Computer offences and crimes against corporate computer systems have increasingly become a major challenge to information security management in the Internet-enabled global economy and society. In this study, we attempt to develop a theoretical model that integrates three main stream criminology theories, i.e., general deterrence, rational choice, and individual propensity. We submit that, while the main decision process leading to an offensive act may be explained by the rational choice theory, self-control and deterrence factors could significantly alter the risk-benefit calculus assumed in the rational choice model. Using data collected from employees in multiple organizations, we tested our model using structural equation modelling tech...
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significa...
This research aims to identify the antecedents that drive an employee to commit Internet abuses at t...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Computer offences and crimes against corporate computer systems have increasingly become a major cha...
While hackers and viruses fuel the IS security concerns for organisations, the problems posed by emp...
In the modern networked world, replete with massive amounts of data, one of the greatest threats fac...
This research-perspective article reviews and contributes to the literature that explains how to det...
IS security represents a growing concern for organisations. Although hackers and viruses are often t...
Recent academic investigations of computer security policy violations have largely focused on non-ma...
Recent academic investigations of computer security policy violations have largely focused on non-ma...
Employees\u27 noncompliance with information security policy and rules is a serious impediment to th...
Prior information security studies have largely focused on understanding employee security behavior ...
The damage caused by illegal hacking has become one of the serious problems facing society. Based on...
Using self-report measures of attitudinal and behavioral self-control, this study tests the applicab...
As the use of the Internet has grown, so have new ways for employees to loaf. Cyberloafing has becom...
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significa...
This research aims to identify the antecedents that drive an employee to commit Internet abuses at t...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Computer offences and crimes against corporate computer systems have increasingly become a major cha...
While hackers and viruses fuel the IS security concerns for organisations, the problems posed by emp...
In the modern networked world, replete with massive amounts of data, one of the greatest threats fac...
This research-perspective article reviews and contributes to the literature that explains how to det...
IS security represents a growing concern for organisations. Although hackers and viruses are often t...
Recent academic investigations of computer security policy violations have largely focused on non-ma...
Recent academic investigations of computer security policy violations have largely focused on non-ma...
Employees\u27 noncompliance with information security policy and rules is a serious impediment to th...
Prior information security studies have largely focused on understanding employee security behavior ...
The damage caused by illegal hacking has become one of the serious problems facing society. Based on...
Using self-report measures of attitudinal and behavioral self-control, this study tests the applicab...
As the use of the Internet has grown, so have new ways for employees to loaf. Cyberloafing has becom...
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significa...
This research aims to identify the antecedents that drive an employee to commit Internet abuses at t...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...