Showing 1 - 10 of 25
Organizational insiders have considerable influence on the effectiveness of information security efforts. However, most research conducted in this area fails to examine what these individuals believe about organizational security efforts. To help bridge this gap, this study assesses the mindset...
Persistent link: https://www.econbiz.de/10014147045
Research shows that organisational efforts to protect their information assets from employee security threats do not always reach their full potential and may actually encourage the behaviours they attempt to thwart, such as reactive computer abuse (CA). To better understand this dilemma, we use...
Persistent link: https://www.econbiz.de/10014139311
Practitioners and researchers alike recognize the positive influence insiders' behavior can have on information systems (IS) security. This awareness has resulted in a research stream focused on the performance of protective behaviors. We contribute to this research stream by extending an...
Persistent link: https://www.econbiz.de/10012967404
Persistent link: https://www.econbiz.de/10003912142
We present a model of employee compliance with information security policy (ISP) that (1) explicates stable, cognitive beliefs regarding the consequences of compliance and non-compliance as well as state-based affective constructs – namely, positive and negative mood states and episodic,...
Persistent link: https://www.econbiz.de/10014118798
In this essay, we outline some important concerns in the hope of improving the effectiveness of security and privacy research. We discuss the need to re-examine our understanding of information technology (IT) and information system (IS) artefacts and to expand the range of the latter to include...
Persistent link: https://www.econbiz.de/10014119141
The advent of Internet of Things (IoT) technology exponentially increases the collection of new information types in consumers’ lives from various sensors. However, many consumers do not fully recognize the potential privacy and security risks (PSR) associated with IoT. Those who are aware...
Persistent link: https://www.econbiz.de/10013219919
Most of the information security management research involving fear appeals is guided by either protection motivation theory or the extended parallel processing model. Over time, extant research has extended these theories, as well as their derivative theories, in a variety of ways, leading to...
Persistent link: https://www.econbiz.de/10014360878
Persistent link: https://www.econbiz.de/10009764526
Persistent link: https://www.econbiz.de/10010225521