Target Corporation experienced an information security breach resulting in compromising customers\u27 financial information. Management is responsible for implementing adequate information security policies that protect corporate data and minimize financial losses. The purpose of this experimental study was to examine the effect of a fear appeal communication on an individual\u27s information security policy behavioral intention. The sample population involved information technology professionals randomly selected from the SurveyMonkey audience. A research model, developed using constructs from deterrence theory and protection motivation theory, became the structural model used for partial least squares-structural equation modeling (PLS-SEM...
The frequency, intensity and repercussions of information security breaches in higher education has ...
It is widely agreed that a key threat to information security is caused by careless employees who do...
Employees\u27 noncompliance with information security policy and rules is a serious impediment to th...
The purpose of the present study is to make contributions to the area of behavioral information secu...
The education sector is at high risk for information security (InfoSec) breaches and in need of impr...
The study of employees’ intention to comply with information security policies in higher education i...
This paper conducts a partial replication of (Siponen et al. 2014) which developed a multi-theory ba...
Through persuasive communication, IT executives strive to align the actions of end users with the de...
Computer users’ security compliance behaviors can be better understood by devising an experimental s...
The body of research that focuses on employees’ information Security Policy compliance is problemati...
Ph.D. University of Hawaii at Manoa 2013.Includes bibliographical references.Information and informa...
This paper analyzed factors for employees to violate information security policy in financial compan...
IS users and organizations must take necessary measures to adequately cope with security threats. Co...
Password policy compliance is a vital component of organizational information security. Although man...
Organizations and government leaders are concerned about cyber incidents. For some time, researchers...
The frequency, intensity and repercussions of information security breaches in higher education has ...
It is widely agreed that a key threat to information security is caused by careless employees who do...
Employees\u27 noncompliance with information security policy and rules is a serious impediment to th...
The purpose of the present study is to make contributions to the area of behavioral information secu...
The education sector is at high risk for information security (InfoSec) breaches and in need of impr...
The study of employees’ intention to comply with information security policies in higher education i...
This paper conducts a partial replication of (Siponen et al. 2014) which developed a multi-theory ba...
Through persuasive communication, IT executives strive to align the actions of end users with the de...
Computer users’ security compliance behaviors can be better understood by devising an experimental s...
The body of research that focuses on employees’ information Security Policy compliance is problemati...
Ph.D. University of Hawaii at Manoa 2013.Includes bibliographical references.Information and informa...
This paper analyzed factors for employees to violate information security policy in financial compan...
IS users and organizations must take necessary measures to adequately cope with security threats. Co...
Password policy compliance is a vital component of organizational information security. Although man...
Organizations and government leaders are concerned about cyber incidents. For some time, researchers...
The frequency, intensity and repercussions of information security breaches in higher education has ...
It is widely agreed that a key threat to information security is caused by careless employees who do...
Employees\u27 noncompliance with information security policy and rules is a serious impediment to th...