Insecure user behavior and failure to identify phishing is a leading cause of information security breaches triggering increased company costs in keeping information secure. Training employees toward secure information systems (IS) behavior is a way for organizations to attempt keeping information secure. Herein we outline how using traditional goals for information security training is a contributing factor to continued rise of insecure employee behavior. We posit that the approach to information security training recommended in extant literature is failing because of focus on improving skills in procedural, policy, and compliance activities. We propose a model suggesting alternative goals and draws propositions regarding its effective...
Humans are the weakest link in any information security (IS) environment. Research has shown that hu...
In recent years, rapid progress in the use of the internet has resulted in huge losses in many organ...
The COVID-19 pandemic has transformed the workspace, thrusting countless employees from organization...
Information systems (IS) security breaches cause significant losses to organizations worldwide. Many...
Employee noncompliance with information systems security policies is a key concern for organizations...
Information security (InfoSec) is concerned with protecting the confidentially, integrity and availa...
Employees’ non-compliance with IS security procedures is a key concern for organizations. To tackle ...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
Abstract When implementing their information security solutions organizations have typically focused...
The risk of being impacted by a cyberattack is high, because of more professional attacks. Thereby, ...
The digital transformation of the 21st century has led to a series of new possibilities and challeng...
Information security is a socio-technical property where a lot of traditional efforts has been place...
Phishing is a social engineering tactic that targets internet users in an attempt to trick them into...
Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on the ...
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructu...
Humans are the weakest link in any information security (IS) environment. Research has shown that hu...
In recent years, rapid progress in the use of the internet has resulted in huge losses in many organ...
The COVID-19 pandemic has transformed the workspace, thrusting countless employees from organization...
Information systems (IS) security breaches cause significant losses to organizations worldwide. Many...
Employee noncompliance with information systems security policies is a key concern for organizations...
Information security (InfoSec) is concerned with protecting the confidentially, integrity and availa...
Employees’ non-compliance with IS security procedures is a key concern for organizations. To tackle ...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
Abstract When implementing their information security solutions organizations have typically focused...
The risk of being impacted by a cyberattack is high, because of more professional attacks. Thereby, ...
The digital transformation of the 21st century has led to a series of new possibilities and challeng...
Information security is a socio-technical property where a lot of traditional efforts has been place...
Phishing is a social engineering tactic that targets internet users in an attempt to trick them into...
Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on the ...
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructu...
Humans are the weakest link in any information security (IS) environment. Research has shown that hu...
In recent years, rapid progress in the use of the internet has resulted in huge losses in many organ...
The COVID-19 pandemic has transformed the workspace, thrusting countless employees from organization...