The objective of this study is to test the impact of social bond to the organization and employees motivation on
compliance to the organization s information security policy. The research model is developed based on Social
Bond Theory (SBT) and General Deterrence Theory (GDT), which have been previously separately applied to
information security compliance by Safa et al, (2016) and Son et al, (2011) respectively. You can find more in
the attached files


Write an introduction based on the introductions of the following articles (2 pages)
Cheng, L, Li, W, Zhai, Q, & Smyth, R 2014, ‘Understanding personal use of the Internet at work: An integrated model of neutralization techniques and general deterrence theory’, Computers In Human Behavior, 38, pp. 220-228, ScienceDirect, EBSCOhost, viewed 7 October 2016.
Cheng, L, Li, Y, Li, W, Holm, E, & Zhai, Q n.d., ‘Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory’, Computers & Security, 39, pp. 447-459, Science Citation Index, EBSCOhost, viewed 7 October 2016.
Safa, N.S., Von Solms, R. and Furnell, S., 2016. Information security policy compliance model in organizations. Computers & Security, 56, pp.70-82.
Son, J.Y., 2011. Out of fear or desire Toward a better understanding of employees motivation to follow IS security policies. Information & Management, 48(7), pp.296-302.
Lee, C., Lee, C.C. and Kim, S., 2016. Understanding information security stress: Focusing on the type of information security compliance activity. Computers & Security, 59, pp.60-70.
Vance, A., Siponen, M. and Pahnila, S., 2012. Motivating IS security compliance: insights from habit and protection motivation theory. Information & Management, 49(3), pp.190-198.
Ifinedo, P., 2012. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), pp.83-95.
Ifinedo, P., 2014. Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information & Management, 51(1), pp.69-79.
Safa, N.S., Von Solms, R. and Futcher, L., 2016. Human aspects of information security in organizations. Computer Fraud & Security, 2016(2), pp.15-18.
Siponen, M., Mahmood, M.A. and Pahnila, S., 2014. Employees adherence to information security policies: An exploratory field study. Information & management, 51(2), pp.217-224.

Literature Review
Summarize the models , the findings , and the hypotheses of the studies above. The topic is about factors that impact adherence to information security policy. Look for other references as well (15 pages)

Literature review on the social bond theory and the general deterrence theory (3pages)
Some references (you can find references from Son, J.Y., 2011 and Siponen, M., Mahmood, M.A. and Pahnila, S., 2014)

Hirschi, T, & Stark, R 1969, ‘Hellfire and Delinquency’, Social Problems, 2, p. 202, JSTOR Journals, EBSCOhost, viewed 7 October 2016.

Cassino, P, & Rogers, W 2016, ‘Hirschi’s Social Bonding Theory Nearly 45 Years Later: A comparison of a traditional, contemporary and hybrid model’, Theory In Action, 9, 2, pp. 21-44, Humanities International Complete, EBSCOhost, viewed 7 October 2016.