T. Niebel, ICT and economic growth -Comparing developing, emerging and developed countries, World Development, vol.104, pp.197-211, 2018.

G. G. Haftu, Information communications technology and economic growth in Sub-Saharan Africa: A panel data approach, Telecommunications Policy, 2018.

P. Ifinedo, Roles of organizational climate, social bonds, and perceptions of security threats on IS security policy compliance intentions, Information Resources Management Journal, vol.31, issue.1, pp.53-82, 2018.

Q. Hu, Z. Xu, T. Dinev, and H. Ling, Does deterrence work in reducing information security policy abuse by employees?, Communications of the ACM, vol.54, issue.6, pp.54-60, 2011.

J. P. D'arcy and S. Devaraj, Employee misuse of information technology resources: testing a contemporary deterrence model, Decision Sciences, vol.43, issue.6, pp.1091-1124, 2012.

K. H. Guo, Y. Yufei, N. P. Archer, and C. E. Connelly, Understanding nonmalicious security violations in the workplace: a composite behavior model, Journal of Management Information Systems, vol.28, issue.2, pp.203-236, 2011.

P. Ifinedo, Information systems security policy compliance: an empirical study of the effects of socialisation, influence, and cognition, Information & Management, vol.51, issue.1, pp.69-79, 2014.

B. Bulgurcu, H. Cavusoglu, and I. Benbasat, Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness, MIS Quarterly, vol.34, issue.3, pp.523-548, 2010.

J. Aldorisio, What is Cyber Hygiene? A Definition of Cyber Hygiene, Benefits, Best Practices, and More, 2018.

, Clearswift Insider Threat Index (CITI), 2017.

K. Njenga and I. Brown, Conceptualising improvisation in information systems security, European Journal of Information Systems, vol.21, issue.6, pp.592-607, 2012.

P. Ifinedo, O. B. Longe, A. , and I. , Top exemplars of non-malicious, counterproductive computer security behaviours (CCSB) engagements among employees in Nigeria: recommendations for management, the 8 th iSTEAMS, pp.5-12, 2017.

O. Longe, O. Ngwa, F. Wada, V. Mbarika, and K. L. , Criminal uses of information & communication technologies in sub-Saharan Africa: Trends, concerns and perspectives, Journal of Information Technology Impact, vol.9, issue.3, pp.155-172, 2009.

, Nigeria adopts framework for national security policy, Technology Times, 2018.

G. B. Magklaras and S. M. Furnell, Insider threat prediction tool: evaluating the probability of IT misuse, Computers & Security, vol.21, issue.1, pp.62-73, 2002.

K. D. Loch, H. H. Carr, and M. E. Warkentin, Threats to information systems: today's reality, yesterday's understanding, MIS Quarterly, vol.16, issue.2, pp.173-186, 1992.

J. M. Stanton, K. R. Stam, P. Mastrangelo, and J. Jolton, Analysis of end user security behaviors, Computers & Security, vol.24, issue.2, pp.124-133, 2005.

P. Ifinedo and J. Cashin, Using social cognitive theory to understand employees' counterproductive computer security behaviors (CCSB): A pilot study, The 27 th International Business Research Conference (IBRC), 2014.

T. Sommestad, J. Hallberg, K. Lundholm, and J. Bengtsson, Variables influencing information security policy compliance: a systematic review of quantitative studies, Information Management and Computer Security, vol.22, issue.1, pp.42-75, 2014.

I. Ajzen, The theory of planned behavior, Organizational behavior and human decision processes, vol.50, issue.2, pp.179-211, 1991.

K. M. Eisenhardt, Control: Organizational and economic approaches, Management science, vol.31, issue.2, pp.134-149, 1985.

A. Bandura, Social foundations of thought and action: A social cognitive theory, 1986.

A. Yazdanmehr and J. Wang, Employees' information security policy compliance: a norm activation perspective, Decision Support Systems, vol.92, pp.36-46, 2016.

P. M. Podsakoff, S. B. Mackenzie, J. Y. Lee, and N. P. Podsakoff, Common method biases in behavioral research: a critical review of the literature and recommended remedies, Journal of Applied Psychology, vol.88, issue.5, pp.879-903, 2003.

P. A. Pavlou, H. Liang, and Y. Xue, Understanding and mitigating uncertainty in online exchange relationships: a principal-agent perspective, MIS Quarterly, vol.31, issue.1, pp.105-136, 2007.

J. F. Hair, G. Tomas, M. Hult, C. M. Ringle, and M. Sarstedt, Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), 2014.

N. Kock, WarpPLS 5.0 User Manual, 2017.

S. Petter, D. Straub, and A. Rai, Specifying formative constructs in information systems research, MIS Quarterly, vol.31, issue.4, pp.623-656, 2007.

M. Tenenhaus, V. E. Vinzi, Y. Chatelin, and C. Lauro, PLS path modeling. Computational Statistics and Data Analysis, vol.48, pp.159-205, 2005.
URL : https://hal.archives-ouvertes.fr/hal-00869374

M. Wetzels, G. Odekerken-schröder, and C. Van-oppen, Using PLS path modeling for assessing hierarchical construct models: Guidelines and empirical illustration, MIS Quarterly, vol.33, issue.1, pp.177-195, 2009.

M. Siponen, A. Vance, and A. , Neutralization: New insights into the problem of employee information systems security policy violations, MIS Quarterly, vol.34, issue.3, pp.487-502, 2010.