Why do some employees go out of their way to follow prescribed information security protocols, while others all but ignore organizational information security measures? A body of research known as organizational citizenship behavior provides insight into this issue. Theories of organizational citizenship behavior draw mainly from the psychological and sociological disciplines. They are used to explain the behaviors of employees who act in the best interest of the company, even when they don’t have to. Examples of citizenship behaviors include information sharing, voluntary reduction of compensation, and relinquishment of power for the benefit of the organization (Nathanson & Becker 1973). Although organizational citizenship behavior has see...
The body of research that focuses on employees’ information Security Policy compliance is problemati...
The key threat to information security comes from employees who do not comply with information secur...
Since organizational information security policies can only improve security if employees comply wit...
Information security is one of the major challenges for organizations that critically depend on info...
Many organizations recognize that their employees, who are often considered the weakest link in info...
User non-compliance with information security policies in organizations due to negligence or ignoran...
Information security policy compliance requires commitment both from organizations and their employe...
The Internet and information technology have influenced human life significantly. However, informati...
The focus of information security has traditionally been on technological issues, and organizations ...
It has been argued that organizational punishment serves as a deterrent to unwanted employee behavio...
Aspects of information security is not sufficient to ensure a high level of information security pol...
The increase reliance on information systems has created unprecedented challenges for organizations ...
Ph.D. University of Hawaii at Manoa 2013.Includes bibliographical references.Information and informa...
This study addresses the security of information systems (ISS) as one of the most important issues i...
Most recent information security incidents have been caused by employees’ poor managements rather th...
The body of research that focuses on employees’ information Security Policy compliance is problemati...
The key threat to information security comes from employees who do not comply with information secur...
Since organizational information security policies can only improve security if employees comply wit...
Information security is one of the major challenges for organizations that critically depend on info...
Many organizations recognize that their employees, who are often considered the weakest link in info...
User non-compliance with information security policies in organizations due to negligence or ignoran...
Information security policy compliance requires commitment both from organizations and their employe...
The Internet and information technology have influenced human life significantly. However, informati...
The focus of information security has traditionally been on technological issues, and organizations ...
It has been argued that organizational punishment serves as a deterrent to unwanted employee behavio...
Aspects of information security is not sufficient to ensure a high level of information security pol...
The increase reliance on information systems has created unprecedented challenges for organizations ...
Ph.D. University of Hawaii at Manoa 2013.Includes bibliographical references.Information and informa...
This study addresses the security of information systems (ISS) as one of the most important issues i...
Most recent information security incidents have been caused by employees’ poor managements rather th...
The body of research that focuses on employees’ information Security Policy compliance is problemati...
The key threat to information security comes from employees who do not comply with information secur...
Since organizational information security policies can only improve security if employees comply wit...