J. L. Spears and H. Barki, User participation in information systems security risk management, MIS Quarterly, vol.34, issue.3, pp.503-522, 2010.

C. Posey, R. Bennett, and T. L. Roberts, Understanding the mindset of the abusive insider: An examination of insiders??? causal reasoning following internal security changes, Computers & Security, vol.30, issue.6-7, pp.6-7, 2011.
DOI : 10.1016/j.cose.2011.05.002

D. 'arcy, J. Hovav, A. Galletta, and D. , User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach, Information Systems Research, vol.20, issue.1, pp.1-20, 2009.

S. M. Lee, S. G. Lee, and S. Yoo, An integrative model of computer abuse based on social control and general deterrence theories, Information & Management, vol.41, issue.6, pp.41-707, 2004.
DOI : 10.1016/j.im.2003.08.008

Q. Hu, T. Dinev, P. Hart, and D. Cooke, Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*, Decision Sciences, vol.26, issue.6, pp.615-660, 2012.
DOI : 10.1111/j.1540-5915.2012.00361.x

Q. Hu, Z. Xu, T. Dinev, and H. Ling, Does deterrence work in reducing information security policy abuse by employees?, Communications of the ACM, vol.54, issue.6, pp.54-60, 2011.
DOI : 10.1145/1953122.1953142

P. Ifinedo, Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory, Computers & Security, vol.31, issue.1, pp.83-95, 2012.
DOI : 10.1016/j.cose.2011.10.007

D. 'arcy, J. Herath, and T. , A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings, European Journal of Information Systems, vol.22, issue.1, pp.643-658, 2011.
DOI : 10.4018/irmj.2009010102

J. Son, Out of fear or desire? Toward a better understanding of employees??? motivation to follow IS security policies, Information & Management, vol.48, issue.7, pp.296-302, 2011.
DOI : 10.1016/j.im.2011.07.002

P. A. Pavlou and L. Chai, What drives electronic commerce across cultures? A crosscultural empirical investigation of the theory of planned behavior, Journal of Electronic Commerce Research, vol.3, issue.4, pp.240-253, 2002.

T. Dinev, J. Goo, Q. Hu, and K. Nam, User behaviour towards protective information technologies: the role of national cultural differences, Information Systems Journal, vol.9, issue.4, pp.391-412, 2009.
DOI : 10.1111/j.1365-2575.2007.00289.x

G. Hofstede, Culture's Consequences: International Differences in Work-related Values, 1980.

M. Ali and L. Brooks, Culture and IS: National Cultural Dimensions within IS Discipline, Proceedings of the 13th Annual Conference of the UK Academy for Information Systems, pp.1-14, 2009.

A. L. Kroeber and C. Kluckhohn, Culture: A critical review of concepts and definitions. Peabody Museum, 1952.

E. L. Baker, Managing organizational culture, Management Review, vol.69, pp.8-13, 1980.

D. W. Delong and L. Fahey, Diagnosing cultural barriers to knowledge management, Academy of Management Executive, vol.14, issue.4, pp.113-127, 2000.

M. Mead, National character, Anthropology Today, pp.396-421, 1962.

H. C. Triandis, The Analysis of Subjective Culture, 1972.

R. H. Kilmann, Managing your organization's culture, The Nonprofit World Report, vol.3, issue.2, pp.12-15, 1985.

M. E. Phillips, Industry Mindsets: Exploring the Cultures of Two Macro-Organizational Settings, Organization Science, vol.5, issue.3, pp.363-383, 1994.
DOI : 10.1287/orsc.5.3.384

G. Hofstede, Culture's Consequences. Comparing Values, Behaviors, Institutions, and Organizations Across Nations, 2001.

W. R. Flores, E. Antonsen, and M. Edstedt, Information security knowledge sharing in??organizations: Investigating the effect of??behavioral information security governance and??national culture, Computers & Security, vol.43, pp.90-110, 2014.
DOI : 10.1016/j.cose.2014.03.004

D. Zhang, P. B. Lowry, L. Zhou, and X. Fu, The Impact of Individualism???Collectivism, Social Presence, and Group Diversity on Group Decision Making Under Majority Influence, Journal of Management Information Systems, vol.23, issue.4, pp.53-80, 2007.
DOI : 10.2753/MIS0742-1222230404

H. Mintzberg, Structure in fives: Designing effective organizations, 1983.

D. Besnard and B. Arief, Computer security impaired by legitimate users, Computers & Security, vol.23, issue.3, pp.253-264, 2004.
DOI : 10.1016/j.cose.2003.09.002

URL : https://hal.archives-ouvertes.fr/hal-00691818

C. Beccaria, On Crimes and Punishments, 1963.
DOI : 10.1017/CBO9780511802485.006

T. Herath and H. Rao, Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness, Decision Support Systems, vol.47, issue.2, pp.154-165, 2009.
DOI : 10.1016/j.dss.2009.02.005

M. Siponen and A. Vance, Neutralization: new insights into the problems of employee information systems security policy violations, MIS Quarterly, vol.46, issue.5, pp.487-502, 2010.

R. Matavire and I. Brown, Profiling grounded theory approaches in information systems research, European Journal of Information Systems, vol.20, issue.3, pp.119-129, 2013.
DOI : 10.1111/j.1365-2575.2009.00328.x

P. Maykut and R. Morehouse, Beginning Qualitative Research: A Philosophic and Practical Guide, 1994.

Y. Lincoln and E. Guba, Naturalistic inquiry, International Journal of Intercultural Relations, vol.9, issue.4, 1985.
DOI : 10.1016/0147-1767(85)90062-8

E. J. Wallach, Individuals and organizations: The cultural match, Training and Development Journal, vol.37, issue.2, pp.28-36, 1983.

D. E. Leidner and T. Kayworth, Review: A review of culture in information systems research: Toward a theory of information technology culture conflict, MIS Quarterly, vol.30, pp.357-399, 2006.

R. Goffee and G. Jones, What holds the modern company together?, Harvard Business Review, vol.74, issue.6, pp.133-148, 1996.

D. R. Denison and A. K. Mishra, Toward a Theory of Organizational Culture and Effectiveness, Organization Science, vol.6, issue.2, pp.204-223, 1995.
DOI : 10.1287/orsc.6.2.204

W. Ouchi, Theory Z: How American business can meet the Japanese challenge, Business Horizons, vol.24, issue.6, 1981.
DOI : 10.1016/0007-6813(81)90031-8

H. R. Shrednick, R. J. Stutt, and M. Weiss, Empowerment: Key to IS World-Class Quality, MIS Quarterly, vol.16, issue.4, pp.491-505, 1992.
DOI : 10.2307/249733

URL : http://elibrary.aisnet.org/Default.aspx?url=http://aisel.aisnet.org/cgi/viewcontent.cgi?article=2196&context=misq