Organizations have become increasingly concerned with developing and protecting their information security systems. Despite attempts to secure the information infrastructure, employees inside of organizations remain the largest source of threat to information cyber-security. While previous research has focused on behavioral and situational factors that influence cyber-security behaviors, the measurement of cyber behaviors and their relationship to other performance variables is poorly understood. The purpose of the present study is to 1) determine the underlying factor structure of a cyber-security behavior scale, 2) assess if individual personality traits predict four types of cyber-security behaviors: security assurance, security complian...
Cyber and information security (CIS) is an issue of national and international interest. Despite sop...
As implementation of computer systems has continued to grow in business contexts, employee-driven cy...
Executives ’ behavior causes potential information security management risks and has a direct influe...
Organizations have become increasingly concerned with developing and protecting their information se...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
The information security community has come to realize that the weakest link in a cybersecurity chai...
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Intern...
A survey of IT professionals suggested that despite technological advancement and organizational pro...
Human behavior inside organizations is considered to be the main threat to organizations. Prior rese...
Information security is of vital importance to organizations. Breaches in security very often stem f...
With society now heavily invested in cyber-technology and most cyber-attacks due to human error, it ...
As organizations have become more reliant on computers and technology to operate in a globalized wor...
Lecture Notes in Computer Science, vol 9190Information Security professionals have been attempting t...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Research identifies employees as the weakest link in data security. Determining what characteristics...
Cyber and information security (CIS) is an issue of national and international interest. Despite sop...
As implementation of computer systems has continued to grow in business contexts, employee-driven cy...
Executives ’ behavior causes potential information security management risks and has a direct influe...
Organizations have become increasingly concerned with developing and protecting their information se...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
The information security community has come to realize that the weakest link in a cybersecurity chai...
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Intern...
A survey of IT professionals suggested that despite technological advancement and organizational pro...
Human behavior inside organizations is considered to be the main threat to organizations. Prior rese...
Information security is of vital importance to organizations. Breaches in security very often stem f...
With society now heavily invested in cyber-technology and most cyber-attacks due to human error, it ...
As organizations have become more reliant on computers and technology to operate in a globalized wor...
Lecture Notes in Computer Science, vol 9190Information Security professionals have been attempting t...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Research identifies employees as the weakest link in data security. Determining what characteristics...
Cyber and information security (CIS) is an issue of national and international interest. Despite sop...
As implementation of computer systems has continued to grow in business contexts, employee-driven cy...
Executives ’ behavior causes potential information security management risks and has a direct influe...