In the modern networked world, replete with massive amounts of data, one of the greatest threats facing organisations is information loss inflicted by actors within or trusted by the organisation. This research is thus aimed at: Understanding the cognitive elements influencing an insider’s decision to intentionally violate information security policies. The use of the word ‘intentionally’ in this context is important because it excludes any exploration of accidental or unintentional abuse. There have been disparate findings in many prior studies, which have tended to concentrate on Deterrence Theory and consequently the current work adopts Rational Choice Theory as a lens to study behaviours that can have both positive and negative implic...
Abstract Every big online security breach seems to end in a big lecture. Thus, although a predominan...
Insider threats has been a major challenge for organizations. Leaking sensitive information by insid...
Security breaches of digital information represent a significant threat to the wellbeing of individu...
In the modern networked world, replete with massive amounts of data, one of the greatest threats fac...
Extant work has examined users’ security behavior in both individual and organizational contexts by ...
Computer offences and crimes against corporate computer systems have increasingly become a major cha...
A deficiency exists in the Information Systems Security literature because of the paucity of researc...
Computer offences and crimes against corporate computer systems have increasingly become a major cha...
Abstract Purpose This paper aims to investigate the influence of moral disengagement, perceived pe...
A deficiency exists in the Information Systems Security literature because of the paucity of researc...
Recent academic investigations of computer security policy violations have largely focused on non-ma...
Recent academic investigations of computer security policy violations have largely focused on non-ma...
Information security is a growing concern among the general population. For instance, it has been es...
Previous studies show that information security breaches and privacy violations are important issues...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Abstract Every big online security breach seems to end in a big lecture. Thus, although a predominan...
Insider threats has been a major challenge for organizations. Leaking sensitive information by insid...
Security breaches of digital information represent a significant threat to the wellbeing of individu...
In the modern networked world, replete with massive amounts of data, one of the greatest threats fac...
Extant work has examined users’ security behavior in both individual and organizational contexts by ...
Computer offences and crimes against corporate computer systems have increasingly become a major cha...
A deficiency exists in the Information Systems Security literature because of the paucity of researc...
Computer offences and crimes against corporate computer systems have increasingly become a major cha...
Abstract Purpose This paper aims to investigate the influence of moral disengagement, perceived pe...
A deficiency exists in the Information Systems Security literature because of the paucity of researc...
Recent academic investigations of computer security policy violations have largely focused on non-ma...
Recent academic investigations of computer security policy violations have largely focused on non-ma...
Information security is a growing concern among the general population. For instance, it has been es...
Previous studies show that information security breaches and privacy violations are important issues...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Abstract Every big online security breach seems to end in a big lecture. Thus, although a predominan...
Insider threats has been a major challenge for organizations. Leaking sensitive information by insid...
Security breaches of digital information represent a significant threat to the wellbeing of individu...