Security information sharing (SIS) is an activity whereby individuals exchange information that is relevant to analyze or prevent cybersecurity incidents. However, despite technological advances and increased regulatory pressure, individuals still seem reluctant to share security information. Few contributions have addressed this conundrum to date. Adopting an interdisciplinary approach, our study proposes a behavioral framework that theorizes how and why human behav- ior and SIS may be associated. We use psychometric methods to test these associations, analyzing a unique sample of human Information Sharing and Analysis Center members who share real se- curity information. We also provide a dual empirical operationalization of SIS by introd...
Knowledge sharing is an important component of knowledge management systems. Security knowledge shar...
Employees continue to be the weak link in organizational security management and efforts to improve ...
In a networked global economy, cyber security threats have accelerated at an enormous rate. The secu...
Security information sharing (SIS) is an activity whereby individuals exchange information that is r...
In this paper, we investigate the role of incentives for Security Information Sharing (SIS) between ...
Due to a massive rise in data breaches caused by negligent information systems users, organizations ...
IT users often make information security-related decisions in complex and multidimensional environme...
In this opinion paper, we first review the evolution of information security research, and summarize...
The aim of the present study was twofold. First it aimed to elicit Information Security (InfoSec) ex...
As modern organizations rely more on their information systems, mitigating information security risk...
n spite of the number of public advice campaigns, researchers have found that individuals still enga...
This research explores factors that impact people’s trust and subsequently their willingness to part...
In spite of the number of public advice campaigns, researchers have found that individuals still eng...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...
Information security embodies the complex interaction between security policies, user perceptions of...
Knowledge sharing is an important component of knowledge management systems. Security knowledge shar...
Employees continue to be the weak link in organizational security management and efforts to improve ...
In a networked global economy, cyber security threats have accelerated at an enormous rate. The secu...
Security information sharing (SIS) is an activity whereby individuals exchange information that is r...
In this paper, we investigate the role of incentives for Security Information Sharing (SIS) between ...
Due to a massive rise in data breaches caused by negligent information systems users, organizations ...
IT users often make information security-related decisions in complex and multidimensional environme...
In this opinion paper, we first review the evolution of information security research, and summarize...
The aim of the present study was twofold. First it aimed to elicit Information Security (InfoSec) ex...
As modern organizations rely more on their information systems, mitigating information security risk...
n spite of the number of public advice campaigns, researchers have found that individuals still enga...
This research explores factors that impact people’s trust and subsequently their willingness to part...
In spite of the number of public advice campaigns, researchers have found that individuals still eng...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...
Information security embodies the complex interaction between security policies, user perceptions of...
Knowledge sharing is an important component of knowledge management systems. Security knowledge shar...
Employees continue to be the weak link in organizational security management and efforts to improve ...
In a networked global economy, cyber security threats have accelerated at an enormous rate. The secu...