Purpose – This paper aims to provide an overview of theories used in the field of employees’ information systems (IS) security behavior over the past decade. Research gaps and implications for future research are worked out by analyzing and synthesizing existing literature. Design/methodology/approach – This paper presents the results of a literature review comprising 113 publications. The literature review was designed to identify applied theories and to understand the cognitive determinants in the research field. A meta-model that explains employees’ IS security behavior is introduced by assembling the core constructs of the used theories. Findings – The paper identified 54 used theories, but four behavioral theories were primarily used: ...
The paper aims to identify behavioural theories that influence information security policies complia...
It is widely agreed that a key threat to information security is caused by careless employees who do...
The authors argue that information security management (ISM) would benefit from studies that examine...
In today’s digital age, it is crucial for all organizations to manage their information systems secu...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
This study presents an extensive literature review on information security behavior in the context o...
Individuals’ information security awareness (ISA) plays a critical role in determining their securit...
The education sector is at high risk for information security (InfoSec) breaches and in need of impr...
Over the last twenty years, technical controls for information security have advanced and matured co...
Living in a digital age, where all kinds of information are accessible electronically at all times, ...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
In recent years, with the continuous integration of information technology into daily life, users ar...
Information security education, training, and awareness (SETA) are approaches to changing end-users’...
Information systems (IS) security breaches cause significant losses to organizations worldwide. Many...
The research aims to develop a structural model of user knowing –doing gap and examine the informati...
The paper aims to identify behavioural theories that influence information security policies complia...
It is widely agreed that a key threat to information security is caused by careless employees who do...
The authors argue that information security management (ISM) would benefit from studies that examine...
In today’s digital age, it is crucial for all organizations to manage their information systems secu...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
This study presents an extensive literature review on information security behavior in the context o...
Individuals’ information security awareness (ISA) plays a critical role in determining their securit...
The education sector is at high risk for information security (InfoSec) breaches and in need of impr...
Over the last twenty years, technical controls for information security have advanced and matured co...
Living in a digital age, where all kinds of information are accessible electronically at all times, ...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
In recent years, with the continuous integration of information technology into daily life, users ar...
Information security education, training, and awareness (SETA) are approaches to changing end-users’...
Information systems (IS) security breaches cause significant losses to organizations worldwide. Many...
The research aims to develop a structural model of user knowing –doing gap and examine the informati...
The paper aims to identify behavioural theories that influence information security policies complia...
It is widely agreed that a key threat to information security is caused by careless employees who do...
The authors argue that information security management (ISM) would benefit from studies that examine...