Compliance with information security policies (ISPs) is a key factor in reducing an organization’s information security risks. As such, understanding employees’ compliance behavior with ISPs is an important first step to leverage knowledge worker assets in efforts targeted toward reducing information security risks. This study adapts the Technology Acceptance Model (TAM) to examine users’ behavioral intention to comply with ISPs. The impact of information security awareness on behavioral intentions to comply is also considered in the research model. This is a research in progress, and an instrument is being developed to conduct a survey study to gather data from employees in the banking sector in Jordan
Research accentuates that end-users‘ noncompliance with information security policy (ISP) is a key c...
Aspects of information security is not sufficient to ensure a high level of information security pol...
Ensuring information systems security policy compliance is an integral part of the security program ...
Compliance with information security policies (ISPs) is a key factor in reducing an organization’s i...
Information security policy compliance is one of the key concerns that face organizations today. Alt...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...
Information security is one of the major challenges for organizations that critically depend on info...
It is widely agreed that a key threat to information security is caused by careless employees who do...
The literature agrees that the major threat to IS security is constituted by careless employees. The...
The Internet and information technology have influenced human life significantly. However, informati...
Ethical issues are key factors with respect to compliance intention with information security polici...
Drawing on the Theory of Planned Behavior (TPB), this research investigates two factors that drive a...
Many organizations recognize that their employees, who are often considered the weakest link in info...
Organisations throughout the world face threats to the security of their information. In most organi...
Information security policy compliance (ISP) is one of the key concerns that face organizations toda...
Research accentuates that end-users‘ noncompliance with information security policy (ISP) is a key c...
Aspects of information security is not sufficient to ensure a high level of information security pol...
Ensuring information systems security policy compliance is an integral part of the security program ...
Compliance with information security policies (ISPs) is a key factor in reducing an organization’s i...
Information security policy compliance is one of the key concerns that face organizations today. Alt...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...
Information security is one of the major challenges for organizations that critically depend on info...
It is widely agreed that a key threat to information security is caused by careless employees who do...
The literature agrees that the major threat to IS security is constituted by careless employees. The...
The Internet and information technology have influenced human life significantly. However, informati...
Ethical issues are key factors with respect to compliance intention with information security polici...
Drawing on the Theory of Planned Behavior (TPB), this research investigates two factors that drive a...
Many organizations recognize that their employees, who are often considered the weakest link in info...
Organisations throughout the world face threats to the security of their information. In most organi...
Information security policy compliance (ISP) is one of the key concerns that face organizations toda...
Research accentuates that end-users‘ noncompliance with information security policy (ISP) is a key c...
Aspects of information security is not sufficient to ensure a high level of information security pol...
Ensuring information systems security policy compliance is an integral part of the security program ...