As organizations have become more dependent on networked information systems (IS) to conduct their business operations, their susceptibility to various threats to information security has also increased. Research has consistently identified the inappropriate security behavior of the users as the most significant of these threats. Various factors have been identified in prior research as contributing to these inappropriate security behaviors, however, not enough is known about the role of social factors in mediating these behaviors. This study developed a new Computer Security Self-Efficacy (CSSE) construct, identified 35 highly reliable items of CSSE in the context of individuals’ use of encrypted e-mail, and identified four significant fac...
Information security has for long time been a field of study in computer science, software engineeri...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Information security has for long time been a field of study in computer science, software engineeri...
As organizations have become more dependent on networked information systems (IS) to conduct their b...
As organizations have become more dependent on networked information systems (IS) to conduct their b...
Given a paucity of research and apparent lack of coherence in information system research, it seems ...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments a...
Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments a...
Past research on Self-efficacy in information security gives clues about the failure of individuals ...
A survey of IT professionals suggested that despite technological advancement and organizational pro...
The increased amount of attacks targeting humans accessing and using computers has made it significa...
Given an apparent lack of coherence and a paucity of computer system field of studies, research imit...
The increasing frequency of security incidents is a major concern to organizations, and it is theref...
Information security has for long time been a field of study in computer science, software engineeri...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Information security has for long time been a field of study in computer science, software engineeri...
As organizations have become more dependent on networked information systems (IS) to conduct their b...
As organizations have become more dependent on networked information systems (IS) to conduct their b...
Given a paucity of research and apparent lack of coherence in information system research, it seems ...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments a...
Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments a...
Past research on Self-efficacy in information security gives clues about the failure of individuals ...
A survey of IT professionals suggested that despite technological advancement and organizational pro...
The increased amount of attacks targeting humans accessing and using computers has made it significa...
Given an apparent lack of coherence and a paucity of computer system field of studies, research imit...
The increasing frequency of security incidents is a major concern to organizations, and it is theref...
Information security has for long time been a field of study in computer science, software engineeri...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Information security has for long time been a field of study in computer science, software engineeri...