Showing 1 - 9 of 9
Criminal organizational insider computer abuse (ICA) research has focused on factors that influence either ICA intentions, or actual behavior during the ICA process. However, we argue that this research has not correctly conceptualized the decision-making processes involved in ICA. Thus, our...
Persistent link: https://www.econbiz.de/10014117235
Persistent link: https://www.econbiz.de/10011491439
Persistent link: https://www.econbiz.de/10011399373
Persistent link: https://www.econbiz.de/10012109443
Persistent link: https://www.econbiz.de/10014323530
Employees’ failures to follow information security policy can be costly to organizations, causing organizations to implement security controls to motivate secure behavior. Information security research has explored many control-related motivations (e.g., self-efficacy, response efficacy, and...
Persistent link: https://www.econbiz.de/10014147239
Increased deregulation and globalization have encouraged organizations to expand the cultural diversity of their employees. Integrating each employee into an organization’s culture, including practices regarding the protection of information, is critical. Because active employee participation...
Persistent link: https://www.econbiz.de/10014033876
Lack of compliance with organizational information security policies (ISPOs) is a widespread organizational issue that increasingly bears very large direct and qualitative costs. The purpose of our study was to explain the causes of tensions within organizations to either comply with new ISPOs...
Persistent link: https://www.econbiz.de/10014038742
Insiders may act to sustain and improve organizational information security, yet our knowledge of what motivates them to do so remains limited. For example, most extant research use portions of protection motivation theory (PMT) and have relied on isolated behaviors thus limiting the...
Persistent link: https://www.econbiz.de/10014133955