Abstract: In the technology-people-management chain, people are predominantly identified as the weakest link in properly securing information systems. Previous information security studies pursued an understanding of information security behaviour by investigating internal and external factors influencing such behaviour. With some information security studies placing great significance on the role of the situation, an external factor, when investigating human behaviour. Psychological Situationism research emphasises that behaviour is shaped mainly by the exigencies of a particular situation. An examination of information security literature indicated that the exigencies of computer system failure situations had not been explored as an exter...
Purpose - This paper aims to assess the influence of a set of human and organizational factors in in...
With computers being a standard part of life now with the evolution of the internet, many aspects of...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
Lecture Notes in Computer Science, vol 9190Information Security professionals have been attempting t...
The growing number of information security breaches in organisations presents a serious risk to the ...
The increasing dependence on information systems (ISs) together with the emergence of new technologi...
Purpose – This paper aims to investigate the influence of moral disengagement, perceived penalty, ne...
Abstract: In recent times, organisations in developing countries rely heavily on information systems...
This paper will examine the difference between management’s perception of the information security r...
As implementation of computer systems has continued to grow in business contexts, employee-driven cy...
The current publication presents selected risks resulting from the involvement of the human factor. ...
This dissertation addresses the general problem of managing information resources through considerat...
Digitization has given rise to information system security (ISS) risks since the adoption of new tec...
The fact that information is ubiquitous throughout most modern organisations cannot be denied. Infor...
This is an accepted manuscript of an article published by Elsevier in Journal of Information Securit...
Purpose - This paper aims to assess the influence of a set of human and organizational factors in in...
With computers being a standard part of life now with the evolution of the internet, many aspects of...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
Lecture Notes in Computer Science, vol 9190Information Security professionals have been attempting t...
The growing number of information security breaches in organisations presents a serious risk to the ...
The increasing dependence on information systems (ISs) together with the emergence of new technologi...
Purpose – This paper aims to investigate the influence of moral disengagement, perceived penalty, ne...
Abstract: In recent times, organisations in developing countries rely heavily on information systems...
This paper will examine the difference between management’s perception of the information security r...
As implementation of computer systems has continued to grow in business contexts, employee-driven cy...
The current publication presents selected risks resulting from the involvement of the human factor. ...
This dissertation addresses the general problem of managing information resources through considerat...
Digitization has given rise to information system security (ISS) risks since the adoption of new tec...
The fact that information is ubiquitous throughout most modern organisations cannot be denied. Infor...
This is an accepted manuscript of an article published by Elsevier in Journal of Information Securit...
Purpose - This paper aims to assess the influence of a set of human and organizational factors in in...
With computers being a standard part of life now with the evolution of the internet, many aspects of...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...