There is an increasing focus on the persuasive approach to develop a people-centric security climate where employees are aware of the priority of security and perform conscious security behaviour proactively. Employees can evaluate the priority of security as they observe and interact with the security features that constitute the security climate of the workplace. We examined the fundamental challenge that not every employee could recognise those features. In this multi-stage research, we adopted the theoretical lens of symbolic interactionism to advance a conceptual model which explains the relationship between organisation's social networks and the formation of information security climate. A descriptive case study in Vietnam was th...
While prior research has been examining information security behaviours in mature environments with ...
Businesses around the world have experienced unprecedented incidents and losses related to informati...
A significant volume of security breaches occur as a result of the human aspects and it is consequen...
Over the past years, a large amount of studies has advanced knowledge that explains how individuals ...
Behavioural information security (InfoSec) research has studied InfoSec at workplaces through the em...
As organisations are developing people-centric security workplaces, where proactive security behavio...
Over the past years, a large amount of studies has advanced knowledge that explains how individuals ...
While extant research has studied the motivations of individualistic security compliance, this study...
Security professionals, particularly those working in the field of nuclear security, have become inc...
In a networked global economy, cyber security threats have accelerated at an enormous rate. The secu...
This extended abstract briefly introduces Hofstede's three leveled model of human mental programming...
Employees are often referred to as the main cause of cyber security incidents in organizations. Thes...
As modern organisations are using strategic information systems as their competitive advantage, the ...
Abstract: This study aims to explore the social roles of the people who can influence young home com...
Information security is a challenge facing organisations, as security breaches pose a serious threat...
While prior research has been examining information security behaviours in mature environments with ...
Businesses around the world have experienced unprecedented incidents and losses related to informati...
A significant volume of security breaches occur as a result of the human aspects and it is consequen...
Over the past years, a large amount of studies has advanced knowledge that explains how individuals ...
Behavioural information security (InfoSec) research has studied InfoSec at workplaces through the em...
As organisations are developing people-centric security workplaces, where proactive security behavio...
Over the past years, a large amount of studies has advanced knowledge that explains how individuals ...
While extant research has studied the motivations of individualistic security compliance, this study...
Security professionals, particularly those working in the field of nuclear security, have become inc...
In a networked global economy, cyber security threats have accelerated at an enormous rate. The secu...
This extended abstract briefly introduces Hofstede's three leveled model of human mental programming...
Employees are often referred to as the main cause of cyber security incidents in organizations. Thes...
As modern organisations are using strategic information systems as their competitive advantage, the ...
Abstract: This study aims to explore the social roles of the people who can influence young home com...
Information security is a challenge facing organisations, as security breaches pose a serious threat...
While prior research has been examining information security behaviours in mature environments with ...
Businesses around the world have experienced unprecedented incidents and losses related to informati...
A significant volume of security breaches occur as a result of the human aspects and it is consequen...