizational effectiveness through transformational leadership. Sage Publications.
Zurück zum Zitat Bhattacharya, D. (2011). Leadership styles and information security in small businesses. Information Management & Computer Security, 19(5), 300–312.CrossRef Bhattacharya, D. (2011). Leadership styles and information security in small businesses. Information Management & Computer Security, 19(5), 300–312.CrossRef
Zurück zum Zitat Birasnav, M., Mittal, R., & Dalpati, A. (2019). (2019) Integrating theories of strategic leadership, social exchange, and structural capital in the context of buyer-supplier relationship: An empirical study. Global Journal of Flexible Systems Management, 20, 219–236. https://doi.org/10.1007/s40171-019-00211-yCrossRef Birasnav, M., Mittal, R., & Dalpati, A. (2019). (2019) Integrating theories of strategic leadership, social exchange, and structural capital in the context of buyer-supplier relationship: An empirical study. Global Journal of Flexible Systems Management, 20, 219–236. https://​doi.​org/​10.​1007/​s40171-019-00211-yCrossRef
Zurück zum Zitat Bono, J. E., & Judge, T. A. (2004). Personality and transformational and transactional leadership: A meta-analysis. Journal of Applied Psychology, 89(5), 901–910.CrossRef Bono, J. E., & Judge, T. A. (2004). Personality and transformational and transactional leadership: A meta-analysis. Journal of Applied Psychology, 89(5), 901–910.CrossRef
Zurück zum Zitat Boss, S. R., et al. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837-U461.CrossRef Boss, S. R., et al. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837-U461.CrossRef
Zurück zum Zitat Buch, R., Martinsen, Ø. L., & Kuvaas, B. (2015). ‘The destructiveness of laissez-faire leadership behavior: The mediating role of economic leader-member exchange relationships. Journal of Leadership and Organizational Studies, 22(1), 115–124.CrossRef Buch, R., Martinsen, Ø. L., & Kuvaas, B. (2015). ‘The destructiveness of laissez-faire leadership behavior: The mediating role of economic leader-member exchange relationships. Journal of Leadership and Organizational Studies, 22(1), 115–124.CrossRef
Zurück zum Zitat Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2009). (2009) ‘Effects of individual and organization based beliefs and the moderating role of work experience on insiders’ good security behaviors’. International Conference on Computational Science and Engineering, 3, 476–481. Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2009). (2009) ‘Effects of individual and organization based beliefs and the moderating role of work experience on insiders’ good security behaviors’. International Conference on Computational Science and Engineering, 3, 476–481.
Zurück zum Zitat Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). ‘Information security policy compliance: An empirical study on rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523–548.CrossRef Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). ‘Information security policy compliance: An empirical study on rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523–548.CrossRef
Zurück zum Zitat Burns, J. M. (1978). Leadership. Harper & Row. Burns, J. M. (1978). Leadership. Harper & Row.
Zurück zum Zitat Carrick, M., & Dunaway, C. (2017). Fit matters: How to love your job. India: Maven House. Carrick, M., & Dunaway, C. (2017). Fit matters: How to love your job. India: Maven House.
Zurück zum Zitat Cavallari, M., (2012). Analysis of evidences about the relationship between organisational flexibility and information systems security. In Information systems: Crossroads for organization, management, accounting and engineering (pp. 439–447). Physica, Heidelberg. Cavallari, M., (2012). Analysis of evidences about the relationship between organisational flexibility and information systems security. In Information systems: Crossroads for organization, management, accounting and engineering (pp. 439–447). Physica, Heidelberg.
Zurück zum Zitat Chan, M., Woon, I., & Kankanhalli, A. (2005). Perceptions of information security at the workplace: Linking Information security climate to compliant behavior. Journal of Information Privacy and Security, 1(3), 18–41.CrossRef Chan, M., Woon, I., & Kankanhalli, A. (2005). Perceptions of information security at the workplace: Linking Information security climate to compliant behavior. Journal of Information Privacy and Security, 1(3), 18–41.CrossRef
Zurück zum Zitat Chauhan, R., Dwivedi, R., & Sherry, A. M. (2012). Critical success factors for offshoring of enterprise resource planning (ERP) implementations. Business Systems Research: International Journal of the Society for Advancing Innovation and Research in Economy, 3(1), 4–13.CrossRef Chauhan, R., Dwivedi, R., & Sherry, A. M. (2012). Critical success factors for offshoring of enterprise resource planning (ERP) implementations. Business Systems Research: International Journal of the Society for Advancing Innovation and Research in Economy, 3(1), 4–13.CrossRef
Zurück zum Zitat Chen, X., et al. (2018). ‘Sanction severity and employees’ information security policy compliance: Investigating mediating, moderating, and control variables. Information and Management. Elsevier, 55(8), 1049–1060.CrossRef Chen, X., et al. (2018). ‘Sanction severity and employees’ information security policy compliance: Investigating mediating, moderating, and control variables. Information and Management. Elsevier, 55(8), 1049–1060.CrossRef
Zurück zum Zitat Chopra, S., Dwivedi, R., & Sherry, A. M. (2013). Leveraging technology options for financial inclusion in India. International Journal of Asian Business and Information Management (IJABIM), 4(1), 10–20.CrossRef Chopra, S., Dwivedi, R., & Sherry, A. M. (2013). Leveraging technology options for financial inclusion in India. International Journal of Asian Business and Information Management (IJABIM), 4(1), 10–20.CrossRef
Zurück zum Zitat Clarke, S., & Ward, K. (2006). The role of leader influence tactics and safety climate in engaging employees’ safety participation. Risk Analysis, 26(5), 1175–1185.CrossRef Clarke, S., & Ward, K. (2006). The role of leader influence tactics and safety climate in engaging employees’ safety participation. Risk Analysis, 26(5), 1175–1185.CrossRef
Zurück zum Zitat Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. Computers & Security, 32, 90–101.CrossRef Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. Computers & Security, 32, 90–101.CrossRef
Zurück zum Zitat D’Arcy, J., & Herath, T. (2011). A review and analysis of deterrence theory in the IS security literature: Making sense of the disparate findings. European Journal of Information Systems, 20(6), 643–658.CrossRef D’Arcy, J., & Herath, T. (2011). A review and analysis of deterrence theory in the IS security literature: Making sense of the disparate findings. European Journal of Information Systems, 20(6), 643–658.CrossRef
Zurück zum Zitat D’Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79–98.CrossRef D’Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79–98.CrossRef
Zurück zum Zitat D’Arcy, J., & Lowry, P. B. (2019). ‘Cognitive-affective drivers of employees’ daily compliance with information security policies: A multilevel, longitudinal study. Information Systems Journal, 29(1), 43–69.CrossRef D’Arcy, J., & Lowry, P. B. (2019). ‘Cognitive-affective drivers of employees’ daily compliance with information security policies: A multilevel, longitudinal study. Information Systems Journal, 29(1), 43–69.CrossRef
Zurück zum Zitat Dartey-Baah, K., Quartey, S. H. and Adotey, A. (2020) ‘Examining transformational and transactional leadership styles and safety citizenship behaviors in the power distribution sector: evidence from Ghana’. International Journal of Energy Sector Management, 15(1), 173–194. https://doi.org/10.1108/IJESM-07-2020-0008 Dartey-Baah, K., Quartey, S. H. and Adotey, A. (2020) ‘Examining transformational and transactional leadership styles and safety citizenship behaviors in the power distribution sector: evidence from Ghana’. International Journal of Energy Sector Management, 15(1), 173–194. https://​doi.​org/​10.​1108/​IJESM-07-2020-0008
Zurück zum Zitat Dwivedi, R., Alrasheedi, M., Dwivedi, P., & Starešinić, B. (2022). Leveraging financial inclusion through technology-enabled services innovation: A case of economic development in India. International Journal of E-Services and Mobile Applications (IJESMA), 14(1), 1–13.CrossRef Dwivedi, R., Alrasheedi, M., Dwivedi, P., & Starešinić, B. (2022). Leveraging financial inclusion through technology-enabled services innovation: A case of economic development in India. International Journal of E-Services and Mobile Applications (IJESMA), 14(1), 1–13.CrossRef
Zurück zum Zitat Dwivedi, R., Jaffar Karim, F., & Starešinić, B. (2021b). Critical success factors of new product development: Evidence from select cases. Business Systems Research: International Journal of the Society for Advancing Innovation and Research in Economy, 12(1), 34–44.CrossRef Dwivedi, R., Jaffar Karim, F., & Starešinić, B. (2021b). Critical success factors of new product development: Evidence from select cases. Business Systems Research: International Journal of the Society for Advancing Innovation and Research in Economy, 12(1), 34–44.CrossRef
Zurück zum Zitat Dwivedi, R., & Momaya, K. (2003). Stakeholder flexibility in e-business environment: A case of an automobile company. Global Journal of Flexible Systems Management, 4(3), 21–32. Dwivedi, R., & Momaya, K. (2003). Stakeholder flexibility in e-business environment: A case of an automobile company. Global Journal of Flexible Systems Management, 4(3), 21–32.
Zurück zum Zitat Evans, S., & Bahrami, H. (2020). Super-flexibility in practice: insights from a crisis. Global Journal of Flexible Systems Management, 21(3), 207–214 Evans, S., & Bahrami, H. (2020). Super-flexibility in practice: insights from a crisis. Global Journal of Flexible Systems Management, 21(3), 207–214
Zurück zum Zitat Goel, S., Dwivedi, R., & Sherry, A. M. (2012). Critical factors for successful implementation of E-governance programs: A case study of HUDA. Global Journal of Flexible Systems Management, 13(4), 233–244.CrossRef Goel, S., Dwivedi, R., & Sherry, A. M. (2012). Critical factors for successful implementation of E-governance programs: A case study of HUDA. Global Journal of Flexible Systems Management, 13(4), 233–244.CrossRef
Zurück zum Zitat Groysberg, B., Lee, J., Price, J., & Cheng, J. (2018). The leader’s guide to corporate culture. Harvard Business Review, 96(1), 44–52. Groysberg, B., Lee, J., Price, J., & Cheng, J. (2018). The leader’s guide to corporate culture. Harvard Business Review, 96(1), 44–52.
Zurück zum Zitat Guhr, N., Lebek, B., & Breitner, M. H. (2019). The impact of leadership on employees’ intended information security behavior: An examination of the full-range leadership theory. Information Systems Journal, 29(2), 340–362.CrossRef Guhr, N., Lebek, B., & Breitner, M. H. (2019). The impact of leadership on employees’ intended information security behavior: An examination of the full-range leadership theory. Information Systems Journal, 29(2), 340–362.CrossRef
Zurück zum Zitat Hair, J. F., Jr., et al. (2016). A primer on partial least squares structural equation modeling (PLS-SEM). New York: Sage Publications. Hair, J. F., Jr., et al. (2016). A primer on partial least squares structural equation modeling (PLS-SEM). New York: Sage Publications.
Zurück zum Zitat Herath, T., & Rao, H. R. (2009a). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154–165.CrossRef Herath, T., & Rao, H. R. (2009a). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154–165.CrossRef
Zurück zum Zitat Herath, T., & Rao, H. R. (2009b). Protection motivation and deterrence: A framework for security policy compliance in organizations. European Journal of Information Systems, 18(2), 106–125.CrossRef Herath, T., & Rao, H. R. (2009b). Protection motivation and deterrence: A framework for security policy compliance in organizations. European Journal of Information Systems, 18(2), 106–125.CrossRef
Zurück zum Zitat Hsu, J. S. C., et al. (2015). The role of extra-role behaviors and social controls in information security policy effectiveness. Information Systems Research, 26(2), 282–300.CrossRef Hsu, J. S. C., et al. (2015). The role of extra-role behaviors and social controls in information security policy effectiveness. Information Systems Research, 26(2), 282–300.CrossRef
Zurück zum Zitat Hu, Q., et al. (2012). Managing employee compliance with information security policies: The critical role of top management and organizational culture. Decision Sciences, 43(4), 615–660.CrossRef Hu, Q., et al. (2012). Managing employee compliance with information security policies: The critical role of top management and organizational culture. Decision Sciences, 43(4), 615–660.CrossRef
Zurück zum Zitat Humaidi, N., & Balakrishnan, V. (2015a). ‘Leadership styles and information security compliance behavior: The mediator effect of information security awareness. International Journal of Information and Education Technology, 5(4), 311.CrossRef Humaidi, N., & Balakrishnan, V. (2015a). ‘Leadership styles and information security compliance behavior: The mediator effect of information security awareness. International Journal of Information and Education Technology, 5(4), 311.CrossRef
Zurück zum Zitat Humaidi, N., & Balakrishnan, V. (2015b). The Moderating effect of working experience on health information system security policies compliance behavior. Malaysian Journal of Computer Science, 28(2), 70–92. Humaidi, N., & Balakrishnan, V. (2015b). The Moderating effect of working experience on health information system security policies compliance behavior. Malaysian Journal of Computer Science, 28(2), 70–92.
Zurück zum Zitat Jensen, U. T., et al. (2019). ‘Conceptualizing and measuring transformational and transactional leadership. Administration & Society, 51(1), 3–33.CrossRef Jensen, U. T., et al. (2019). ‘Conceptualizing and measuring transformational and transactional leadership. Administration & Society, 51(1), 3–33.CrossRef
Zurück zum Zitat Johnson, M., et al. (2021). Impact of big data and artificial intelligence on industry: developing a workforce roadmap for a data driven economy. Global Journal of Flexible Systems Management, 22(3), 197–217. Johnson, M., et al. (2021). Impact of big data and artificial intelligence on industry: developing a workforce roadmap for a data driven economy. Global Journal of Flexible Systems Management, 22(3), 197–217.
Zurück zum Zitat Kelloway, E. K., Mullen, J., & Francis, L. (2006). ‘Divergent effects of transformational and passive leadership on employee safety. Journal of Occupational Health Psychology, 11(1), 76–86.CrossRef Kelloway, E. K., Mullen, J., & Francis, L. (2006). ‘Divergent effects of transformational and passive leadership on employee safety. Journal of Occupational Health Psychology, 11(1), 76–86.CrossRef
Zurück zum Zitat Lebek, B., Guhr, N. and Breitner, M. H. (2014b) ‘Transformational leadership and employees ’ information security performance : the mediating role of motivation and climate’. Thirty fifth international conference on information systems, Auckland. Lebek, B., Guhr, N. and Breitner, M. H. (2014b) ‘Transformational leadership and employees ’ information security performance : the mediating role of motivation and climate’. Thirty fifth international conference on information systems, Auckland.
Zurück zum Zitat Lehto, M., & Limnéll, J. (2021). Strategic leadership in cyber security, case Finland. Information Security Journal: A Global Perspective, 30(3), 139–148. Lehto, M., & Limnéll, J. (2021). Strategic leadership in cyber security, case Finland. Information Security Journal: A Global Perspective, 30(3), 139–148.
Zurück zum Zitat Liang, H., Xue, Y., & Wu, L. (2013). Ensuring employees’ IT compliance: Carrot or stick? Information Systems Research, 24(2), 279–294.CrossRef Liang, H., Xue, Y., & Wu, L. (2013). Ensuring employees’ IT compliance: Carrot or stick? Information Systems Research, 24(2), 279–294.CrossRef
Zurück zum Zitat Loch, K. D., Carr, H. H., & Warkentin, M. E. (1992). Threats to information systems: Today’s reality, yesterday’s understanding. MIS Quarterly, 16(2), 173–186.CrossRef Loch, K. D., Carr, H. H., & Warkentin, M. E. (1992). Threats to information systems: Today’s reality, yesterday’s understanding. MIS Quarterly, 16(2), 173–186.CrossRef
Zurück zum Zitat Luftman, J., Derksen, B., Dwivedi, R., Santana, M., Zadeh, H. S., & Rigoni, E. (2015). Influential IT management trends: An international study. Journal of Information Technology, 30(3), 293–305.CrossRef Luftman, J., Derksen, B., Dwivedi, R., Santana, M., Zadeh, H. S., & Rigoni, E. (2015). Influential IT management trends: An international study. Journal of Information Technology, 30(3), 293–305.CrossRef
Zurück zum Zitat Maalem Lahcen, R. A., Caulkins, B., Mohapatra, R., & Kumar, M. (2020). Review and insight on the behavioral aspects of cybersecurity. Cybersecurity, 3(1), 1–18.CrossRef Maalem Lahcen, R. A., Caulkins, B., Mohapatra, R., & Kumar, M. (2020). Review and insight on the behavioral aspects of cybersecurity. Cybersecurity, 3(1), 1–18.CrossRef
Zurück zum Zitat Malhotra, N. K. (2019). Pesquisa de marketing: Uma orientação aplicada (7th ed.). Bookman. Malhotra, N. K. (2019). Pesquisa de marketing: Uma orientação aplicada (7th ed.). Bookman.
Zurück zum Zitat Mbakop, A. M., Voufo, J., Biyeme, F., Ngozag, L. A., & Meva’a, L. (2021). Analysis of information flow characteristics in shop floor: state-of-the-art and future research directions for developing countries. Global Journal of Flexible Systems Management, 22(1), 43–53. Mbakop, A. M., Voufo, J., Biyeme, F., Ngozag, L. A., & Meva’a, L. (2021). Analysis of information flow characteristics in shop floor: state-of-the-art and future research directions for developing countries. Global Journal of Flexible Systems Management, 22(1), 43–53.
Zurück zum Zitat Moody, G. D., Siponen, M., & Pahnila, S. (2018). Toward a unified model of information security policy compliance. MIS Quarterly, 42(1), 285–311.CrossRef Moody, G. D., Siponen, M., & Pahnila, S. (2018). Toward a unified model of information security policy compliance. MIS Quarterly, 42(1), 285–311.CrossRef
Zurück zum Zitat Ng, T. W. H. (2017). Transformational leadership and performance outcomes: Analyses of multiple mediation pathways. The Leadership Quarterly., 28(3), 385–417.CrossRef Ng, T. W. H. (2017). Transformational leadership and performance outcomes: Analyses of multiple mediation pathways. The Leadership Quarterly., 28(3), 385–417.CrossRef
Zurück zum Zitat Podsakoff, P. M., et al. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.CrossRef Podsakoff, P. M., et al. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.CrossRef
Zurück zum Zitat Podsakoff, P. M., et al. (2006). Relationships between leader reward and punishment behavior and subordinate attitudes, perceptions, and behaviors: A meta-analytic review of existing and new research. Organizational Behavior and Human Decision Processes, 99(2), 113–142.CrossRef Podsakoff, P. M., et al. (2006). Relationships between leader reward and punishment behavior and subordinate attitudes, perceptions, and behaviors: A meta-analytic review of existing and new research. Organizational Behavior and Human Decision Processes, 99(2), 113–142.CrossRef
Zurück zum Zitat Rafferty, A. E., & Griffin, M. A. (2004). Dimensions of transformational leadership: Conceptual and empirical extensions. The Leadership Quarterly, 15(3), 329–354.CrossRef Rafferty, A. E., & Griffin, M. A. (2004). Dimensions of transformational leadership: Conceptual and empirical extensions. The Leadership Quarterly, 15(3), 329–354.CrossRef
Zurück zum Zitat Salter, C. R., Harris, M. H. and McCormack, J. (2014) ‘Bass & Avolio’s full range leadership model and moral development’, E-Leader Milan. Salter, C. R., Harris, M. H. and McCormack, J. (2014) ‘Bass & Avolio’s full range leadership model and moral development’, E-Leader Milan.
Zurück zum Zitat Simmering, M. J., et al. (2015). Marker variable choice, reporting, and interpretation in the detection of common method variance: A review and demonstration. Organizational Research Methods, 18(3), 473–511.CrossRef Simmering, M. J., et al. (2015). Marker variable choice, reporting, and interpretation in the detection of common method variance: A review and demonstration. Organizational Research Methods, 18(3), 473–511.CrossRef
Zurück zum Zitat Siponen, M., Adam Mahmood, M., & Pahnila, S. (2014). Employees’ adherence to information security policies: An exploratory field study. Information & Management., 51(2), 217–224.CrossRef Siponen, M., Adam Mahmood, M., & Pahnila, S. (2014). Employees’ adherence to information security policies: An exploratory field study. Information & Management., 51(2), 217–224.CrossRef
Zurück zum Zitat Siponen, M., & Vance, A. (2010). Neutralization: new insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487–502.CrossRef Siponen, M., & Vance, A. (2010). Neutralization: new insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487–502.CrossRef
Zurück zum Zitat Son, J.-Y. (2011). Out of fear or desire? Toward a better understanding of employees’ motivation to follow IS security policies. Information & Management., 48(7), 296–302.CrossRef Son, J.-Y. (2011). Out of fear or desire? Toward a better understanding of employees’ motivation to follow IS security policies. Information & Management., 48(7), 296–302.CrossRef
Zurück zum Zitat Stewart, J. S., et al. (2017). ‘Managing millennials: Embracing generational differences’, Business Horizons. ‘kelley School of Business, Indiana University,’ 60(1), 45–54. Stewart, J. S., et al. (2017). ‘Managing millennials: Embracing generational differences’, Business Horizons. ‘kelley School of Business, Indiana University,’ 60(1), 45–54.
Zurück zum Zitat Sushil, (2000). Concept of systemic flexibility. Global Journal of Flexible Systems Management, 1(1), 77–88. Sushil, (2000). Concept of systemic flexibility. Global Journal of Flexible Systems Management, 1(1), 77–88.
Zurück zum Zitat Tremblay, M., & Gibson, M. (2016). The role of humor in the relationship between transactional leadership behavior, perceived supervisor support, and citizenship behavior. Journal of Leadership and Organizational Studies, 23(1), 39–54.CrossRef Tremblay, M., & Gibson, M. (2016). The role of humor in the relationship between transactional leadership behavior, perceived supervisor support, and citizenship behavior. Journal of Leadership and Organizational Studies, 23(1), 39–54.CrossRef
Zurück zum Zitat Vodanovich, S., Sundaram, D., & Myers, M. (2010). Digital natives and ubiquitous information systems. Information Systems Research, 21(4), 711–723.CrossRef Vodanovich, S., Sundaram, D., & Myers, M. (2010). Digital natives and ubiquitous information systems. Information Systems Research, 21(4), 711–723.CrossRef
Zurück zum Zitat Walumbwa, F. O., Wu, C., & Orwa, B. (2008). Contingent reward transactional leadership, work attitudes, and organizational citizenship behavior: The role of procedural justice climate perceptions and strength. The Leadership Quarterly, 19(3), 251–265.CrossRef Walumbwa, F. O., Wu, C., & Orwa, B. (2008). Contingent reward transactional leadership, work attitudes, and organizational citizenship behavior: The role of procedural justice climate perceptions and strength. The Leadership Quarterly, 19(3), 251–265.CrossRef
Zurück zum Zitat Webb, T. L., & Sheeran, P. (2006). Does changing behavioral intentions engender behavior change? A meta-analysis of the experimental evidence. Psychological Bulletin, 132(2), 249–268.CrossRef Webb, T. L., & Sheeran, P. (2006). Does changing behavioral intentions engender behavior change? A meta-analysis of the experimental evidence. Psychological Bulletin, 132(2), 249–268.CrossRef
Zurück zum Zitat Yoshikuni, A. C., Lucas, E. C., & Albertin, A. L. (2019). Strategic information systems enabling strategy-as-practice and corporate performance: Empirical evidence from PLS-PM, FIMIX-PLS and fsQCA. International Business Research, 12(1), 131.CrossRef Yoshikuni, A. C., Lucas, E. C., & Albertin, A. L. (2019). Strategic information systems enabling strategy-as-practice and corporate performance: Empirical evidence from PLS-PM, FIMIX-PLS and fsQCA. International Business Research, 12(1), 131.CrossRef
Zurück zum Zitat Yukl, G., & Lepsinger, R. (2004). Flexible leadership: Creating value by balancing multiple challenges and choices. USA: John Wiley & Sons. Yukl, G., & Lepsinger, R. (2004). Flexible leadership: Creating value by balancing multiple challenges and choices. USA: John Wiley & Sons.
Zurück zum Zitat Zhu, Y. (2013). Individual behavior: In-role and extra-role. International Journal of Business Administration, 4(1), 23–27.CrossRef Zhu, Y. (2013). Individual behavior: In-role and extra-role. International Journal of Business Administration, 4(1), 23–27.CrossRef
Metadaten
Titel
Do Leadership Styles Influence Employee Information Systems Security Intention? A Study of the Banking Industry
verfasst von
Murilo Catussi Almeida
Adilson Carlos Yoshikuni
Rajeev Dwivedi
Cláudio Luís Carvalho Larieira
Publikationsdatum
25.10.2022
Verlag
Springer India
Erschienen in
Global Journal of Flexible Systems Management / Ausgabe 4/2022
Print ISSN: 0972-2696
Elektronische ISSN: 0974-0198
DOI
https://doi.org/10.1007/s40171-022-00320-1

Weitere Artikel der Ausgabe 4/2022

Global Journal of Flexible Systems Management 4/2022 Zur Ausgabe

Premium Partner