Extant work has examined users’ security behavior in both individual and organizational contexts by mainly applying theories that assume users’ rationality. While this has enhanced our understanding of the conscious factors that underlie security behaviors, the assumption of conscious rationality bounds the theoretical lens. Addressing this limitation would facilitate expanding the knowledge ecology in the information security literature. Information security studies have started to recognize this assumption. To evaluate this milieu of disparate approaches, we conduct a preliminary literature review and identify several nonconscious factors that may shape security behaviors. In this ERF paper, we discuss herd behavior, cognitive biases, aut...
Computer offences and crimes against corporate computer systems have increasingly become a major cha...
Abstract Purpose This paper aims to investigate the influence of moral disengagement, perceived pe...
The increased amount of attacks targeting humans accessing and using computers has made it significa...
IS users and organizations must take necessary measures to adequately cope with security threats. Co...
In the modern networked world, replete with massive amounts of data, one of the greatest threats fac...
Employees continue to be the weakest link in an organizational security ecosystem, exposing organiza...
Employees continue to be the weak link in organizational security management and efforts to improve ...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
IT users often make information security-related decisions in complex and multidimensional environme...
Inadvertent and Irrational human errors (e.g., clicking on phishing emails) have been the primary ca...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
This study presents an extensive literature review on information security behavior in the context o...
Security breaches of digital information represent a significant threat to the wellbeing of individu...
Computer offences and crimes against corporate computer systems have increasingly become a major cha...
Most current information systems security theories assume a rational actor making deliberate decisio...
Computer offences and crimes against corporate computer systems have increasingly become a major cha...
Abstract Purpose This paper aims to investigate the influence of moral disengagement, perceived pe...
The increased amount of attacks targeting humans accessing and using computers has made it significa...
IS users and organizations must take necessary measures to adequately cope with security threats. Co...
In the modern networked world, replete with massive amounts of data, one of the greatest threats fac...
Employees continue to be the weakest link in an organizational security ecosystem, exposing organiza...
Employees continue to be the weak link in organizational security management and efforts to improve ...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
IT users often make information security-related decisions in complex and multidimensional environme...
Inadvertent and Irrational human errors (e.g., clicking on phishing emails) have been the primary ca...
Aim: The aim was to introduce new explanatory construct, namely illegitimate tasks from Stress-as-Of...
This study presents an extensive literature review on information security behavior in the context o...
Security breaches of digital information represent a significant threat to the wellbeing of individu...
Computer offences and crimes against corporate computer systems have increasingly become a major cha...
Most current information systems security theories assume a rational actor making deliberate decisio...
Computer offences and crimes against corporate computer systems have increasingly become a major cha...
Abstract Purpose This paper aims to investigate the influence of moral disengagement, perceived pe...
The increased amount of attacks targeting humans accessing and using computers has made it significa...