A principal concern of organizations is the failure of employees to comply with information security policies (ISPs). Deterrence theory is one of the most frequently used theories for examining ISP violations, yet studies using this theory have produced mixed results. Past research has indicated that cultural differences may be one reason for these inconsistent findings and have hence called for cross-cultural research on deterrence in information security. To address this gap, we formulated a model including deterrence, moral beliefs, shame, and neutralization techniques and tested it with the employees from 48 countries working for a large multinational company.peerReviewe
Information security policies can be considered as guidelines and used as a starting point to create...
Information security is one of the organizations' top agendas worldwide. Similarly, there is a growi...
Information System (IS) tools and applications create opportunities for a positive digital change to...
IS security policy non-compliance is a problem experienced globally. Organizations have implemented ...
This paper is an attempt to develop a model that explores the factors that affect the frequency of v...
This paper is an attempt to develop a model that explores the factors that affect the frequency of v...
At a time of rapid business globalisation, it is necessary to understand employee security behaviou...
It is widely agreed that a large amount of information systems (IS) security incidents occur in the ...
The security of information systems has become one of the top agendas of business executives in econ...
An increasing number of information security breaches in organisations presents a serious threat to ...
Employees\u27 noncompliance with Information security policies (ISPs) has been a central concern and...
Recent research on information security has recognized that cultural differences need to be consider...
Abstract Every big online security breach seems to end in a big lecture. Thus, although a predominan...
Information security is one of the organizations\u27 top agendas worldwide. Similarly, there is a gr...
An increasing number of information security breaches in organisations presents a serious threat to...
Information security policies can be considered as guidelines and used as a starting point to create...
Information security is one of the organizations' top agendas worldwide. Similarly, there is a growi...
Information System (IS) tools and applications create opportunities for a positive digital change to...
IS security policy non-compliance is a problem experienced globally. Organizations have implemented ...
This paper is an attempt to develop a model that explores the factors that affect the frequency of v...
This paper is an attempt to develop a model that explores the factors that affect the frequency of v...
At a time of rapid business globalisation, it is necessary to understand employee security behaviou...
It is widely agreed that a large amount of information systems (IS) security incidents occur in the ...
The security of information systems has become one of the top agendas of business executives in econ...
An increasing number of information security breaches in organisations presents a serious threat to ...
Employees\u27 noncompliance with Information security policies (ISPs) has been a central concern and...
Recent research on information security has recognized that cultural differences need to be consider...
Abstract Every big online security breach seems to end in a big lecture. Thus, although a predominan...
Information security is one of the organizations\u27 top agendas worldwide. Similarly, there is a gr...
An increasing number of information security breaches in organisations presents a serious threat to...
Information security policies can be considered as guidelines and used as a starting point to create...
Information security is one of the organizations' top agendas worldwide. Similarly, there is a growi...
Information System (IS) tools and applications create opportunities for a positive digital change to...