This paper investigated how senior management is motivated to commit to information system (IS) security. Research shows senior management participation is critical to successful IS security, but has not explained how senior managers are motivated to participate in IS security. Information systems research shows pressures external to the organization have greater influence on senior managers than internal pressures. However, research has not fully examined how external pressures motivate senior management participation in IS security. This study addressed that gap by examining how external pressures motivate senior management participation in ISS through the lens of neo-institutional theory. The research design was survey research. Data col...
In spite of the wealth of research in IS security, there is very little understanding of what actual...
Many studies exist on the technical aspects of Information System\u27s security, but organizational ...
Employees’ non-compliance with organizational information security policy (ISP) when using informati...
This dissertation investigated how senior management is motivated to commit to information system se...
Prior information security research establishes the need to investigate the informal factors that in...
This empirical study examined the behavioral influences of leaders on employees’ security compliance...
Recent reports indicate that IS users’ resistance to use information systems security policies is th...
For senior executives, information security is a basic requirement for business success. Yet, despit...
For senior executives, information security is a basic requirement for business success. Yet, despit...
For senior executives, information security is a basic requirement for business success. Yet, despit...
Within organizations, senior executives bear a great responsibility regarding an effective IS securi...
The aim of this research is to investigate information systems security in the context of organizati...
This paper examines user participation in information systems security risk management and its influ...
Abstract: The increasing threat to information security has created institutional pressures on organ...
The increase reliance on information systems has created unprecedented challenges for organizations ...
In spite of the wealth of research in IS security, there is very little understanding of what actual...
Many studies exist on the technical aspects of Information System\u27s security, but organizational ...
Employees’ non-compliance with organizational information security policy (ISP) when using informati...
This dissertation investigated how senior management is motivated to commit to information system se...
Prior information security research establishes the need to investigate the informal factors that in...
This empirical study examined the behavioral influences of leaders on employees’ security compliance...
Recent reports indicate that IS users’ resistance to use information systems security policies is th...
For senior executives, information security is a basic requirement for business success. Yet, despit...
For senior executives, information security is a basic requirement for business success. Yet, despit...
For senior executives, information security is a basic requirement for business success. Yet, despit...
Within organizations, senior executives bear a great responsibility regarding an effective IS securi...
The aim of this research is to investigate information systems security in the context of organizati...
This paper examines user participation in information systems security risk management and its influ...
Abstract: The increasing threat to information security has created institutional pressures on organ...
The increase reliance on information systems has created unprecedented challenges for organizations ...
In spite of the wealth of research in IS security, there is very little understanding of what actual...
Many studies exist on the technical aspects of Information System\u27s security, but organizational ...
Employees’ non-compliance with organizational information security policy (ISP) when using informati...