As the world becomes more interconnected now than decades ago, information security incidents are more prevalent in organizations. The incidents are more likely caused by insiders and they can happen with or without intentions. Although some security studies state that unintentional security incidents could cause more damages to organizational information systems (IS) than intentional security incidents, The research in this area is still limited. This paper focuses on unintentional employees’ behaviors that have impacts on organizational information security, rather than unintentional behaviors in general IT practices. It explores unintentional information security behavior based on the perspective of the Qur’an and Hadith. Moreover, it pr...
Information Security Awareness (ISA) is a considerable break in the wall of information security. Pe...
Digitization has given rise to information system security (ISS) risks since the adoption of new tec...
Abstract Every big online security breach seems to end in a big lecture. Thus, although a predominan...
As the world becomes more interconnected now than decades ago, information security incidents are mo...
Information Security Behavior among employees has dramatically changed the organizational security t...
This paper discusses employees' information security behavior from the perspective of Islam and prov...
Insiders within organizations increase the risk of security incidents through non-malicious intentio...
This paper will examine the difference between management’s perception of the information security r...
The aim of the present study was twofold. First it aimed to elicit Information Security (InfoSec) ex...
As security breaches in organisations are on the rise, developing an understanding of factors enabli...
Living in a digital age, where all kinds of information are accessible electronically at all times, ...
Increasing the number of security breaches caused by humans, scholars are interested in exploring co...
In today’s world, information security is a trending as well as a crucial topic for both individuals...
Abstract Purpose This paper aims to investigate the influence of moral disengagement, perceived pe...
In organisations, the use of technology and its advancement solutions has become more necessary than...
Information Security Awareness (ISA) is a considerable break in the wall of information security. Pe...
Digitization has given rise to information system security (ISS) risks since the adoption of new tec...
Abstract Every big online security breach seems to end in a big lecture. Thus, although a predominan...
As the world becomes more interconnected now than decades ago, information security incidents are mo...
Information Security Behavior among employees has dramatically changed the organizational security t...
This paper discusses employees' information security behavior from the perspective of Islam and prov...
Insiders within organizations increase the risk of security incidents through non-malicious intentio...
This paper will examine the difference between management’s perception of the information security r...
The aim of the present study was twofold. First it aimed to elicit Information Security (InfoSec) ex...
As security breaches in organisations are on the rise, developing an understanding of factors enabli...
Living in a digital age, where all kinds of information are accessible electronically at all times, ...
Increasing the number of security breaches caused by humans, scholars are interested in exploring co...
In today’s world, information security is a trending as well as a crucial topic for both individuals...
Abstract Purpose This paper aims to investigate the influence of moral disengagement, perceived pe...
In organisations, the use of technology and its advancement solutions has become more necessary than...
Information Security Awareness (ISA) is a considerable break in the wall of information security. Pe...
Digitization has given rise to information system security (ISS) risks since the adoption of new tec...
Abstract Every big online security breach seems to end in a big lecture. Thus, although a predominan...