Employees’ non-compliance with information systems (IS) security policies is a key concern for organizations. Previous studies have proposed different explanations for employees’ behavior, such as the use of sanctions and monitoring, fear appeal and training, which represent different paradigms of learning. Previous works do not test the validity of their models or methods across different cultural settings. Based on interviews in four countries, we argue that while information security behaviors are learned, different paradigms of learning are effective in different cultures; i.e., different cultures require different IS security interventions. What is even more important is that by providing non-preferred IS security interventions (e.g., ...
The security of information systems has become one of the top agendas of business executives in econ...
It is widely agreed that a key threat to information security is caused by careless employees who do...
YesThis study explores how aspects of perceived national culture affect the information security att...
This paper is an attempt to develop a model that explores the factors that affect the frequency of v...
Information System (IS) tools and applications create opportunities for a positive digital change to...
IS security policy non-compliance is a problem experienced globally. Organizations have implemented ...
Recent research on information security has recognized that cultural differences need to be consider...
Information security policies can be considered as guidelines and used as a starting point to create...
In our paper we argue that effective information system (IS) security mainly has to take employees a...
Information system (IS) security incidents occur, in part, because employees undermine security poli...
The behaviour of employees has been identified as a key factor in the protection of organizational i...
The literature agrees that the major threat to IS security is constituted by careless employees. The...
This paper is an attempt to develop a model that explores the factors that affect the frequency of v...
An increasing number of security breaches in organizations present a potentially serious threat to i...
Humans are the weakest link in any information security (IS) environment. Research has shown that hu...
The security of information systems has become one of the top agendas of business executives in econ...
It is widely agreed that a key threat to information security is caused by careless employees who do...
YesThis study explores how aspects of perceived national culture affect the information security att...
This paper is an attempt to develop a model that explores the factors that affect the frequency of v...
Information System (IS) tools and applications create opportunities for a positive digital change to...
IS security policy non-compliance is a problem experienced globally. Organizations have implemented ...
Recent research on information security has recognized that cultural differences need to be consider...
Information security policies can be considered as guidelines and used as a starting point to create...
In our paper we argue that effective information system (IS) security mainly has to take employees a...
Information system (IS) security incidents occur, in part, because employees undermine security poli...
The behaviour of employees has been identified as a key factor in the protection of organizational i...
The literature agrees that the major threat to IS security is constituted by careless employees. The...
This paper is an attempt to develop a model that explores the factors that affect the frequency of v...
An increasing number of security breaches in organizations present a potentially serious threat to i...
Humans are the weakest link in any information security (IS) environment. Research has shown that hu...
The security of information systems has become one of the top agendas of business executives in econ...
It is widely agreed that a key threat to information security is caused by careless employees who do...
YesThis study explores how aspects of perceived national culture affect the information security att...