In today’s world, information security is a trending as well as a crucial topic for both individuals and organizations. Experts believe that nothing can guarantee any system’s security unless humans’ information security behavior is taken under consideration. Opening an e-mail attachment without checking its source, sharing account information with other people and browsing websites without checking its reliability can be considered as common mistakes in information security behavior. This study examines the factors affecting information security behavior by scrutinising its relationship with different variables which are information knowledge sharing, information security organization policy, the intention of attending information security...
Today there are many hardware and software solutions to enhance information security, but there is l...
The focus of this dissertation was to examine the crucial relationship between organization systems ...
Knowledge sharing plays an important role in the domain of information security, due to its positive...
Users do often not behave securely when using information technology. Many studies have tried to ide...
Today, the Internet can be considered to be a basic commodity, similar to electricity, without which...
Employees are often referred to as the main cause of cyber security incidents in organizations. Thes...
This study presents an extensive literature review on information security behavior in the context o...
There is ever increasing growth of information systems and technology in terms pervasiveness and cap...
There are many security risks to the organizations’ information assets; nonetheless, among the major...
With the wide spread use of Internet, comes an increase in Information Security threats. To protect ...
The critical issues of information security have gradually increased. Effective information security...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
The Internet and information technology have influenced human life significantly. However, informati...
Today there are many hardware and software solutions to enhance information security, but there is l...
The focus of this dissertation was to examine the crucial relationship between organization systems ...
Knowledge sharing plays an important role in the domain of information security, due to its positive...
Users do often not behave securely when using information technology. Many studies have tried to ide...
Today, the Internet can be considered to be a basic commodity, similar to electricity, without which...
Employees are often referred to as the main cause of cyber security incidents in organizations. Thes...
This study presents an extensive literature review on information security behavior in the context o...
There is ever increasing growth of information systems and technology in terms pervasiveness and cap...
There are many security risks to the organizations’ information assets; nonetheless, among the major...
With the wide spread use of Internet, comes an increase in Information Security threats. To protect ...
The critical issues of information security have gradually increased. Effective information security...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
The Internet and information technology have influenced human life significantly. However, informati...
Today there are many hardware and software solutions to enhance information security, but there is l...
The focus of this dissertation was to examine the crucial relationship between organization systems ...
Knowledge sharing plays an important role in the domain of information security, due to its positive...