Research accentuates that end-users‘ noncompliance with information security policy (ISP) is a key concern for government just as it is for the private sector. Although awareness and training programmes are important factors impacting employees‘ intentions to comply with an organisation‘s ISP, it can be argued that there is insufficient empirical evidence to support this assertion. To address this gap, this study seeks to expand research on ISP compliance by focusing on attitudes as targets of change. A research model based on the Theory of Planned Behaviour was proposed to illustrate the influence of ISP awareness training on end-users‘ attitudes towards complying with their organisation‘s ISP. Relevant hypotheses were developed to test t...
Technical aspect of security is inadequate to ensure information security within organization thus r...
Many organizations recognize that their employees, who are often considered the weakest link in info...
The majority of SMEs have adopted the use of information communication and technology (ICT) services...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...
Compliance with information security policies (ISPs) is a key factor in reducing an organization’s i...
Information security policy compliance is one of the key concerns that face organizations today. Alt...
Organisations throughout the world face threats to the security of their information. In most organi...
The Internet and information technology have influenced human life significantly. However, informati...
Information security is one of the major challenges for organizations that critically depend on info...
Humans are the weakest link in any information security (IS) environment. Research has shown that hu...
In this paper we research the following question: What motivational factors relate, in which degree,...
Drawing on the Theory of Planned Behavior (TPB), this research investigates two factors that drive a...
There is worldwide recognition of the problems associated with insider threats, intentional and unin...
Employee noncompliance with information systems security policies is a key concern for organizations...
The majority of SMEs have adopted the use of information communication and technology (ICT) services...
Technical aspect of security is inadequate to ensure information security within organization thus r...
Many organizations recognize that their employees, who are often considered the weakest link in info...
The majority of SMEs have adopted the use of information communication and technology (ICT) services...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...
Compliance with information security policies (ISPs) is a key factor in reducing an organization’s i...
Information security policy compliance is one of the key concerns that face organizations today. Alt...
Organisations throughout the world face threats to the security of their information. In most organi...
The Internet and information technology have influenced human life significantly. However, informati...
Information security is one of the major challenges for organizations that critically depend on info...
Humans are the weakest link in any information security (IS) environment. Research has shown that hu...
In this paper we research the following question: What motivational factors relate, in which degree,...
Drawing on the Theory of Planned Behavior (TPB), this research investigates two factors that drive a...
There is worldwide recognition of the problems associated with insider threats, intentional and unin...
Employee noncompliance with information systems security policies is a key concern for organizations...
The majority of SMEs have adopted the use of information communication and technology (ICT) services...
Technical aspect of security is inadequate to ensure information security within organization thus r...
Many organizations recognize that their employees, who are often considered the weakest link in info...
The majority of SMEs have adopted the use of information communication and technology (ICT) services...