This evaluation of end-users and IT experts/managers’ attitudes towards performing IT security tasks indicates important differences between their perspectives on what is and is not necessary to establish a secure corporate IT environment. Through a series of case studies, this research illustrates that making it easier for end-users to comply does not necessarily equate to enhanced implementation of security measures. End-users want to be autonomous, competent, self-motivated and active participants in the development of secure environments. However, managers and experts want to limit autonomy to ensure that procedures are followed closely, rather than permitting flexibility. This results in the creation of environments that are intrinsica...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...
The growing number of security breaches has become a major concern in organisations. Most often, suc...
Businesses around the world have experienced unprecedented incidents and losses related to informati...
This evaluation of end-users and IT experts/managers’ attitudes towards performing IT security tasks...
This evaluation of end-users and IT experts/managers' attitudes towards performing IT security ...
The focus of information security has traditionally been on technological issues, and organizations ...
The body of research that focuses on employees’ information Security Policy compliance is problemati...
The Internet and information technology have influenced human life significantly. However, informati...
Business information, held within information systems, is critical for most organizations. To protec...
Information security is one of the major challenges for organizations that critically depend on info...
Many organizations recognize that their employees, who are often considered the weakest link in info...
Information security research shows that employees are a source of some of the security incidents in...
While IT security research has explored explanatory models using risk/fear/efficacy drivers, this ef...
It is widely agreed that a key threat to information security is caused by careless employees who do...
Employees’ non-compliance with information systems security policies has been identified as a major ...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...
The growing number of security breaches has become a major concern in organisations. Most often, suc...
Businesses around the world have experienced unprecedented incidents and losses related to informati...
This evaluation of end-users and IT experts/managers’ attitudes towards performing IT security tasks...
This evaluation of end-users and IT experts/managers' attitudes towards performing IT security ...
The focus of information security has traditionally been on technological issues, and organizations ...
The body of research that focuses on employees’ information Security Policy compliance is problemati...
The Internet and information technology have influenced human life significantly. However, informati...
Business information, held within information systems, is critical for most organizations. To protec...
Information security is one of the major challenges for organizations that critically depend on info...
Many organizations recognize that their employees, who are often considered the weakest link in info...
Information security research shows that employees are a source of some of the security incidents in...
While IT security research has explored explanatory models using risk/fear/efficacy drivers, this ef...
It is widely agreed that a key threat to information security is caused by careless employees who do...
Employees’ non-compliance with information systems security policies has been identified as a major ...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...
The growing number of security breaches has become a major concern in organisations. Most often, suc...
Businesses around the world have experienced unprecedented incidents and losses related to informati...