PhD ThesisA major challenge for organisations is effectively implementing security policies where employees have a choice to comply. For instance, an organisational requirement such as no unauthorisedpersonnelinrestrictedareasmayhaveapolicystatingauthorisedpersonsmust wearidentificationbadgesand,therefore,placestheonusonemployeestomakeachoiceand have the responsibility of wearing their badge. Existing literature in psychology and human factors in security tells us that a person’s compliance behaviour for a security policy depends on their compliance attitude. For the organisation, there exists uncertainty for quantifying compliance attitudes of employees towards security policies where those employees have a choice to comply. Quantifying th...
The paper aims to identify behavioural theories that influence information security policies complia...
Research accentuates that end-users‘ noncompliance with information security policy (ISP) is a key c...
Information security is among the top organizational priorities. Theoretically, information security...
Technical aspect of security is inadequate to ensure information security within organization thus r...
Employees’ non-compliance with information systems security policies has been identified as a major ...
Security policy-makers (influencers) in an organization set security policies that embody intended b...
The Internet and information technology have influenced human life significantly. However, informati...
The body of research that focuses on employees’ information Security Policy compliance is problemati...
Information security embodies the complex interaction between security policies, user perceptions of...
Aspects of information security is not sufficient to ensure a high level of information security pol...
Information security in an organization largely depends on employee compliance with information secu...
Security policy-makers (influencers) in an organization set security policies that embody intended b...
Part 5: Security Management and Human Aspects of SecurityInternational audienceIndividuals’ complian...
Information security attacks typically exploit the weakest link in the chain, which is in most cases...
Dissertation presented as the partial requirement for obtaining a Master's degree in Information Man...
The paper aims to identify behavioural theories that influence information security policies complia...
Research accentuates that end-users‘ noncompliance with information security policy (ISP) is a key c...
Information security is among the top organizational priorities. Theoretically, information security...
Technical aspect of security is inadequate to ensure information security within organization thus r...
Employees’ non-compliance with information systems security policies has been identified as a major ...
Security policy-makers (influencers) in an organization set security policies that embody intended b...
The Internet and information technology have influenced human life significantly. However, informati...
The body of research that focuses on employees’ information Security Policy compliance is problemati...
Information security embodies the complex interaction between security policies, user perceptions of...
Aspects of information security is not sufficient to ensure a high level of information security pol...
Information security in an organization largely depends on employee compliance with information secu...
Security policy-makers (influencers) in an organization set security policies that embody intended b...
Part 5: Security Management and Human Aspects of SecurityInternational audienceIndividuals’ complian...
Information security attacks typically exploit the weakest link in the chain, which is in most cases...
Dissertation presented as the partial requirement for obtaining a Master's degree in Information Man...
The paper aims to identify behavioural theories that influence information security policies complia...
Research accentuates that end-users‘ noncompliance with information security policy (ISP) is a key c...
Information security is among the top organizational priorities. Theoretically, information security...