Organizations have become increasingly concerned with developing and protecting their information security systems. Despite attempts to secure the information infrastructure, employees inside of organizations remain the largest source of threat to information cyber-security. While previous research has focused on behavioral and situational factors that influence cyber-security behaviors, the measurement of cyber behaviors and their relationship to other performance variables is poorly understood. The purpose of the present study is to 1) determine the underlying factor structure of a cyber-security behavior scale, 2) assess if individual personality traits predict four types of cyber-security behaviors: security assurance, security complian...
The ever-increasing number and severity of cybersecurity breaches makes it vital to understand the f...
With computers being a standard part of life now with the evolution of the internet, many aspects of...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Organizations have become increasingly concerned with developing and protecting their information se...
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Intern...
A survey of IT professionals suggested that despite technological advancement and organizational pro...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
Information security has for long time been a field of study in computer science, software engineeri...
Information security has for long time been a field of study in computer science, software engineeri...
An influx of cyber-attacks throughout the past decade has resulted in an increase in demand for cybe...
This paper identifies opportunities for potential theoretical and practical improvements in employee...
Insiders represent a major threat to the security of an organization’s information resources (Warken...
Information security is of vital importance to organizations. Breaches in security very often stem f...
Increasing the number of security breaches caused by humans, scholars are interested in exploring co...
The present study explored the relationship between risky cybersecurity behaviours, attitudes toward...
The ever-increasing number and severity of cybersecurity breaches makes it vital to understand the f...
With computers being a standard part of life now with the evolution of the internet, many aspects of...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Organizations have become increasingly concerned with developing and protecting their information se...
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Intern...
A survey of IT professionals suggested that despite technological advancement and organizational pro...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
Information security has for long time been a field of study in computer science, software engineeri...
Information security has for long time been a field of study in computer science, software engineeri...
An influx of cyber-attacks throughout the past decade has resulted in an increase in demand for cybe...
This paper identifies opportunities for potential theoretical and practical improvements in employee...
Insiders represent a major threat to the security of an organization’s information resources (Warken...
Information security is of vital importance to organizations. Breaches in security very often stem f...
Increasing the number of security breaches caused by humans, scholars are interested in exploring co...
The present study explored the relationship between risky cybersecurity behaviours, attitudes toward...
The ever-increasing number and severity of cybersecurity breaches makes it vital to understand the f...
With computers being a standard part of life now with the evolution of the internet, many aspects of...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...