Next Article in Journal
Space Analysis of School Violence in the Educational Setting of Peru, 2019
Previous Article in Journal
The Effect of Autogenic Training in a Form of Audio Recording on Sleep Quality and Physiological Stress Reactions of University Athletes—Pilot Study
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Investigation of Employees’ Intention to Comply with Information Security System—A Mixed Approach Based on Regression Analysis and fsQCA

1
School of Management, Xi’an University of Science and Technology, Xi’an 710054, China
2
Research Center for Human Factors and Management Ergonomics, Xi’an University of Science and Technology, Xi’an 710054, China
3
School of Management, Xi’an Jiaotong University, Xi’an 710049, China
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Int. J. Environ. Res. Public Health 2022, 19(23), 16038; https://doi.org/10.3390/ijerph192316038
Submission received: 17 October 2022 / Revised: 22 November 2022 / Accepted: 28 November 2022 / Published: 30 November 2022
(This article belongs to the Section Health Communication and Informatics)

Abstract

:
Employee security compliance behavior has become an important safeguard to protect the security of corporate information assets. Focusing on human factors, this paper discusses how to regulate and guide employees’ compliance with information security systems through effective methods. Based on protection motivation theory (PMT), a model of employees’ intention to comply with the information security system was constructed. A questionnaire survey was adopted to obtain 224 valid data points, and SPSS 26.0 was applied to verify the hypotheses underlying the research model. Then, based on the results of a regression analysis, fuzzy set qualitative comparative analysis (fsQCA) was used to explore the conditional configurations that affect employees’ intention to comply with the information security system from a holistic perspective. The empirical results demonstrated that perceived severity, perceived vulnerability, response efficacy, and self-efficacy all positively influenced the employees’ intention to comply with the information security system; while rewards and response costs had a negative effect. Threat appraisal had a greater effect on employees’ intention to comply with the information security system compared to response appraisal. The fsQCA results showed that individual antecedent conditions are not necessary to influence employees’ intention to comply with an information security system. Seven pathways exist that influence an employees’ intention to comply with an information security system, with reward, self-efficacy, and response cost being the core conditions having the highest probability of occurring in each configuration of pathways, and with perceived severity and self-efficacy appearing in the core conditions of configurations with an original coverage greater than 40%. Theoretically, this study discusses the influence of the elements of PMT on employees’ intention to comply with an information security system, reveals the mechanism of influence of the combination of the influencing factors on the outcome variables, and identifies the core factors and auxiliary factors in the condition configurations, providing a new broader perspective for the study of information security compliance behavior and providing some theoretical support for strengthening enterprise security management. Practically, targeted suggestions are proposed based on the research results, to increase the intention of enterprise employees to comply with information security systems, thereby improving the effectiveness of enterprise information security management and the degree of information security in enterprises.

1. Introduction

As the information systems of enterprises are highly interactive, shared, and open in the network environment, the application of information technology brings benefits, while also exposing the information systems of enterprises to serious security threats, resulting in many information security incidents. Effective control of unsafe behaviors is an important means of reducing security incidents [1]. Employees’ security behaviors include security compliance behaviors and security engagement behaviors [2]. This paper aimed to investigate employees’ intention regarding security compliance behavior, in the context of information security. Information security risks in enterprises consist of external threats (e.g., virus attacks, cyber espionage, etc.) and internal threats (e.g., inadequate organizational information security management systems, weak information security awareness among employees, etc.). Several studies have shown that internal threats from an organization’s employees have become the main cause of information security incidents [3,4]. In general, the scientific formulation and strict implementation of an information security management system is an effective guarantee of the protection of enterprise information assets [5,6]. On this basis, an increasing number of enterprises have clarified the responsibilities and obligations of employees and formulated a scientific and reasonable information security system. However, in the process of using information assets, employees may invariably ignore the provisions of the information security system, intentionally or unintentionally, thus leading to great threats to information assets such as critical enterprise data and computer equipment [7,8]. Employees are an essential part of enterprise information security management, and increasing their intention to behave in an information security compliant manner helps enterprises to operate safely and effectively in the internet age. Therefore, it is essential to investigate the factors influencing employees’ intention to comply with information security systems.
The factors influencing employees’ intention to act in accordance with information security have been discussed based on protection motivation theory (PMT), whereas few studies have used all the explanatory factors of threat appraisal and response appraisal in PMT. Workman [9] applied four main explanatory factors in his study, namely perceived severity, perceived vulnerability, self-efficacy, and response efficacy; while Lee [10] added the explanatory variable of response cost to the above. Vance et al. [11] conducted a study of information security policy compliance intention by including all six explanatory variables of threat appraisal and response appraisal. Although PMT has been widely used in the study of information security system compliance intention, inconsistent findings have emerged. Ifinedo [12] concluded that perceived susceptibility, response efficacy, and self-efficacy have a positive effect on employees’ information security system compliance intention, while perceived severity has a negative effect, while response cost is insignificant. On the other hand, Vance et al. [11] argued that perceived severity positively affects employees’ willingness to comply with information security systems, while response cost negatively affects such willingness and perceived susceptibility is insignificant. Moreover, a review of the literature revealed that the current studies on the factors influencing individual intention to comply with security behaviors mostly concerned the influence of a single factor [13,14,15], and there are relatively few studies that examined the influence of a combination of multiple factors on individual intention to comply with security behaviors from a holistic perspective.
Given this, this study intended to identify enterprise employees as the research subjects and discuss the effects of various factors in PMT on employees’ intention to comply with information security systems in their daily work situations. Moreover, the antecedents were selected based on the regression results and the fsQCA approach was applied to conduct a conditional configuration analysis of the factors affecting employees’ compliance intention with information security systems in PMT, in order to provide a theoretical basis for the effective prevention of information security incidents in enterprises.

2. Theoretical Basis and Research Hypothesis

2.1. Overview of Theory

PMT was first introduced by Rogers (1975) in 1975, to explain the process by which an individual’s motivation to protect arises in the face of environmental threats [16]. PMT mainly consists of threat appraisal and response appraisal, where threat appraisal consists of perceived severity, perceived susceptibility, and reward; and response appraisal consists of response efficacy, self-efficacy, and response cost [11]. The theory suggests that when an individual encounters a threat, the individual makes an assessment of the threat and the means available for response, and then chooses to perform or not perform certain protective behaviors.
Anderson C L and Agarwal R argued that the theory of conservation motivation is one of the most powerful explanatory theories for predicting an individual’s intention to engage in conservation action [17]. Previous literature has indicated that PMT is extensively used in the study of information security behavior [18,19,20,21]. Siponen M et al. [18] found that threat appraisal, self-efficacy, and response efficacy had a significant effect on the intention to comply with information security policies, and Tsai H.S. et al. [18] discussed the role of the factors in PMT in the context of information security, using a household computer user as a research subject. Herath T et al. [22] argued that both threat perception and response perception in PMT have an impact on the intention to comply with the information security system. Vance et al. [11] pointed out that perceived susceptibility and reward in threat appraisal and response efficacy, self-efficacy and response cost in response appraisal all have an impact on security policy compliance behavior. Furthermore, Menard P et al. [23] verified that response efficacy is the factor that has the strongest effect on information security behavioral intention. Employees make decisions on whether to comply with information security policies by assessing the potential threat of non-compliance and the usefulness of compliance in reducing information security incidents.

2.2. Research Hypotheses

Information security system refers to the information security standards, procedures, terms, and conditions set by the enterprise and that are required to be observed by employees in order to protect the security of information assets. In this paper, the intention of employees to comply with information security system is defined as their willingness to obey and implement the information security system set by their company.
Drawing on previous research models that applied the theory of conservation motivation, based on the expected utility framework, PMT motivates individuals to protect themselves on the basis of a comprehensive threat appraisal and response appraisal [11,12]. An individuals’ intention to perform protective actions is significantly higher if they perceive the severity and vulnerability of the threat, the effectiveness and achievability of the response, and if the cost of the measure is also low [10]. The research model is shown in Figure 1.
Threat appraisal reflects the individual’s assessment of perceived severity, and perceived vulnerability and reward. Perceived severity refers to the severity of the harm caused by a threat, as judged by the individual when confronted with that threat [24]. In this study, perceived severity is defined as the perception by employees of an organization that failure to comply with information security systems will be a security threat that will cause significant damage to the organization. When employees perceive that a security threat will cause significant damage or disruption, they are more likely to feel concerned and will in turn choose to comply with the information security system [22]. Perceived vulnerability refers to the likelihood that an individual perceives how likely he or she is to be harmed [25]. This study defines perceived vulnerability as the likelihood that employees believe that their companies will suffer from information security issues. The more likely an employee perceives that the company will be exposed to a security threat, the more likely they are to adopt protective behaviors. In addition, reward is defined as the benefit of an employee’s non-compliance with an company’s information security system. This study defines rewards as the time, effort, and other benefits that employees save by not complying with the information security system. Since employees often find it easier to carry out their daily work if they do not comply with the company’s information security system, they prefer the option of not complying with the information security system. Therefore, the following hypotheses are proposed:
 H1.
Perceived severity has a positive effect on employees’ intention to comply with the information security system.
 H2.
Perceived vulnerability has a positive effect on employees’ intention to comply with the information security system.
 H3.
Reward has a negative effect on employees’ intention to comply with the information security system.
Furthermore, response appraisal of PMT is an assessment of response efficacy, self-efficacy, and response costs. Response efficacy is the individual’s perception of the action they are taking [26]. If individuals perceive that the measures they undertake are indeed effective, then they will have a higher willingness to adopt the behavior. This study defines response efficacy as the degree to which employees trust that compliance with the information security system is an effective protection of the company’s information systems. The more employees believe that compliance with the information security system can reduce the occurrence of information security incidents, the more likely they will be to comply with the information security system. Self-efficacy refers to individuals’ beliefs regarding their own implementation of information security strategies [27]. In this study, self-efficacy is defined as employees’ beliefs that they can comply with the company’s information security system. As self-efficacy increases, the stronger the individual’s intention to generate protection-motivated behaviors becomes. Response cost is any form of costs associated with information security behaviors and is a countervailing force that prevents people from taking protective action [28]. This study defines reaction costs as the inconvenience of complying with information security systems. Negative feedback that information security management reduces productivity can trigger information security violations by employees [29]. When employees feel that the act of complying with information security systems causes their work to become tedious, their intention to comply with information security systems diminishes. Therefore, the following hypotheses are proposed:
 H4.
Reactive efficacy has a positive effect on employees’ intention to comply with the information security system.
 H5.
Self-efficacy has a positive effect on employees’ intention to comply with the information security system.
 H6.
Response cost has a negative effect on employees’ intention to comply with the information security system.
Employees are motivated toward protective action by an assessment of threat levels and response options. Threat appraisal refers to employees’ awareness that non-compliance with the information security system could make the enterprise more vulnerable to information security incidents and loss of information assets, while response appraisal refers to employees’ belief that they can achieve compliance with the information security system and thus effectively counteract information security threats to the enterprise. Whether the degree of influence of the above two is of equal value in the generation of protection motivation has to be investigated. Therefore, the following hypothesis is proposed:
 H7.
Threat appraisal and response appraisal differ in their degree of influence on employees’ intention to comply with the information security system.

3. Regression Analysis

3.1. Questionnaire Design and Testing

To ensure that the scale has high reliability and validity, the measurement scales used in this study were derived from existing research. The scale for each element of the PMT was modified from the scales of Bulgurcu et al. [30], Vance et al. [11], and Wurtele et al. [31]. The intention to comply with the information security system was measured using a situational questionnaire, with the specific context referenced from the study by Vance et al. [11] and suitably modified to fit this study. The specific questions on the questionnaire are detailed in Appendix A.
In terms of the control variables, various studies have shown that there are significant gender differences in the findings regarding intention to comply with data protection regulations [32]. In general, the older and more experienced the employees are, the more influence this will also have on their information security behavior. Marriage can enhance employees’ sense of responsibility, while education level has an impact on employees’ perceptions, both of which can affect employees’ information security behavior. Based on the above analysis, gender, age, work experience, marital status, and education level were used as control variables in this study. As state-owned enterprises, private enterprises, and joint venture or wholly foreign-owned enterprises attach different levels of importance to enterprise information security, the information security behaviors of managers and junior employees also vary greatly, and thus the nature of the position and type of enterprise were also categorized as control variables.
After the initial design of the scale was completed, 38 employees were randomly selected to take the test. The factor loadings of the questions were all above the benchmark of 0.50, and the validity test was effective. In addition, based on feedback from the participants, the descriptions of the questions were revised, to improve the clarity and comprehensibility.
A total of 325 questionnaires were collected and 101 invalid questionnaires were excluded, resulting in 224 valid questionnaires, with a valid return rate of 68.92%. The results of the descriptive statistics of the sample for this study are detailed in Table 1. Among the respondents, 48.70% were male and 51.30% were female, with an even gender distribution; the distribution of ages and working years was also reasonable.

3.2. Common Method Bias Test

To exclude the effect of common method bias, Harman’s single-factor test was applied in the statistical control section of this study. The test results indicated that the variance explained by the first factor was 31.70%, which is less than the benchmark of 40%, excluding the effect of common method bias.

3.3. Reliability and Validity Analysis

The reliability and validity of the scales were tested and the results are detailed in Table 2 and Table 3.
In this study, internal consistency reliability (Cronbach’s α) and composited reliability (CR) were used to evaluate the reliability of the scales. Previous studies identified that a Cronbach’s α and CR value greater than 0.70 indicate good reliability of a questionnaire [33]. From Table 2, it can be seen that most of the evaluation indicators of Cronbach’s α and CR values of the variables are greater than the benchmark value of 0.70, indicating that the reliability of the measurement scale is good.
Studies have identified that when the average variable extraction (AVE) for each construct is greater than 0.5 and the factor loading is greater than 0.6, this indicates that the model has good convergent validity; while when the square root of AVE for each variable is much greater than the correlation coefficient between the variables, this indicates that the model has good discriminant validity [34]. As can be seen from Table 2, the AVE values for all the constructs in this study were greater than 0.50 and the factor loadings were greater than 0.6, indicating that the scale has good convergent validity. Table 3 shows that the square root of AVE for each construct is greater than the correlation coefficient between all the variables, indicating that the scale has good discriminant validity.

3.4. Descriptive Statistics

The descriptive statistics of this study are presented in Table 4. It shows that the perceived severity, perceived vulnerability, response efficacy, and self-efficacy were all significantly and positively correlated with employees’ intention to comply with the information security system, while rewards and response costs were all significantly and negatively correlated with compliance with the information security system. The results provided a basis for testing the research hypotheses.

3.5. Hypothesis Testing

This study tested the hypotheses through linear regression, and the results are presented in Table 5. Model 1 to 7 all used employee information security system compliance intention as the dependent variable. Model 1 used the control variables as the independent variables, while Model 2 to 7 added a series of variables to test the research hypotheses, including perceived severity, perceived susceptibility, reward, response efficacy, self-efficacy, and response cost.
The results of the tests are as follows: Perceived severity had a significantly positive effect on employees’ intention to comply with the information security system (β = 0.26, p < 0.001); Perceived susceptibility had a significantly positive effect on employees’ intention to comply with the information security system (β = 0.34, p < 0.001); Reward had a significantly negative effect on employees’ intention to comply with the information security system (β = −0.32, p < 0.001); Response efficacy had a significantly positive effect on employees’ intention to comply with the information security system (β = 0.34, p < 0.001); Self-efficacy had a significantly positive effect on employees’ intention to comply with the information security system (β = 0.47, p < 0.001); Response cost had a significantly negative effect on employees’ intention to comply with the information security system (β = −0.21, p < 0.01). From the above results, it can be concluded that H1 to H6 were all validated.
In this study, both threat appraisal and response appraisal were analyzed in the same model, and H7 was tested by comparing the regression coefficients of threat appraisal and response appraisal. The results indicated that β1 = 0.21 and β2 = 0.17 (β1 is the regression coefficient of threat appraisal and β2 is the regression coefficient of response appraisal), with β1 > β2, and thus H7 was verified. This is diametrically opposed to the conclusion of Yan et al. (2020) [35] that users’ willingness to secure information in mobile information services is more affected by response appraisal, possibly because the constructs of threat appraisal and response appraisal in the two studies were different. In the former study, threat appraisal was composed of perceived severity and perceived vulnerability, while the response appraisal was composed of response efficacy and self-efficacy. However, this paper added the construct of reward to threat appraisal and response cost to response appraisal, with both reward and response cost having a significant negative effect on employees’ intention to comply with the information security system, which may be the reason for the inconsistency between the findings of this paper and the former study.

4. FsQCA of Factors Influencing Employees’ Intention to Comply with Information Security Systems

4.1. The Methodology of FsQCA

FsQCA is a computational approach to the analysis of sets based on the principles of Boolean algebra and set theory, with the underlying philosophy of using truth tables and the idea of logical minimization to generalize the patterns presented in case data [36,37]. Traditional research models of correlation theory are all based on the assumptions of reductionism and focus on the analysis of simple linear relationships between individual antecedents and outcomes, without discussion of complex causal relationships that do not have multiple concurrent causes [38]. Exploring the different combinations of factors in which outcomes occur, namely the “equifinality” of complex causal relationships, is one of the strengths of fsQCA [39]. From reviewing the studies that applied qualitative comparative analysis, it was found that a growing number of management research areas have adopted fsQCA. The method has been widely used in management fields such as business management, energy resources, entrepreneurship research, and urban governance. For example, it has been applied to qualitative comparative analysis, to enrich organizational strategy and configuration theory, to explore the configurational pathways leading to energy price stability, and to investigate the role of different combinations of influencing factors on the success of individual entrepreneurship [40,41,42,43].

4.2. FsQCA Model

The regression analysis results of the elements of PMT revealed that perceived severity, perceived vulnerability, reward, response efficacy, self-efficacy, and response cost are the antecedents that influence employees’ intention to comply with information security systems. However, their compliance intention may not necessarily stem from the influence of a single factor alone, and it is possible for multiple factors to influence the outcome. Although the regression analysis method can analyze the causal relationship between individual antecedent factors and employees’ intention to comply with the information security system, it cannot demonstrate the overall effect of the combination of the antecedent factors. Therefore, this section enriches the findings using fsQCA, to reveal the configuration paths that influenced employees’ intention to comply with the information security system, and tries to explain how different combinations of the above antecedents affected the compliance intention. The fsQCA model is shown in Figure 2.

4.3. Data Calibration

To facilitate the operation of the fsQCA software and the simplicity of subsequent descriptions, the antecedent variables involved in this study were labelled with the following abbreviations: PS for perceived severity, PV for perceived vulnerability, R for reward, RE for response efficacy, SE for self-efficacy, RC for response cost, and IB for employees’ intention to comply with the information security system. As the data for this study were obtained from a questionnaire, the sample data were of the numerical type, with a five-point Likert scale. Prior to the data analysis, the sample data needed to be converted into fuzzy set membership scores between 0 and 1: a fuzzy set membership score of 0 means “full non-membership”; fuzzy set membership score of 0.5 is the crossover point between non-membership and membership; and fuzzy set membership score of 1 is “full membership”. The data calibration required the setting of three anchor points: full membership, crossover point, and full non-membership [44]. The percentile was used as an anchor point in the calibration of the Likert scale data [45,46]. Misangyi et al. [47] (2017) stated that specific anchor point percentile values should be determined based on the characteristics of the data distribution. Therefore, this study used the ninety-fifth and fifth quintiles as full membership and full non-membership anchor points for the aforementioned antecedent and outcome variables based on the actual data distribution characteristics, and used the median as the crossover point, which was calculated using the calibrate function in the fsQCA software. Furthermore, the antecedent conditions and anchor values for which calibration had been completed were imported into the software [24]. In terms of analysis, if the case membership value was 0.5, it would be removed due to uncertainty regarding its membership set. To overcome this problem, the calibrated value of 0.5 was converted to 0.501, by increasing by 0.001.

4.4. Necessity Analysis

Prior to the qualitative comparative analysis, a necessity analysis was conducted on a single variable, to investigate whether there were necessary conditions for the outcome variable in each of the antecedent variables. In this study, the calibrated values were imported into fsQCA 3.0, and the option “Necessary Conditions” was selected to perform a necessity analysis of the production and non-production of the outcomes, resulting in consistency and raw coverage values for each of the antecedent variables. The consistency value indicates the proportion of antecedent conditions that are necessary for the outcome variable, while the raw coverage value reflects the strength of the explanation of the outcome variable by the antecedent variable. The magnitude of consistency value can determine whether the antecedent variable is necessary or not. When the consistency value of the antecedent variable is higher than 0.9, the variable can be considered necessary for the outcome to occur. It is evident from Table 6 that the consistency values of all the antecedent variables were less than 0.9, so that the explanatory power of a single variable on the outcome variable was insufficient and the configuration effect of the antecedent variables needed to be further explored.

4.5. Sufficiency Analysis

The sufficiency analysis included the construction of a truth table and a standardized analysis. The truth table was initially constructed by selecting the truth table production algorithm option “Analyze” in fsQCA 3.0 and incorporating the antecedent and outcome variables into the analysis software, to obtain the truth table. Each row in the truth table represents a possible situation and shows all possible constructs. Second, the consistency and frequency thresholds need to be set, which removes configurations with low consistency or frequency. Fiss [37] (2011) suggested that the consistency threshold can be set to 0.8 for qualitative comparative analysis of fuzzy sets, and the frequency threshold needs to ensure that the number of retained samples is not less than 75% of the number of total samples, which is generally based on the number of samples. The frequency threshold can be set to 1 when the sample size is small, whereas it can be raised as the sample size increases [48,49]. In this study, the consistency threshold was set at 0.8, with the frequency threshold at 2. The existence of contradictory configurations was mitigated by changing the value of the outcome variable of 1 to 0 for PRI values less than 0.7. The data were then standardized, and when selecting the counterfactual analysis, all conditions were selected as “present or absent” in this step, because any of the antecedent variables may have had an impact on employees’ intention to comply with the information security system.
Three types of solutions emerge after the standardized analysis by fsQCA 3.0: complex solutions (conservative solutions that do not incorporate logical remainder terms), simple solutions (incorporating all logical remainder terms), and intermediate solutions (incorporating partially factored logical remainder terms). The results are discussed mainly in terms of intermediate solutions, aided by simple solutions, to identify the core and auxiliary conditions [37]. The analysis of the intermediate and simple solutions yielded seven configurations that produced results for employees’ intention to comply with the information security system (see Table 7).
From the above results, it can be concluded that seven different condition configurations leading to the result that employees’ intention to comply with the information security system were generated. The preliminary analyses of the seven conditional configurations are as follows:
Configuration 1a: PS*PV*~R*SE. This indicates that employees with a high perceived severity, perceived vulnerability, and self-efficacy but low rewards have a stronger intention to comply with the information security system, regardless of their response effectiveness and response cost. In this configuration, high perceived severity, high self-efficacy, and low rewards are the core conditions.
Configuration 1b: PS*~R*RE*SE. This indicates that employees with a high perceived severity, response efficacy, and self-efficacy but low rewards have a stronger intention to comply with the information security system, regardless of their perceived vulnerability and response cost. In this configuration, high perceived severity, high self-efficacy, and low rewards are the core conditions.
Configuration 2a: ~PV*~R*RE*SE*~RC. This indicates that employees with a high response efficacy and self-efficacy but low perceived vulnerability, rewards, and response costs have a stronger intention to comply with the information security system, regardless of their perceived severity. In this configuration, high response efficacy, low rewards, and low response costs are the core conditions.
Configuration 2b: PS*PV*~R*RE*~RC. This indicates that employees with a high perceived severity, perceived vulnerability, and response efficacy, but low reward and response cost have a stronger intention to comply with the information security system, regardless of their self-efficacy. In this configuration, high response efficacy, low rewards, and low response costs are the core conditions.
Configuration 3: PS*~R*SE*~RC. This indicates that employees with a high perceived severity and high self-efficacy but low reward and response costs have a stronger intention to comply with the information security system, regardless of their perceived vulnerability and response efficacy. In this configuration, high perceived severity, high self-efficacy, low rewards, and low response costs are the core conditions.
Configuration 4: PS*RE*SE*~RC. This indicates that employees with a high perceived severity, response efficacy, and self-efficacy, but low response cost, have a stronger intention to comply with the information security system, regardless of their perceived vulnerability and rewards. In this configuration, high perceived severity, high self-efficacy, and low response cost are the core conditions.
Configuration 5: PV*R*RE*SE*~RC. This indicates that employees with a high perceived vulnerability, rewards, response efficacy, and self-efficacy, but low response costs, have a stronger intention to comply with the information security system, regardless of their perceived severity. In this configuration, high perceived susceptibility, high response efficacy, high self-efficacy, and low response cost are the core conditions.

5. Result and Discussion

5.1. Discussion of the Regression Analysis Results

Focusing on employees in domestic enterprises, this paper confirms that all elements of PMT have significant effects on employees’ intention to comply with the information security system: perceived severity, perceived vulnerability, response effectiveness, and self-efficacy all have positive effects on employees’ intention to comply with the information security system, the finding regarding perceived severity is consistent with the finding of Vance et al. [11], and perceived susceptibility, response efficacy, and self-efficacy were validated, with the same findings as in Ifinedo’s study [12]; while rewards and response costs have negative effects on compliance intention, which is consistent with the findings of Vance et al. [11]. This suggests that employees are more likely to make the decision to comply with the information security system if the perceived security threat from non-compliance is greater and the ease of perceiving the threat is higher, and if they believe that compliance with the information security system can effectively counteract the information security threat and perceive a high likelihood that they can achieve this. On the other hand, employees are more likely to choose not to comply with information security systems if they perceive that the benefits are greater and the costs of compliance are higher. The basic assumption of the theory of rational behavior is that people are rational and consider the implications and consequences of their actions based various information before making a decision. The results of this study are consistent with the basic assumptions of the theory of rational behavior, in that both the threat appraisal (perceived severity, perceived vulnerability, and reward) and response appraisal (response efficacy, self-efficacy, and response cost) have an impact on employees’ intention to comply with the information security system in their own behavioral intention.
To the extent that it influences employees’ intention to comply with information security systems, threat appraisal plays a greater role than response appraisal. The loss aversion effect in psychology states that the negative utility from an equivalent loss is 2.5 times greater than the positive utility from an equivalent gain. Threat appraisal refers to the assessment of the threat posed by an employee’s non-compliance with the information security system and provides negative utility to the employees. In contrast, response appraisal refers to the assessment of the likelihood of employees complying with the information security system, in order to respond to information security threats, and provides positive utility to employees. Hence, the utility value of threat appraisal is greater than that of response appraisal. According to the utility theory, it can be concluded that the assessment of external information security threats is more influential in employees’ intention to comply with an information security system than their assessment of whether they have the ability to respond to and avoid threats.

5.2. Discussion of the fsQCA Results

Three values are present for all the configurations in the fsQCA analysis results: consistency, raw coverage, and unique coverage. Specifically, consistency is the probability that a certain combination of antecedent variables would produce the outcome variable; raw coverage is the proportion of the case configuration across all the cases produced by the results; and unique coverage is the proportion of the cases produced by the results that can only be explained by that configuration. From Table 7, it can be seen that the consistency of configurations 1–5, as well as the solution, is higher than the theoretical value (0.8), suggesting that the reliability of the above configurations was superior and that all of the above seven configurations were sufficient conditions to lead to the generation of employees’ intention to comply with the information security system. The raw coverage of each conditional configuration was higher than 20%, indicating that each configuration can explain more than 20% of the total sample. Moreover, the overall coverage of the solution was 0.630714, covering approximately 63% of the case sample, indicating that the above seven conditional configurations can explain more than 63% of the cases of employee information security system compliance intention generation in the total sample, among which conditional configuration 1a had the highest raw coverage and a stronger explanation for the generation of the outcome variables.
Comparison of the seven configurations reveals that: (1) Reward, self-efficacy, and response cost appear as core conditions in five of the configurations with the highest probability of occurrence. This indicates that rewards, self-efficacy, and response costs are important conditions for increasing employees’ intention to comply with the information security system. Therefore, in order to increase employee’s compliance intentions, it is necessary to start by improving employees’ self-efficacy and reducing the rewards associated with perceived non-compliance and the costs resulting from their compliance behavior. (2) Response cost is a core condition whenever it appears in a configuration, and it appears in all five configurations. This suggests that response cost plays a pivotal role in promoting employees’ intention to comply with the information security system relative to other variables. (3) A comparative analysis of the raw coverage of each configuration showed that perceived severity and self-efficacy appear in the core conditions of all the configurations with a raw coverage greater than 40%. This indicates that enhancing employees’ perceived severity and self-efficacy can maximize employees’ intention to comply with the information security system within an organization.

6. Conclusions and Prospects

6.1. Reflections on Management

In light of the regression analysis results, enterprises should regularly conduct information security education and training for employees. The ability of employees to perceive information security threats can be enhanced by learning about information security cases in the same industry, and the perceived severity and perceived vulnerability of employees can be improved, thus increasing their willingness to comply with the information security system and contributing to the sustainable development of the enterprise. Moreover, it is recommended that lectures and communication sessions related to enterprise information security be held regularly. Through information security lectures and communication sessions, employees can experience a positive information security atmosphere in the enterprise, which may facilitate employees’ effectiveness of response and self-efficacy. This would promote the positive behavior of employees in complying with the information security system, effectively protecting enterprise information assets and improving the level of enterprise security management.
Based on the fsQCA results, it is evident that increasing employees’ perceived severity and self-efficacy, as well as reducing employees’ perceived rewards for security non-compliance, would have the strongest effect on improving employees’ intention to comply with information security systems, considering the raw coverage of each configuration effect. Companies could design targeted training courses that focus on improving employees’ perceived severity and self-efficacy. In addition, information security system regulations could be optimized, with reference to multiple opinions, improving the scientific basis of information security systems, to reduce employees’ perceptions of rewards for security non-compliance.

6.2. Limitations and Prospects

There are some limitations in this study. First of all, when measuring the dependent variable of employees’ intention to comply with the information security system, a scenario-based questionnaire was adopted, and the specific scenarios in the questionnaire were designed with reference to existing studies and in line with actual situations, but other information security behavior scenarios were not taken into account. In further research, more scenarios could be selected through observation by conducting in-depth field research. Moreover, this study merely considered individual influences, while organizational contextual factors can also influence individual behavior, and future studies may consider adding organizational factors.

Author Contributions

W.L. and L.S. are joint first authors in this study. Conceptualization, W.L., L.S. and R.L.; methodology, R.L.; investigation, J.G.; data curation, Z.G. and R.L.; writing—original draft preparation, R.L.; writing—review and editing, L.S. and W.L.; project administration, L.S. and W.L.; funding acquisition, L.S and J.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key R&D Program Project: “Open Ecological Cloud ERP Platform” grant number 2019YFB1704103.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

Most of the data of this study are presented, and the remainder can be obtained from the corresponding author upon reasonable request.

Acknowledgments

The authors would like to thank all the people that supported this study.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

This section gives the questionnaire applied to obtain the research data needed for this study.
Questionnaire for the study of insecure behavior in the context of information security:
Hello! First of all, thank you very much for participating in this survey during your busy schedule. This is a purely academic and anonymous research questionnaire, which aims to study the insecure behavior of employees in the context of information technology and its influencing factors. The questionnaire is anonymous and the survey does not involve business secrets, and there are no right or wrong answers. Your support is crucial to our research. Once again, we express our sincere gratitude for your cooperation!
Questionnaire instructions: 1. There is only one answer for each question; 2. Fill in the questionnaire according to your actual situation; 3. Please try to answer each question and do not miss anything. Please tick on the options.
Part I
Gender: (1) Male (2) Female
Age: (1) 30 years and below (2) 31 to 40 years (3) 41 to 50 years (4) above 50 years
Marital status: (1) married (2) unmarried
Education: (1) below college (2) college and undergraduate (3) graduate
Working years: (1) 5 years or less (2) 6 years to 10 years (3) 11 years to 15 years (4) 16 years or more
Job nature: (1) grass-roots staff (2) middle-level grass-roots managers (3) senior managers
Enterprise type: (1) state-owned enterprises (2) private enterprises (3) joint ventures or wholly-owned foreign enterprises
Whether the company belongs to the software and information technology service industry:
(1) Yes (2) No
Part II
The following questions reflect some situations at work, so please choose according to your true feelings. For each question, choose from the 5 levels of the scale below, and tick the level that best fits your situation, without duplication.
[1: “Completely disagree (not at all consistent)”, 2: “Less agree (less consistent)”, 3: “Not sure”, 4: “More agree (more consistent)”, 5: “Completely agree (fully consistent)”]
Serial No.Title ItemsLikert Scale of 5 Levels
12345
1If I copy some of my company’s confidential data to unencrypted portable media (such as a USB drive), it can create serious information security problems for my company.
2If I do not comply with the information security system, the company I work for will face serious information security problems.
3For me, the loss of data privacy by not complying with the information security system is a serious issue.
4The work computer was invaded by a virus and the company’s information security system requires contacting a professional to remove the virus. If I choose to solve the virus problem myself, I can save my work time.
5The company’s information security system prohibits copying this data to unencrypted portable media (e.g., USB drives), and it saves me time at work if I copy the data to a USB drive to facilitate analysis of the data during a business trip.
6Failure to comply with the information security system saves time on the job.
7If I do not comply with the information security system, I may be exposed to information security threats.
8If I do not follow the information security system, the company I work for may have information security problems.
9The company’s information security system states that passwords are not to be shared, and if I share my password with a colleague, there may be information security issues.
10Compliance with the information security system can reduce the probability of information system security problems.
11Comply with the information security system, and there will be few information system security problems.
12Compliance with the information security system can prevent security breaches in the company’s information system.
13It is easy for me to comply with the information security system established by the company.
14I am able to consciously comply with the information security system.
15Compliance with the information security system inconveniences my daily work.
16Compliance with the information security system incurs associated administrative costs.
17Complying with the information security system not only takes time but also requires a lot of effort.
18Compliance with information security systems can be a waste of work time.
The following six items are situational questions. In the following scenarios, choose whether you agree with what the people in the scenario are doing on the 5-point scale below.
19Ming walks to the shared office printer alone and sees a document printed by someone else. The document is marked as “confidential”. The information security system prohibits reading confidential information, but Ming is curious and chooses to read the document. Do you agree with Ming’s action?
20Jun is browsing a website that may be problematic at work when an anti-virus program alerts him that his computer has been invaded by a virus. Although the information security system requires contacting a professional to remove the virus, Jun chooses to solve the virus problem himself for convenience. Do you agree with Jun’s approach?
21Li takes her work laptop home to work. Her children want to use the laptop to play games. Although her company’s information security system prohibits sharing the work computer with anyone. However, Li gives the laptop to her children to use. Do you agree with what Li is doing?
22Le is working in a position that requires him to know the personnel details of the company. His company’s information security system prohibits copying this data to unencrypted portable media (such as a USB drive). However, Le is on a business trip and he wants to analyze the personnel data during the trip, so he chooses to copy this data to his own portable USB drive. Do you agree with Le’s approach?
23The information security system at Hong’s company requires all users to lock their computers every time they leave them. Hong’s supervisor asks Xiaohong to unlock her computer before she leaves so that other employees can use it. So Hong unlocks the computer before she leaves. Do you agree with Hong’s approach?
24Kai uses a file server at work, which he can access by entering a password. His company’s information security system states that passwords are not to be shared. Kai is on a business trip and one of his colleagues needs the files on the file server. So Kai tells his colleague the password. Do you agree with Kai’s approach?

References

  1. Wang, X.; Zhang, C.; Deng, J.; Su, C.; Gao, Z. Analysis of factors influencing miners’ unsafe behaviors in intelligent mines using a novel hybrid MCDM model. Int. J. Environ. Res. Public Health 2022, 19, 7368. [Google Scholar] [CrossRef] [PubMed]
  2. Neal, A.; Griffin, M.A.; Hart, P.M. The impact of organizational climate on safety climate and individual behavior. Saf. Sci. 2000, 34, 99–109. [Google Scholar] [CrossRef]
  3. Johnston, A.C.; Warkentin, M.; Siponen, M. An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric. MIS Q. 2015, 39, 113–134. [Google Scholar] [CrossRef]
  4. Anderson, C.; Baskerville, R.L.; Kaul, M. Information security control theory: Achieving a sustainable reconciliation between sharing and protecting the privacy of information. J. Manag. Inf. Syst. 2017, 34, 1082–1112. [Google Scholar] [CrossRef]
  5. Cheng, L.; Li, Y.; Li, W.; Holm, E.; Zhai, Q. Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Comput. Secur. 2013, 39, 447–459. [Google Scholar] [CrossRef]
  6. D’Arcy, J.; Herath, T.; Shoss, M.K. Understanding employee responses to stressful information security requirements: A coping perspective. J. Manag. Inf. Syst. 2014, 31, 285–318. [Google Scholar] [CrossRef]
  7. Workman, M.; Bommer, W.H.; Straub, D. Security lapses and the omission of information security measures: A threat control model and empirical test. Comput. Hum. Behav. 2008, 24, 2799–2816. [Google Scholar] [CrossRef]
  8. Chen, H.; Chau, P.Y.K.; Li, W. The effects of moral disengagement and organizational ethical climate on insiders’ information security policy violation behavior. Inf. Technol. People 2019, 32, 973–992. [Google Scholar] [CrossRef]
  9. Workman, M. How perceptions of justice affect security attitudes: Suggestions for practitioners and researchers. Inf. Manag. Comput. Secur. 2009, 17, 341–353. [Google Scholar] [CrossRef]
  10. Lee, Y. Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective. Decis. Support Syst. 2011, 50, 361–369. [Google Scholar] [CrossRef]
  11. Vance, A.; Siponen, M.; Pahnila, S. Motivating IS security compliance: Insights from Habit and Protection Motivation Theory. Inf. Manag. 2012, 49, 190–198. [Google Scholar] [CrossRef]
  12. Ifinedo, P. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Comput. Secur. 2012, 31, 83–95. [Google Scholar] [CrossRef]
  13. Alassaf, M.; Alkhalifah, A. Exploring the influence of direct and indirect factors on information security policy compliance: A systematic literature review. IEEE Access 2021, 9, 162687–162705. [Google Scholar] [CrossRef]
  14. Chen, X.; Chen, L.; Wu, D. Factors that influence employees’ security policy compliance: An awareness-motivation-capability perspective. J. Comput. Inf. Syst. 2018, 58, 312–324. [Google Scholar] [CrossRef]
  15. Son, J.-Y. Out of fear or desire? Toward a better understanding of employees’ motivation to follow IS security policies. Inf. Manag. 2011, 48, 296–302. [Google Scholar] [CrossRef]
  16. Rogers, R.W. A protection motivation theory of fear appeals and attitude change1. J. Psychol. 1975, 91, 93–114. [Google Scholar] [CrossRef] [PubMed]
  17. Anderson, C.L.; Agarwal, R. Practicing safe computing: A multimedia empirical examination of home computer user security behavioral intentions. MIS Q. 2010, 34, 613–643. [Google Scholar] [CrossRef] [Green Version]
  18. Siponen, M.; Pahnila, S.; Mahmood, A. Employees’ adherence to information security policies: An empirical study. In Proceedings of the IFIP TC 11 22nd International Information Security Conference, Sandton, South Africa, 14–16 May 2007. [Google Scholar]
  19. Tsai, H.S.; Jiang, M.; Alhabash, S.; LaRose, R.; Rifon, N.J.; Cotten, S.R. Understanding online safety behaviors: A protection motivation theory perspective. Comput. Secur. 2016, 59, 138–150. [Google Scholar] [CrossRef] [Green Version]
  20. Lee, D.; Larose, R.; Rifon, N. Keeping our network safe: A model of online protection behaviour. Behav. Inf. Technol. 2008, 27, 445–454. [Google Scholar] [CrossRef]
  21. Vedadi, A.; Warkentin, M. Can secure behaviors be contagious? A two-stage investigation of the influence of herd behavior on security decisions. J. Assoc. Inf. Syst. 2020, 21, 428–459. [Google Scholar] [CrossRef]
  22. Herath, T.; Rao, H.R. Protection motivation and deterrence: A framework for security policy compliance in organisations. Eur. J. Inf. Syst. 2009, 18, 106–125. [Google Scholar] [CrossRef]
  23. Menard, P.; Bott, G.J.; Crossler, R.E. User motivations in protecting information security: Protection Motivation Theory versus Self-Determination Theory. J. Manag. Inf. Syst. 2017, 34, 1203–1230. [Google Scholar] [CrossRef]
  24. Witte, K. Putting the fear back into fear appeals: The extended parallel process model. Commun. Monogr. 1992, 59, 329–349. [Google Scholar] [CrossRef]
  25. Rosenstock, I.M. Historical origins of the health belief model. Health Educ. Monogr. 1974, 2, 328–335. [Google Scholar] [CrossRef]
  26. Johnston, A.C.; Warkentin, M. Fear appeals and information security behaviors: An empirical study. MIS Q. 2010, 34, 549–566. [Google Scholar] [CrossRef]
  27. Rhee, H.-S.; Kim, C.; Ryu, Y.U. Self-efficacy in information security: Its influence on end users’ information security practice behavior. Comput. Secur. 2009, 28, 816–826. [Google Scholar] [CrossRef]
  28. Posey, C.; Roberts, T.L.; Lowry, P.B. The impact of organizational commitment on insiders’ motivation to protect organizational information assets. J. Manag. Inf. Syst. 2015, 32, 179–214. [Google Scholar] [CrossRef]
  29. Pham, H.C.; Brennan, L.; Furnell, S. Information security burnout: Identification of sources and mitigating factors from security demands and resources. J. Inf. Secur. Appl. 2019, 46, 96–107. [Google Scholar] [CrossRef]
  30. Bulgurcu, B.; Cavusoglu, H.; Benbasat, I. Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Q. 2010, 34, 523–548. [Google Scholar] [CrossRef] [Green Version]
  31. Wurtele, S.K.; Maddux, J.E. Relative contributions of protection motivation theory components in predicting exercise intentions and behavior. Health Psychol. 1987, 6, 453–466. [Google Scholar] [CrossRef]
  32. Foth, M. Factors influencing the intention to comply with data protection regulations in hospitals: Based on gender differences in behaviour and deterrence. Eur. J. Inf. Syst. 2016, 25, 91–109. [Google Scholar] [CrossRef]
  33. Hair, J.F.; Ringle, C.M.; Sarstedt, M. PLS-SEM: Indeed a silver bulle. J. Mark. Theory Pract. 2011, 19, 139–152. [Google Scholar] [CrossRef]
  34. Fornell, C.; Larcker, D.F. Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 1981, 18, 39–50. [Google Scholar] [CrossRef]
  35. Yan, W.; Liu, Q. The research on influencing factors of users’ personal lnformation security behavioral lntention in mobile information service. Res. Libr. Sci. 2020, 4, 68–77. [Google Scholar]
  36. Ragin, C.C. Redesigning Social Inquiry: Fuzzy Sets and Beyond; University of Chicago Press: Chicago, IL, USA, 2008; pp. 44–68. [Google Scholar]
  37. Fiss, P.C. Building better causal theories: A fuzzy set approach to typologies in organization research. Acad. Manag. J. 2011, 54, 393–420. [Google Scholar] [CrossRef] [Green Version]
  38. Furnari, S.; Crilly, D.; Misangyi, V.F.; Greckhamer, T.; Fiss, P.C.; Aguilera, R.V. Capturing causal complexity: Heuristics for configurational theorizing. Acad. Manag. Rev. 2020, 46, 778–799. [Google Scholar] [CrossRef]
  39. Fiss, P.C. A set-theoretic approach to organizational configurations. Acad. Manag. Rev. 2007, 32, 1180–1198. [Google Scholar] [CrossRef] [Green Version]
  40. Greckhamer, T.; Furnari, S.; Fiss, P.C.; Aguilera, R.V. Studying configurations with qualitative comparative analysis: Best practices in strategy and organization research. Strateg. Organ. 2018, 16, 482–495. [Google Scholar] [CrossRef] [Green Version]
  41. Estevão, J.; Raposo, C. The impact of the 2030 Climate and Energy Framework Agreement on electricity prices in MIBEL: A mixed-methods approach. J. Bus. Res. 2018, 89, 411–417. [Google Scholar] [CrossRef]
  42. Douglas, E.J.; Shepherd, D.A.; Prentice, C. Using fuzzy-set qualitative comparative analysis for a finer-grained understanding of entrepreneurship. J. Bus. Ventur. 2020, 35, 105970. [Google Scholar] [CrossRef]
  43. Beynon, M.J.; Jones, P.; Pickernell, D. The role of entrepreneurship, innovation, and urbanity-diversity on growth, unemployment, and income: US state-level evidence and an fsQCA elucidation. J. Bus. Res. 2019, 101, 675–687. [Google Scholar] [CrossRef]
  44. Murthy, R.K.; Madhok, A. Overcoming the early-stage conundrum of digital platform ecosystem emergence: A problem-solving perspective. J. Manag. Stud. 2021, 58, 1899–1932. [Google Scholar] [CrossRef]
  45. Duarte, P.; Pinho, J.C. A mixed methods UTAUT2-based approach to assess mobile health adoption. J. Bus. Res. 2019, 102, 140–150. [Google Scholar] [CrossRef]
  46. Gupta, K.; Crilly, D.; Greckhamer, T. Stakeholder engagement strategies, national institutions, and firm performance: A configurational perspective. Strateg. Manag. J. 2020, 41, 1869–1900. [Google Scholar] [CrossRef]
  47. Misangyi, V.F.; Greckhamer, T.; Furnari, S.; Fiss, P.C.; Crilly, D.; Aguilera, R. Embracing causal complexity: The emergence of a neo-configurational perspective. J. Manag. 2017, 43, 255–282. [Google Scholar] [CrossRef]
  48. Rihoux, B.; Ragin, C.C. Configurational Comparative Methods: Qualitative Comparative Analysis (QCA) and Related Techniques; Sage Publications: Thousand Oaks, CA, USA, 2008. [Google Scholar]
  49. Schneider, C.Q.; Wagemann, C. Set-Theoretic Methods for the Social Sciences: A Guide to Qualitative Comparative Analysis; Cambridge University Press: New York, NY, USA, 2012. [Google Scholar]
Figure 1. Model of the research hypotheses.
Figure 1. Model of the research hypotheses.
Ijerph 19 16038 g001
Figure 2. fsQCA model.
Figure 2. fsQCA model.
Ijerph 19 16038 g002
Table 1. Participants’ characteristics.
Table 1. Participants’ characteristics.
MeasureItemsFrequencyPercent
GenderMale10948.70
Female11551.30
Age30 years and below10747.80
31 to 40 years4419.60
41 to 50 years5825.90
Above 50 years156.70
Marital statusMarried12354.90
Unmarried10145.10
EducationBelow college188.00
College and undergraduate14564.70
Graduate6127.20
Work experience5 years or less10145.10
6 years to 10 years2310.30
11 years to 15 years2611.60
16 years or more7433.00
Work natureGrass-roots staff15167.40
Middle-level grass-roots managers6026.80
Senior managers135.80
Enterprise typeSoftware and information services industry6529.00
Not in the software and information services industry15971.00
Table 2. Measurement scales and evaluation indicators for reliability and validity.
Table 2. Measurement scales and evaluation indicators for reliability and validity.
VariableTermFactor LoadingAVECRCronbach’s α
Perceived severityPS10.840.760.910.84
PS20.89
PS30.89
Perceived vulnerabilityPV10.630.670.860.74
PV20.92
PV30.88
RewardR10.810.670.860.75
R20.89
R30.74
Response efficacyRE10.820.700.870.78
RE20.87
RE30.82
Self-efficacySE10.880.770.870.70
SE20.88
Response costRC10.780.520.810.69
RC20.75
RC30.72
RC40.62
The compliance intention of employees with the information security systemIB10.810.690.930.91
IB20.86
IB30.87
IB40.87
IB50.73
IB60.83
Table 3. Discriminant validity test results.
Table 3. Discriminant validity test results.
VariablePerceived SeverityPerceived
Vulnerability
RewardResponse EfficacySelf-EfficacyResponse CostThe Compliance Intention of
Employees with the
Information
Security System
Perceived severity0.87------
Perceived vulnerability0.570.82-----
Reward−0.38−0.240.82----
Response efficacy0.460.56−0.310.83---
Self-efficacy0.260.29−0.330.330.88--
Response cost−0.050.040.32−0.06−0.270.72-
The compliance intention of employees to information security system0.330.36−0.430.380.47−0.210.83
Note: Diagonal black bold numbers are the square root of AVE values; correlation coefficients are in the lower triangle of the matrix.
Table 4. Mean, standard deviation, and correlation coefficient.
Table 4. Mean, standard deviation, and correlation coefficient.
VariableMean ValueStandard DeviationPerceived SeverityPerceived VulnerabilityRewardResponse EfficacySelf-EfficacyResponse Cost
Perceived severity3.971.01------
Perceived vulnerability3.980.90------
Reward2.241.04------
Response efficacy4.050.91------
Self-efficacy4.170.82------
Response cost2.860.89------
The compliance intention of employees with the information security system4.400.810.33 ***0.36 ***−0.43 ***0.38 ***0.47 ***−0.21 **
Note: ** is p < 0.01, *** is p < 0.001.
Table 5. Results of the regression analysis.
Table 5. Results of the regression analysis.
VariableDependent Variable: The Compliance Intention of Employees with Information Security System
Model 1Model 2Model 3Model 4Model 5Model 6Model 7
Independent variablesPerceived severity-0.26 ***-----
Perceived vulnerability--0.34 ***----
Reward---−0.32 ***---
Response efficacy----0.34 ***--
Self-efficacy-----0.47 ***-
Response cost------−0.21 **
Control variablesGender0.35 **0.31 **0.32 **0.30 **0.33 **0.34 **0.31 **
Age0.010.040.040.020.080.080.00
Marital status−0.09−0.03−0.15−0.06−0.15−0.12−0.08
Education−0.01−0.05−0.100.03−0.010.030.06
Work experience−0.09−0.12−0.16−0.08−0.17−0.17−0.10
Work nature0.210.25 *0.190.180.160.160.26 *
Enterprise type0.01−0.01−0.06−0.04−0.05−0.060.01
R20.060.160.190.220.200.280.11
ΔR20.030.130.160.190.170.250.07
F-value 1.905.21 ***6.34 ***7.63 ***6.70 ***10.33 ***3.19 **
Note: * is p < 0.05, ** is p < 0.01, *** is p < 0.001.
Table 6. Analysis of necessary conditions.
Table 6. Analysis of necessary conditions.
Antecedent VariablesIB~IB
ConsistencyCoverageConsistencyCoverage
PS0.7432810.7333360.5544260.415710
~PS0.4077870.5463320.6443510.656058
PV0.7324380.7513280.5455760.425315
~PV0.4397650.5601300.6810120.659204
R0.4563660.5250430.7687040.672105
~R0.7149960.8026690.4567790.389704
RE0.7296570.7339760.5520380.422016
~RE0.4254180.5554810.6520120.647002
SE0.7448050.7774540.5057110.401172
~SE0.4263210.5315960.7194610.681786
RC0.5310480.6041910.6788820.586991
~RC0.6369920.7230080.5422270.467721
Note: The “~” denotes the logical relationship “not”.
Table 7. Configuration results of employees’ intention to comply with the information security system.
Table 7. Configuration results of employees’ intention to comply with the information security system.
Conditional
Configuration
The Compliance Intention of Employees to Information Security System
1a1b2a2b345
PS
PV
R
RE
SE
RC
Consistency0.8986460.8743940.8926130.9073200.9001020.8885710.878373
Raw coverage0.4689060.4648050.2270750.3827460.4123670.4026170.201320
Unique coverage0.0184800.0153920.0128770.0408090.0130350.0111650.009821
Consistency between solutions0.855480
Coverage between solutions0.630714
Note: “ ” signifies that the condition exists, and “ ” signifies that the condition does not exist. A larger circle represents the condition as a core condition, while a smaller circle represents the condition as a secondary condition. Blanks show that the presence or absence of the condition did not affect the results.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Li, W.; Liu, R.; Sun, L.; Guo, Z.; Gao, J. An Investigation of Employees’ Intention to Comply with Information Security System—A Mixed Approach Based on Regression Analysis and fsQCA. Int. J. Environ. Res. Public Health 2022, 19, 16038. https://doi.org/10.3390/ijerph192316038

AMA Style

Li W, Liu R, Sun L, Guo Z, Gao J. An Investigation of Employees’ Intention to Comply with Information Security System—A Mixed Approach Based on Regression Analysis and fsQCA. International Journal of Environmental Research and Public Health. 2022; 19(23):16038. https://doi.org/10.3390/ijerph192316038

Chicago/Turabian Style

Li, Wenqin, Rongmin Liu, Linhui Sun, Zigu Guo, and Jie Gao. 2022. "An Investigation of Employees’ Intention to Comply with Information Security System—A Mixed Approach Based on Regression Analysis and fsQCA" International Journal of Environmental Research and Public Health 19, no. 23: 16038. https://doi.org/10.3390/ijerph192316038

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop