Corporate information systems security managers are continuously investing in the latest technical security tools to make their defenses against internal and external attacks on their information systems effective and efficient. However, these technical tools do not provide complete protection and organizations are experiencing a rise in security breaches. The cause of some security breaches are attributed to the actions of employees within the organization. Based on literature in international relations, this study advances four propositions to explain how end-user compliance with organizational information security policy (ISP) can be achieved using a confidence-building measures approach. The set of four propositions developed involve tr...
An understanding of insider threats in information systems (IS) is important to help address one of ...
Understanding the drivers to encourage employees\u27 security compliance behavior is increasingly im...
Companies are increasing their investment in technologies to enable better access to information and...
Organizations continually experience losses, financial and otherwise, due to non-compliant behav- io...
Information security policy compliance is one of the key concerns that face organizations today. Alt...
The Internet and information technology have influenced human life significantly. However, informati...
Information security is one of the major challenges for organizations that critically depend on info...
Protection of data and information security are crucial to business processes and include technical,...
Many organizations recognize that their employees, who are often considered the weakest link in info...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...
The focus of information security has traditionally been on technological issues, and organizations ...
Aspects of information security is not sufficient to ensure a high level of information security pol...
Information security has received increased attention and become significantly more important to org...
The adherence of employees towards Information Security Policy (ISP) established in the organization...
Compliance with information security policies (ISPs) is a key factor in reducing an organization’s i...
An understanding of insider threats in information systems (IS) is important to help address one of ...
Understanding the drivers to encourage employees\u27 security compliance behavior is increasingly im...
Companies are increasing their investment in technologies to enable better access to information and...
Organizations continually experience losses, financial and otherwise, due to non-compliant behav- io...
Information security policy compliance is one of the key concerns that face organizations today. Alt...
The Internet and information technology have influenced human life significantly. However, informati...
Information security is one of the major challenges for organizations that critically depend on info...
Protection of data and information security are crucial to business processes and include technical,...
Many organizations recognize that their employees, who are often considered the weakest link in info...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...
The focus of information security has traditionally been on technological issues, and organizations ...
Aspects of information security is not sufficient to ensure a high level of information security pol...
Information security has received increased attention and become significantly more important to org...
The adherence of employees towards Information Security Policy (ISP) established in the organization...
Compliance with information security policies (ISPs) is a key factor in reducing an organization’s i...
An understanding of insider threats in information systems (IS) is important to help address one of ...
Understanding the drivers to encourage employees\u27 security compliance behavior is increasingly im...
Companies are increasing their investment in technologies to enable better access to information and...