Recent studies raise the concern that the regular communication of security guidelines and policies and their updates is not always the best option for organizations to protect information system's security. Users show symptoms of being frustrated or overwhelmed by security guidelines and consequently either ignore policies or actively pursue workarounds. Our aim is first, to understand the affective states of employees being confronted with security-related guidelines and the reasons for negative emotions. Second, we develop a communication strategy for security policies that avoids negative affective states and reduces the chance of security policies being ignored or worked around to foster compliance. In this paper, we introduce a framew...
Tam, C., Conceição, C. D. M., & Oliveira, T. (2022). What influences employees to follow security po...
This study examines why and how do employees experience SRS affect both affective and cognitive appr...
Currently, information security policy compliance research mainly investigates information security ...
Recent studies raise the concern that the regular communication of security guidelines and policies ...
We use coping theory to explore an underlying relationship between employee stress caused by burdens...
The key threat to information security comes from employees who do not comply with information secur...
Ph.D. University of Hawaii at Manoa 2013.Includes bibliographical references.Information and informa...
Information system security literature has primarily focused on cognitive processes and their impact...
The purpose of this study is to methodologically replicate the model presented by D’Arcy et al. (201...
The authors found the behavioral factors that influence the organization members’ compliance with th...
The human is frequently referred to as the weakest link of security. Employees who engage in behavio...
Dissertation presented as the partial requirement for obtaining a Master's degree in Information Man...
Aspects of information security is not sufficient to ensure a high level of information security pol...
The Internet and information technology have influenced human life significantly. However, informati...
The security of information systems is one of the most important challenges for today's organization...
Tam, C., Conceição, C. D. M., & Oliveira, T. (2022). What influences employees to follow security po...
This study examines why and how do employees experience SRS affect both affective and cognitive appr...
Currently, information security policy compliance research mainly investigates information security ...
Recent studies raise the concern that the regular communication of security guidelines and policies ...
We use coping theory to explore an underlying relationship between employee stress caused by burdens...
The key threat to information security comes from employees who do not comply with information secur...
Ph.D. University of Hawaii at Manoa 2013.Includes bibliographical references.Information and informa...
Information system security literature has primarily focused on cognitive processes and their impact...
The purpose of this study is to methodologically replicate the model presented by D’Arcy et al. (201...
The authors found the behavioral factors that influence the organization members’ compliance with th...
The human is frequently referred to as the weakest link of security. Employees who engage in behavio...
Dissertation presented as the partial requirement for obtaining a Master's degree in Information Man...
Aspects of information security is not sufficient to ensure a high level of information security pol...
The Internet and information technology have influenced human life significantly. However, informati...
The security of information systems is one of the most important challenges for today's organization...
Tam, C., Conceição, C. D. M., & Oliveira, T. (2022). What influences employees to follow security po...
This study examines why and how do employees experience SRS affect both affective and cognitive appr...
Currently, information security policy compliance research mainly investigates information security ...