Behavioral information security has become an important aspect of information security. In this study, we extend previous works on developing a comprehensive tool to measure security behaviors (i.e. Security Behavior Intentions scale - SeBIS(Egelman & Peer, 2015)). We extend the work on SeBIS by 1) proposing the use of security domain-specific risk as opposed to a generic risk measure, 2) investigating differences in SeBIS across age, gender, education and experience, and 3) providing suggestions for improving SeBIS measures. Survey results from our study provide support for security risk - device securement relationship, a previously unsupported link. We also uncover the role of demographics in influencing SeBIS. Overall, our study contrib...
While IT security research has explored explanatory models using risk/fear/efficacy drivers, this ef...
The present study explored the relationship between risky cybersecurity behaviours, attitudes toward...
This study presents an extensive literature review on information security behavior in the context o...
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Intern...
Employees continue to be the weak link in organizational security management and efforts to improve ...
Security threats caused by the inappropriate actions of the user continue to be a significant securi...
The education sector is at high risk for information security (InfoSec) breaches and in need of impr...
IS users and organizations must take necessary measures to adequately cope with security threats. Co...
Employees continue to be the weakest link in an organizational security ecosystem, exposing organiza...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...
Software security is integral to information security, requiring software developers to be aware of ...
Increasing the number of security breaches caused by humans, scholars are interested in exploring co...
Security information sharing (SIS) is an activity whereby individuals exchange information that is r...
Organizations have become increasingly concerned with developing and protecting their information se...
The aim of the research was to examine some correlates of security awareness and risky behavior whil...
While IT security research has explored explanatory models using risk/fear/efficacy drivers, this ef...
The present study explored the relationship between risky cybersecurity behaviours, attitudes toward...
This study presents an extensive literature review on information security behavior in the context o...
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Intern...
Employees continue to be the weak link in organizational security management and efforts to improve ...
Security threats caused by the inappropriate actions of the user continue to be a significant securi...
The education sector is at high risk for information security (InfoSec) breaches and in need of impr...
IS users and organizations must take necessary measures to adequately cope with security threats. Co...
Employees continue to be the weakest link in an organizational security ecosystem, exposing organiza...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...
Software security is integral to information security, requiring software developers to be aware of ...
Increasing the number of security breaches caused by humans, scholars are interested in exploring co...
Security information sharing (SIS) is an activity whereby individuals exchange information that is r...
Organizations have become increasingly concerned with developing and protecting their information se...
The aim of the research was to examine some correlates of security awareness and risky behavior whil...
While IT security research has explored explanatory models using risk/fear/efficacy drivers, this ef...
The present study explored the relationship between risky cybersecurity behaviours, attitudes toward...
This study presents an extensive literature review on information security behavior in the context o...