© 2015 Elsevier Ltd. All rights reserved. The Internet and information technology have influenced human life significantly. However, information security is still an important concern for both users and organizations. Technology cannot solely guarantee a secure environment for information; the human aspects of information security should be taken into consideration, besides the technological aspects. The lack of information security awareness, ignorance, negligence, apathy, mischief, and resistance are the root of users' mistakes. In this research, a novel model shows how complying with organizational information security policies shapes and mitigates the risk of employees' behaviour. The significant aspect of this research is derived from ...
Drawing on the Theory of Planned Behavior (TPB), this research investigates two factors that drive a...
Part 5: Security Management and Human Aspects of SecurityInternational audienceIndividuals’ complian...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...
The Internet and information technology have influenced human life significantly. However, informati...
Information security is one of the major challenges for organizations that critically depend on info...
Aspects of information security is not sufficient to ensure a high level of information security pol...
Organisations increasingly perceive their employees as a great asset that needs to be cared for; how...
The focus of information security has traditionally been on technological issues, and organizations ...
Many organizations recognize that their employees, who are often considered the weakest link in info...
The key threat to information security comes from employees who do not comply with information secur...
User non-compliance with information security policies in organizations due to negligence or ignoran...
The adherence of employees towards Information Security Policy (ISP) established in the organization...
The authors found the behavioral factors that influence the organization members’ compliance with th...
Ph.D. University of Hawaii at Manoa 2013.Includes bibliographical references.Information and informa...
The adoption of computer and internet technology has greatly improved the way businesses operate. Ho...
Drawing on the Theory of Planned Behavior (TPB), this research investigates two factors that drive a...
Part 5: Security Management and Human Aspects of SecurityInternational audienceIndividuals’ complian...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...
The Internet and information technology have influenced human life significantly. However, informati...
Information security is one of the major challenges for organizations that critically depend on info...
Aspects of information security is not sufficient to ensure a high level of information security pol...
Organisations increasingly perceive their employees as a great asset that needs to be cared for; how...
The focus of information security has traditionally been on technological issues, and organizations ...
Many organizations recognize that their employees, who are often considered the weakest link in info...
The key threat to information security comes from employees who do not comply with information secur...
User non-compliance with information security policies in organizations due to negligence or ignoran...
The adherence of employees towards Information Security Policy (ISP) established in the organization...
The authors found the behavioral factors that influence the organization members’ compliance with th...
Ph.D. University of Hawaii at Manoa 2013.Includes bibliographical references.Information and informa...
The adoption of computer and internet technology has greatly improved the way businesses operate. Ho...
Drawing on the Theory of Planned Behavior (TPB), this research investigates two factors that drive a...
Part 5: Security Management and Human Aspects of SecurityInternational audienceIndividuals’ complian...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...