The purpose of this paper is to investigate the effect of internal motivators (psychological ownership, perceived control, and self-efficacy) on employees’ intention to protect organizational data. The threat of cybersecurity breaches is increasing, as are the realization of cybersecurity breaches and the subsequent loss of data. While information security policies increase employees’ intentions to protect organizational data, they do not guarantee employee compliance. Results indicate that self-efficacy is associated with perceived control, which, in turn, is associated with perceived psychological ownership of organizational data. Furthermore, self-efficacy and psychological ownership are both associated with an increase in intention to p...
Currently, information security policy compliance research mainly investigates information security ...
Incidents of computer abuse, proprietary information leaks and other security lapses have been on an...
Employees’ lack of compliance with password policies increases password susceptibility, which leads ...
The ever rising rates of data generation entail new opportunities for business and society but also ...
Information security policy effectiveness relies on how well an individual employee can follow the s...
Computer security has become increasingly important to organizations as the number of security incid...
Employees ’ failures to follow information security policy can be costly to organizations. Organizat...
Securing one’s data and protecting important information from various security threats are essential...
The growing number of security breaches has become a major concern in organisations. Most often, suc...
Employees' failures to follow information security policy can be costly to organizations, causing or...
© 2015 Taylor & Francis Group, LLC.Insiders may act to sustain and improve organizational informatio...
Businesses around the world have experienced unprecedented incidents and losses related to informati...
Employee noncompliance with Information Systems security policies is a serious computer security thr...
Prior information security research establishes the need to investigate the informal factors that in...
Research identifies employees as the weakest link in data security. Determining what characteristics...
Currently, information security policy compliance research mainly investigates information security ...
Incidents of computer abuse, proprietary information leaks and other security lapses have been on an...
Employees’ lack of compliance with password policies increases password susceptibility, which leads ...
The ever rising rates of data generation entail new opportunities for business and society but also ...
Information security policy effectiveness relies on how well an individual employee can follow the s...
Computer security has become increasingly important to organizations as the number of security incid...
Employees ’ failures to follow information security policy can be costly to organizations. Organizat...
Securing one’s data and protecting important information from various security threats are essential...
The growing number of security breaches has become a major concern in organisations. Most often, suc...
Employees' failures to follow information security policy can be costly to organizations, causing or...
© 2015 Taylor & Francis Group, LLC.Insiders may act to sustain and improve organizational informatio...
Businesses around the world have experienced unprecedented incidents and losses related to informati...
Employee noncompliance with Information Systems security policies is a serious computer security thr...
Prior information security research establishes the need to investigate the informal factors that in...
Research identifies employees as the weakest link in data security. Determining what characteristics...
Currently, information security policy compliance research mainly investigates information security ...
Incidents of computer abuse, proprietary information leaks and other security lapses have been on an...
Employees’ lack of compliance with password policies increases password susceptibility, which leads ...