Knowledge sharing plays an important role in the domain of information security, due to its positive effect on employees' information security awareness. It is acknowledged that security awareness is the most important factor that mitigates the risk of information security breaches in organizations. In this research, a model has been presented that shows how information security knowledge sharing (ISKS) forms and decreases the risk of information security incidents. The Motivation Theory and Theory of Planned Behavior besides Triandis model were applied as the theoretical backbone of the conceptual framework. The results of the data analysis showed that earning a reputation, and gaining promotion as an extrinsic motivation and curiosity sat...
International audienceSecurity information sharing (SIS) is an activity whereby individuals exchange...
In today’s world, information security is a trending as well as a crucial topic for both individuals...
Due to a massive rise in data breaches caused by negligent information systems users, organizations ...
Drawing on the extant literature on information security and neo-institutional theory, we develop an...
Knowledge sharing is an important component of knowledge management systems. Security knowledge shar...
Employees play a crucial role in enhancing information security in the workplace, and this requires ...
Employees play a crucial role in enhancing information security in the workplace, and this requires ...
The Internet and information technology have influenced human life significantly. However, informati...
This study focused on the knowledge sharing of employees at homeland security. In this study we deve...
As modern organizations rely more on their information systems, mitigating information security risk...
This research investigates the roles of sense of self-worth, in-role behavior, and organizational ci...
Today, the Internet can be considered to be a basic commodity, similar to electricity, without which...
Information security risk management (ISRM) is an integral part of the management practice and is an...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
Knowledge sharing is a vital business strategy that creates value for an organisation. It also leads...
International audienceSecurity information sharing (SIS) is an activity whereby individuals exchange...
In today’s world, information security is a trending as well as a crucial topic for both individuals...
Due to a massive rise in data breaches caused by negligent information systems users, organizations ...
Drawing on the extant literature on information security and neo-institutional theory, we develop an...
Knowledge sharing is an important component of knowledge management systems. Security knowledge shar...
Employees play a crucial role in enhancing information security in the workplace, and this requires ...
Employees play a crucial role in enhancing information security in the workplace, and this requires ...
The Internet and information technology have influenced human life significantly. However, informati...
This study focused on the knowledge sharing of employees at homeland security. In this study we deve...
As modern organizations rely more on their information systems, mitigating information security risk...
This research investigates the roles of sense of self-worth, in-role behavior, and organizational ci...
Today, the Internet can be considered to be a basic commodity, similar to electricity, without which...
Information security risk management (ISRM) is an integral part of the management practice and is an...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
Knowledge sharing is a vital business strategy that creates value for an organisation. It also leads...
International audienceSecurity information sharing (SIS) is an activity whereby individuals exchange...
In today’s world, information security is a trending as well as a crucial topic for both individuals...
Due to a massive rise in data breaches caused by negligent information systems users, organizations ...