This paper proposes a research method that investigates the risk perceptions of computer end-users relating to organisational Information Security (InfoSec) and the situational factors that influence these perceptions. This method uses the repertory grid technique (RGT) within recorded semi-structured interviews to elicit computer end-user perceptions, thoughts, beliefs and views pertaining to information security risks and threats. The suitability and appropriateness of using the RGT for this task is also discussed.M. R. Pattinson and C. Jerramhttp://www.saismc.org
The protection of proprietary information that users print from their information systems is a signi...
The objective of this research is to investigate the types of problems and their associated perceive...
A quantitative empirical online study examined a set of 16 security hazards on the Internet and two ...
The increasing dependence on information systems (ISs) together with the emergence of new technologi...
This paper reports on a study that examined the perceptions of computer users in regard to the risks...
This paper reports on a study that examined the perceptions of computer users in regard to the risks...
This paper reports on a mixed-method research project that examined the attitudes of computer users ...
The research presented in this paper views the process of implementing information systems as an imp...
Ubiquitous networking challenges organizational security by enabling employees to work from virtuall...
The information security (IS) risk assessment process is an essential part to organisation's their p...
This paper presents a case study showing how Repertory Grid Analysis (RGA) can be used to construct ...
Part 1: Cross-Domain Conference and Workshop on Multidisciplinary Research and Practice for Informat...
A critical overreliance on the technical dimension of information security has recently shifted towa...
Interest in the repertory grid technique has been growing in the IS field. This article seeks to inf...
This paper presents a case study showing how Repertory Grid Analysis (RGA) can be used to construct ...
The protection of proprietary information that users print from their information systems is a signi...
The objective of this research is to investigate the types of problems and their associated perceive...
A quantitative empirical online study examined a set of 16 security hazards on the Internet and two ...
The increasing dependence on information systems (ISs) together with the emergence of new technologi...
This paper reports on a study that examined the perceptions of computer users in regard to the risks...
This paper reports on a study that examined the perceptions of computer users in regard to the risks...
This paper reports on a mixed-method research project that examined the attitudes of computer users ...
The research presented in this paper views the process of implementing information systems as an imp...
Ubiquitous networking challenges organizational security by enabling employees to work from virtuall...
The information security (IS) risk assessment process is an essential part to organisation's their p...
This paper presents a case study showing how Repertory Grid Analysis (RGA) can be used to construct ...
Part 1: Cross-Domain Conference and Workshop on Multidisciplinary Research and Practice for Informat...
A critical overreliance on the technical dimension of information security has recently shifted towa...
Interest in the repertory grid technique has been growing in the IS field. This article seeks to inf...
This paper presents a case study showing how Repertory Grid Analysis (RGA) can be used to construct ...
The protection of proprietary information that users print from their information systems is a signi...
The objective of this research is to investigate the types of problems and their associated perceive...
A quantitative empirical online study examined a set of 16 security hazards on the Internet and two ...