Most current information systems security theories assume a rational actor making deliberate decisions, yet recent research in psychology suggests that such deliberate thinking is not as common as we would expect. Much of human behavior is controlled by nonconscious automatic cognition (called System 1 cognition). The deliberate rational cognition of System 2 is triggered when System 1 detects something that is not normal; otherwise we often operate on autopilot. When we do engage System 2 cognition, it is influenced by the System 1 cognition that preceded it. In this paper we present an alternative theoretical approach to information security that is based on the nonconscious automatic cognition of System 1. In a System 1 world, cognition ...
IS users and organizations must take necessary measures to adequately cope with security threats. Co...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Mental models, informal representations of reality, provide an appealing explanation for the apparen...
agenda Despite the development of advanced technical devices and procedures, the information held in...
Inadvertent and Irrational human errors (e.g., clicking on phishing emails) have been the primary ca...
Extant work has examined users’ security behavior in both individual and organizational contexts by ...
In this opinion paper, we first review the evolution of information security research, and summarize...
Security breaches of digital information represent a significant threat to the wellbeing of individu...
Security tasks can burden the individual, to the extent that security fatigue promotes habits that u...
Existing behavioral information security research proposes continuum or non-stage models that focus ...
IT users often make information security-related decisions in complex and multidimensional environme...
Learning from mistakes and failures is of paramount importance to today\u27s information workers and...
The idea that people should form positive security habits is gaining increasing attention amongst se...
Abstract. Computer security has traditionally been assessed from a technical point of view. Another ...
IS users and organizations must take necessary measures to adequately cope with security threats. Co...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Mental models, informal representations of reality, provide an appealing explanation for the apparen...
agenda Despite the development of advanced technical devices and procedures, the information held in...
Inadvertent and Irrational human errors (e.g., clicking on phishing emails) have been the primary ca...
Extant work has examined users’ security behavior in both individual and organizational contexts by ...
In this opinion paper, we first review the evolution of information security research, and summarize...
Security breaches of digital information represent a significant threat to the wellbeing of individu...
Security tasks can burden the individual, to the extent that security fatigue promotes habits that u...
Existing behavioral information security research proposes continuum or non-stage models that focus ...
IT users often make information security-related decisions in complex and multidimensional environme...
Learning from mistakes and failures is of paramount importance to today\u27s information workers and...
The idea that people should form positive security habits is gaining increasing attention amongst se...
Abstract. Computer security has traditionally been assessed from a technical point of view. Another ...
IS users and organizations must take necessary measures to adequately cope with security threats. Co...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...