Given the significant role individuals play on the welfare of organizations’ security, end users are encouraged to see themselves as part of the information security solution and are expected to perform certain end-user security roles. However, there is often a divide between the organization’s expectations of the end-user’s information security role and the end-user’s functional role. We explore the concept of role identity in order to understand the factors that increase the importance ascribed to the information security end user role, which in turn affects performance and actions towards security behaviors. We develop a model that focuses on two issues: (1) factors that increase information security role identity (ISRI) and (2) conseque...
Information security is one of the major challenges for organizations that critically depend on info...
Information security policies are (ISP) used to guide employees in order to ensure information secur...
Extra-role security behavior has been recognized as a salient element of information security. Drawi...
Given the significant role individuals play on the welfare of organizations’ security, end users are...
Given the significant role individuals play on the welfare of organizations’ security, end users are...
Given the significant role individuals play on the welfare of organizations’ security, end users are...
A growing body of research evidence has been focused on exploring aspects of individual differences ...
Purpose: The authors seek to understand the formation of control- and security-related identities am...
Work systems are comprised of the technical and social systems that should harmoniously work togethe...
Research identifies employees as the weakest link in data security. Determining what characteristics...
Although prior information security research predominantly focuses on organizational in-role securit...
Organizations and government leaders are concerned about cyber incidents. For some time, researchers...
The body of research that focuses on employees’ information Security Policy compliance is problemati...
All information security professionals around the globe acknowledge that "everyone is responsible fo...
This research is focused on developing an understanding of how individuals identify with their assig...
Information security is one of the major challenges for organizations that critically depend on info...
Information security policies are (ISP) used to guide employees in order to ensure information secur...
Extra-role security behavior has been recognized as a salient element of information security. Drawi...
Given the significant role individuals play on the welfare of organizations’ security, end users are...
Given the significant role individuals play on the welfare of organizations’ security, end users are...
Given the significant role individuals play on the welfare of organizations’ security, end users are...
A growing body of research evidence has been focused on exploring aspects of individual differences ...
Purpose: The authors seek to understand the formation of control- and security-related identities am...
Work systems are comprised of the technical and social systems that should harmoniously work togethe...
Research identifies employees as the weakest link in data security. Determining what characteristics...
Although prior information security research predominantly focuses on organizational in-role securit...
Organizations and government leaders are concerned about cyber incidents. For some time, researchers...
The body of research that focuses on employees’ information Security Policy compliance is problemati...
All information security professionals around the globe acknowledge that "everyone is responsible fo...
This research is focused on developing an understanding of how individuals identify with their assig...
Information security is one of the major challenges for organizations that critically depend on info...
Information security policies are (ISP) used to guide employees in order to ensure information secur...
Extra-role security behavior has been recognized as a salient element of information security. Drawi...