A growing body of research evidence has been focused on exploring aspects of individual differences in the context of human factors and adherence to organisational information security. The present study aimed to extend this research by exploring three individual variables related directly to the individual’s perceived control within the workplace, their commitment to current work identity, and the extent to which they are reconsidering commitment to work. A total 1003 participants aged between 18-65 (Mean = 40.29; SD = 12.28), who were in full or part-time employment took part in the study. The results demonstrated that work locus of control acted as a significant predictor for total scores on a measure of information security awareness. T...
As technology such as the Internet, computers and mobile devices become ubiquitous throughout societ...
Given the significant role individuals play on the welfare of organizations’ security, end users are...
Given the significant role individuals play on the welfare of organizations’ security, end users are...
A growing body of research evidence has been focused on exploring aspects of individual differences ...
This item is only available electronically.The past decade of literature has seen a developing body ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Research identifies employees as the weakest link in data security. Determining what characteristics...
The body of research that focuses on employees’ information Security Policy compliance is problemati...
Living in a digital age, where all kinds of information are accessible electronically at all times, ...
Purpose: The authors seek to understand the formation of control- and security-related identities am...
Large-scale data losses experienced across both public and private sector organisations have led to ...
Employees’ information security awareness (ISA) is a key antecedent of information security behavior...
Work systems are comprised of the technical and social systems that should harmoniously work togethe...
The growing number of information security breaches in organisations presents a serious risk to the ...
As security breaches in organisations are on the rise, developing an understanding of factors enabli...
As technology such as the Internet, computers and mobile devices become ubiquitous throughout societ...
Given the significant role individuals play on the welfare of organizations’ security, end users are...
Given the significant role individuals play on the welfare of organizations’ security, end users are...
A growing body of research evidence has been focused on exploring aspects of individual differences ...
This item is only available electronically.The past decade of literature has seen a developing body ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Research identifies employees as the weakest link in data security. Determining what characteristics...
The body of research that focuses on employees’ information Security Policy compliance is problemati...
Living in a digital age, where all kinds of information are accessible electronically at all times, ...
Purpose: The authors seek to understand the formation of control- and security-related identities am...
Large-scale data losses experienced across both public and private sector organisations have led to ...
Employees’ information security awareness (ISA) is a key antecedent of information security behavior...
Work systems are comprised of the technical and social systems that should harmoniously work togethe...
The growing number of information security breaches in organisations presents a serious risk to the ...
As security breaches in organisations are on the rise, developing an understanding of factors enabli...
As technology such as the Internet, computers and mobile devices become ubiquitous throughout societ...
Given the significant role individuals play on the welfare of organizations’ security, end users are...
Given the significant role individuals play on the welfare of organizations’ security, end users are...