Author ORCID Identifier
Nawaf Aljohani: https://orcid.org/0009-0008-6207-2081
Merrill Warkentin: https://orcid.org/0000-0001-7435-7676
Brad S. Trinkle: https://orcid.org/0000-0003-3014-3267
Moneer Alshaikh: https://orcid.org/0000-0002-2895-3482
Abstract
Organizations invest substantial resources to safeguarding information assets, yet the efficacy of security policies remains dependent on employee compliance. Although theoretical models of compliance are well-established in Western contexts, their cross-cultural generalizability requires vigorous validation. This paper replicates and extends the framework proposed by Willison et al. (2018) by examining its applicability among 401 Saudi employees. Adopting the methodological replication process outlined by Dennis and Valacich (2014), we test the integrated effects of Organizational Justice Theory, Deterrence Theory, and Techniques of Neutralization. Our results demonstrate significant variations in how these theoretical mechanisms are perceived and enacted within the Saudi workforce, suggesting that cultural and policy-driven contexts serve as critical boundary conditions for security behavior. This research enriches the behavioral security literature by illustrating the cultural nuances influence the predictive power of established models, thereby offering practitioners more localized strategies for fostering policy compliance.
Recommended Citation
Aljohani, N., Warkentin, M., Trinkle, B. S., & Alshaikh, M. (In press). Examining Employee Computer Abuse Intentions: A Saudi Replication Study. Communications of the Association for Information Systems, 58, pp-pp. Retrieved from https://aisel.aisnet.org/cais/vol58/iss1/98
When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.