Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments and organizations all over the world. Intentional and unintentional users’ misuse of information systems (IS) resources represents 50% to 75% of cybersecurity threats. Computer Crime and Security Survey revealed that nearly 60% of security breaches occurred from inside the organization by authorized users. Computer users are deemed as one of the weakest links in the IS security chain. In this study, we examined the effect of user computer self-efficacy (CSE), cybersecurity countermeasures awareness (CCA), and cybersecurity skills (CS) on users’ computer misuse intention (CMI) at a government agency. Our results show that the factor of users’ a...
Information security has for long time been a field of study in computer science, software engineeri...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...
Information security has for long time been a field of study in computer science, software engineeri...
Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments a...
Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments a...
As organizations have become more dependent on networked information systems (IS) to conduct their b...
The main goal of this research study is to empirically assess the contributions of a supervisor’s cy...
As organizations have become more dependent on networked information systems (IS) to conduct their b...
As organizations have become more dependent on networked information systems (IS) to conduct their b...
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significa...
Cybersecurity threat is one of the major national security challenges confronting the United States,...
A survey of IT professionals suggested that despite technological advancement and organizational pro...
While computer technology is generally intended to increase employee productivity and effectiveness ...
Cybersecurity threat is a critical national security problem facing the United States. In order to e...
Information Technology transformed the way people executed their tasks at work. With the information...
Information security has for long time been a field of study in computer science, software engineeri...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...
Information security has for long time been a field of study in computer science, software engineeri...
Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments a...
Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments a...
As organizations have become more dependent on networked information systems (IS) to conduct their b...
The main goal of this research study is to empirically assess the contributions of a supervisor’s cy...
As organizations have become more dependent on networked information systems (IS) to conduct their b...
As organizations have become more dependent on networked information systems (IS) to conduct their b...
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significa...
Cybersecurity threat is one of the major national security challenges confronting the United States,...
A survey of IT professionals suggested that despite technological advancement and organizational pro...
While computer technology is generally intended to increase employee productivity and effectiveness ...
Cybersecurity threat is a critical national security problem facing the United States. In order to e...
Information Technology transformed the way people executed their tasks at work. With the information...
Information security has for long time been a field of study in computer science, software engineeri...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...
Information security has for long time been a field of study in computer science, software engineeri...