Information security has come to the forefront as an organizational priority since information systems are considered as some of the most important assets for achieving competitive advantages. Despite huge capital expenditures devoted to information security, the occurrence of security breaches is still very much on the rise. More studies are thus required to inform organizations with a better insight on how to adequately promote information security. To address this issue, this study investigates important factors influencing hospital staff’s adherence to Information Security Policy (ISP). Deterrence theory is adopted as the theoretical underpinning, in which punishment severity and punishment certainty are recognized as the most significa...
Aspects of information security is not sufficient to ensure a high level of information security pol...
The study of employees’ intention to comply with information security policies in higher education i...
In recent years, many health care organizations have begun to take advantage of computerized informa...
Health Information System (HIS) has a higher degree of vulnerability towards threats of information ...
In today’s interconnected world, universities recognize the importance of protecting their informati...
[[abstract]]Deterrence theory has been widely applied in information security behavioral research. I...
BACKGROUND: Health information systems are innovative products designed to improve the delivery of e...
It is widely agreed that a key threat to information security is caused by careless employees who do...
Higher education institutions have invested heavily in their high-tech infrastructure to ensure the ...
It has been argued that organizational punishment serves as a deterrent to unwanted employee behavio...
This paper analyzed factors for employees to violate information security policy in financial compan...
Information security is one of the major challenges for organizations that critically depend on info...
Abstract Purpose This paper aims to investigate the influence of moral disengagement, perceived pe...
Information security has received increased attention and become significantly more important to org...
It is widely agreed that a large amount of information systems (IS) security incidents occur in the ...
Aspects of information security is not sufficient to ensure a high level of information security pol...
The study of employees’ intention to comply with information security policies in higher education i...
In recent years, many health care organizations have begun to take advantage of computerized informa...
Health Information System (HIS) has a higher degree of vulnerability towards threats of information ...
In today’s interconnected world, universities recognize the importance of protecting their informati...
[[abstract]]Deterrence theory has been widely applied in information security behavioral research. I...
BACKGROUND: Health information systems are innovative products designed to improve the delivery of e...
It is widely agreed that a key threat to information security is caused by careless employees who do...
Higher education institutions have invested heavily in their high-tech infrastructure to ensure the ...
It has been argued that organizational punishment serves as a deterrent to unwanted employee behavio...
This paper analyzed factors for employees to violate information security policy in financial compan...
Information security is one of the major challenges for organizations that critically depend on info...
Abstract Purpose This paper aims to investigate the influence of moral disengagement, perceived pe...
Information security has received increased attention and become significantly more important to org...
It is widely agreed that a large amount of information systems (IS) security incidents occur in the ...
Aspects of information security is not sufficient to ensure a high level of information security pol...
The study of employees’ intention to comply with information security policies in higher education i...
In recent years, many health care organizations have begun to take advantage of computerized informa...