Employees continue to be the weakest link in an organizational security ecosystem, exposing organizational assets through carelessness, malicious threats, or apathy towards security policies. Security-related decision making is a complex process that is driven by an individual’s risk perception, self-efficacy, and their propensity to accept risks. Existing behavioral security re-search on user security behavior is rooted in models based on rational choice theory such as protection motivation theory and deterrence theory, both of which focus on using fear appeals and punishments to prompt desired security behavior. Recent research on human rationality suggests that security-related decision making is far more complex and nuanced, not a simpl...
Increasing the number of security breaches caused by humans, scholars are interested in exploring co...
The introduction of the Internet to the business world has changed many ways of doing business. Unfo...
Previous studies show that information security breaches and privacy violations are important issues...
Employees continue to be the weak link in organizational security management and efforts to improve ...
Employees continue to be the weak link in organizational security management and efforts to im-prove...
Extant work has examined users’ security behavior in both individual and organizational contexts by ...
Computer security has become increasingly important to organizations as the number of security incid...
IS users and organizations must take necessary measures to adequately cope with security threats. Co...
In the modern networked world, replete with massive amounts of data, one of the greatest threats fac...
Computer offences and crimes against corporate computer systems have increasingly become a major cha...
IT users often make information security-related decisions in complex and multidimensional environme...
Employees\u27 noncompliance with information security policy and rules is a serious impediment to th...
Security policy-makers (influencers) in an organization set security policies that embody intended b...
Item does not contain fulltextSecurity professionals play a decisive role in security risk decision ...
Computer offences and crimes against corporate computer systems have increasingly become a major cha...
Increasing the number of security breaches caused by humans, scholars are interested in exploring co...
The introduction of the Internet to the business world has changed many ways of doing business. Unfo...
Previous studies show that information security breaches and privacy violations are important issues...
Employees continue to be the weak link in organizational security management and efforts to improve ...
Employees continue to be the weak link in organizational security management and efforts to im-prove...
Extant work has examined users’ security behavior in both individual and organizational contexts by ...
Computer security has become increasingly important to organizations as the number of security incid...
IS users and organizations must take necessary measures to adequately cope with security threats. Co...
In the modern networked world, replete with massive amounts of data, one of the greatest threats fac...
Computer offences and crimes against corporate computer systems have increasingly become a major cha...
IT users often make information security-related decisions in complex and multidimensional environme...
Employees\u27 noncompliance with information security policy and rules is a serious impediment to th...
Security policy-makers (influencers) in an organization set security policies that embody intended b...
Item does not contain fulltextSecurity professionals play a decisive role in security risk decision ...
Computer offences and crimes against corporate computer systems have increasingly become a major cha...
Increasing the number of security breaches caused by humans, scholars are interested in exploring co...
The introduction of the Internet to the business world has changed many ways of doing business. Unfo...
Previous studies show that information security breaches and privacy violations are important issues...