Information security is among the top organizational priorities. Theoretically, information security in socio-technical networks is as much of a behavioral issue as it is of a technical issue. Protection motivation theory (PMT), the dominant theory used to investigate end-user security behavior, though has shown conflicting results - primarily due to lack of contextualizing the theory to information security context from a healthcare context. In this paper, we outline a theoretically grounded conceptual model of the major factors influencing information security policy compliance. The model contextualizes the two independent variables of PMT. Threat appraisal evaluation is viewed as construal evaluation based on construal level theory, whil...
The Internet and information technology have influenced human life significantly. However, informati...
Noncompliance by employees with Information Systems security policies is a serious computer security...
In order to ensure that employees abide by their organizations’ Information Security Policies (ISP),...
The authors found the behavioral factors that influence the organization members’ compliance with th...
The paper aims to identify behavioural theories that influence information security policies complia...
The key threat to information security comes from employees who do not comply with information secur...
Information systems security (ISS) behavioral research has produced different models to explain secu...
This paper conducts a partial replication of (Siponen et al. 2014) which developed a multi-theory ba...
Aspects of information security is not sufficient to ensure a high level of information security pol...
Higher education institutions have invested heavily in their high-tech infrastructure to ensure the ...
Information security is one of the important domains of information systems research today, with pro...
It is widely agreed that a key threat to information security is caused by careless employees who do...
Ph.D. University of Hawaii at Manoa 2013.Includes bibliographical references.Information and informa...
The purpose of the present study is to make contributions to the area of behavioral information secu...
The study of employees’ intention to comply with information security policies in higher education i...
The Internet and information technology have influenced human life significantly. However, informati...
Noncompliance by employees with Information Systems security policies is a serious computer security...
In order to ensure that employees abide by their organizations’ Information Security Policies (ISP),...
The authors found the behavioral factors that influence the organization members’ compliance with th...
The paper aims to identify behavioural theories that influence information security policies complia...
The key threat to information security comes from employees who do not comply with information secur...
Information systems security (ISS) behavioral research has produced different models to explain secu...
This paper conducts a partial replication of (Siponen et al. 2014) which developed a multi-theory ba...
Aspects of information security is not sufficient to ensure a high level of information security pol...
Higher education institutions have invested heavily in their high-tech infrastructure to ensure the ...
Information security is one of the important domains of information systems research today, with pro...
It is widely agreed that a key threat to information security is caused by careless employees who do...
Ph.D. University of Hawaii at Manoa 2013.Includes bibliographical references.Information and informa...
The purpose of the present study is to make contributions to the area of behavioral information secu...
The study of employees’ intention to comply with information security policies in higher education i...
The Internet and information technology have influenced human life significantly. However, informati...
Noncompliance by employees with Information Systems security policies is a serious computer security...
In order to ensure that employees abide by their organizations’ Information Security Policies (ISP),...