Purpose The purpose of this research is to explain the influence of information security monitoring and other social learning factors on employees’ security assurance behaviour. Security assurance behaviour represents employees’ intentional and effortful actions aimed towards protecting information systems. The behaviour is highly desired as it tackles the human factor within the information security framework. The authors posited that security assurance behaviour is a learned behaviour that can be enhanced by the implementation of information security monitoring. Design/methodology/approach Theoretical framework underlying this study with six constructs, namely, subjective norm, outcome expectation, information security monitoring, in...
Information Security has become a significant concern for today’s organizations. The internal securi...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...
Information security attacks typically exploit the weakest link in the chain, which is in most cases...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
Large-scale data losses experienced across both public and private sector organisations have led to ...
The Internet and information technology have influenced human life significantly. However, informati...
Security breaches have attracted corporate attention and major organisations are now determined to s...
The key threat to information security comes from employees who do not comply with information secur...
Information security awareness (ISA) is referred to as a state of consciousness and knowledge about ...
The growing number of information security breaches in organisations presents a serious risk to the ...
Information security embodies the complex interaction between security policies, user perceptions of...
Employees’ information security awareness (ISA) is a key antecedent of information security behavior...
Information Technology transformed the way people executed their tasks at work. With the information...
Information Security has become a significant concern for today\u27s organizations. The internal sec...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
Information Security has become a significant concern for today’s organizations. The internal securi...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...
Information security attacks typically exploit the weakest link in the chain, which is in most cases...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
Large-scale data losses experienced across both public and private sector organisations have led to ...
The Internet and information technology have influenced human life significantly. However, informati...
Security breaches have attracted corporate attention and major organisations are now determined to s...
The key threat to information security comes from employees who do not comply with information secur...
Information security awareness (ISA) is referred to as a state of consciousness and knowledge about ...
The growing number of information security breaches in organisations presents a serious risk to the ...
Information security embodies the complex interaction between security policies, user perceptions of...
Employees’ information security awareness (ISA) is a key antecedent of information security behavior...
Information Technology transformed the way people executed their tasks at work. With the information...
Information Security has become a significant concern for today\u27s organizations. The internal sec...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
Information Security has become a significant concern for today’s organizations. The internal securi...
Purpose The aim of this study is to encourage management boards to recognize that employees play a m...
Information security attacks typically exploit the weakest link in the chain, which is in most cases...