The security of information systems is one of the most important challenges for today's organizations. Although most organizations use security technologies, they concluded that technology is not enough by itself and the key threat to the organization security comes from employees who do not agree with the organization security policies. Therefore, the field of end users security behaviors in the organization has received serious attention. In accordance with recent studies, end users have different security perspectives which have weakened the monitoring of user's security behaviors. Using Q methodology, this research attempted to identify employees’ mental patterns regarding information security policies to lead employees with the securit...
The development of Information and Communication Technologies has opened up a large pool of possibil...
Information Technology transformed the way people executed their tasks at work. With the information...
This paper analyzed factors for employees to violate information security policy in financial compan...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
Information Security has become a significant concern for today\u27s organizations. The internal sec...
Ph.D. University of Hawaii at Manoa 2013.Includes bibliographical references.Information and informa...
The key threat to information security comes from employees who do not comply with information secur...
Many companies struggle to gain a proper information security level, since employees lack such trai...
Information security embodies the complex interaction between security policies, user perceptions of...
Large-scale data losses experienced across both public and private sector organisations have led to ...
Aspects of information security is not sufficient to ensure a high level of information security pol...
Organisations increasingly perceive their employees as a great asset that needs to be cared for; how...
Recent studies raise the concern that the regular communication of security guidelines and policies ...
Information Security Behavior among employees has dramatically changed the organizational security t...
Information Security has become a significant concern for today’s organizations. The internal securi...
The development of Information and Communication Technologies has opened up a large pool of possibil...
Information Technology transformed the way people executed their tasks at work. With the information...
This paper analyzed factors for employees to violate information security policy in financial compan...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
Information Security has become a significant concern for today\u27s organizations. The internal sec...
Ph.D. University of Hawaii at Manoa 2013.Includes bibliographical references.Information and informa...
The key threat to information security comes from employees who do not comply with information secur...
Many companies struggle to gain a proper information security level, since employees lack such trai...
Information security embodies the complex interaction between security policies, user perceptions of...
Large-scale data losses experienced across both public and private sector organisations have led to ...
Aspects of information security is not sufficient to ensure a high level of information security pol...
Organisations increasingly perceive their employees as a great asset that needs to be cared for; how...
Recent studies raise the concern that the regular communication of security guidelines and policies ...
Information Security Behavior among employees has dramatically changed the organizational security t...
Information Security has become a significant concern for today’s organizations. The internal securi...
The development of Information and Communication Technologies has opened up a large pool of possibil...
Information Technology transformed the way people executed their tasks at work. With the information...
This paper analyzed factors for employees to violate information security policy in financial compan...