As organizations have become more dependent on networked information systems (IS) to conduct their business operations, their susceptibility to various threats to information security has also increased. Research has consistently identified the inappropriate security behavior of the users as the most significant of these threats. Various factors have been identified in prior research as contributing to these inappropriate security behaviors, however, not enough is known about the role of social factors in mediating these behaviors. This study developed a new Computer Security Self-Efficacy (CSSE) construct, identified 35 highly reliable items of CSSE in the context of individuals’ use of encrypted e-mail, and identified four significant fac...
Considering the growing number of cyber threats in the United States on a daily basis, there is a tr...
Users do often not behave securely when using information technology. Many studies have tried to ide...
The increasing frequency of security incidents is a major concern to organizations, and it is theref...
As organizations have become more dependent on networked information systems (IS) to conduct their b...
As organizations have become more dependent on networked information systems (IS) to conduct their b...
Given a paucity of research and apparent lack of coherence in information system research, it seems ...
Given an apparent lack of coherence and a paucity of computer system field of studies, research imit...
Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments a...
Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments a...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...
Past research on Self-efficacy in information security gives clues about the failure of individuals ...
A survey of IT professionals suggested that despite technological advancement and organizational pro...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
This study used a cross-sectional survey to test the relationships among social cognitive variables ...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Considering the growing number of cyber threats in the United States on a daily basis, there is a tr...
Users do often not behave securely when using information technology. Many studies have tried to ide...
The increasing frequency of security incidents is a major concern to organizations, and it is theref...
As organizations have become more dependent on networked information systems (IS) to conduct their b...
As organizations have become more dependent on networked information systems (IS) to conduct their b...
Given a paucity of research and apparent lack of coherence in information system research, it seems ...
Given an apparent lack of coherence and a paucity of computer system field of studies, research imit...
Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments a...
Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments a...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...
Past research on Self-efficacy in information security gives clues about the failure of individuals ...
A survey of IT professionals suggested that despite technological advancement and organizational pro...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
This study used a cross-sectional survey to test the relationships among social cognitive variables ...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
Considering the growing number of cyber threats in the United States on a daily basis, there is a tr...
Users do often not behave securely when using information technology. Many studies have tried to ide...
The increasing frequency of security incidents is a major concern to organizations, and it is theref...