Connecting mindfulness with organizational information security (InfoSec) is an increasingly attractive research topic. This paper conceptualizes InfoSec mindfulness as a dynamic InfoSec-specific trait evident when handling organizational information assets. We investigate the motivational factors that contribute to InfoSec mindfulness and the effects of InfoSec mindfulness on employees’ proactive extra-role information security behaviors (ISBs), which refers to self-initiated and future-oriented behaviors that go beyond an organization’s information security policies (ISPs) and are independent on rewards or punishments. This paper provides significant theoretical contributions to InfoSec behavioral literature by conceptualizing InfoSec min...
The behaviour of employees has been identified as a key factor in the protection of organizational i...
Today, the Internet can be considered to be a basic commodity, similar to electricity, without which...
Living in a digital age, where all kinds of information are accessible electronically at all times, ...
Although prior information security research predominantly focuses on organizational in-role securit...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
Although there are numerous explanations of why users behave in specific ways toward information tec...
Cyberloafing is a routine workplace deviant behavior that may impose potential security threats. Pri...
In today’s digital age, in which all kinds of information can be accessed electronically at all time...
Extra-role security behavior has been recognized as a salient element of information security. Drawi...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...
Information security policies are (ISP) used to guide employees in order to ensure information secur...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
Many of the information systems (IS) security breaches in organizations can be attributed to the sec...
Extra-role security behaviors (ERSBs) – spontaneous security behaviors that are not prescribed in or...
Incidents of computer abuse, proprietary information leaks and other security lapses have been on an...
The behaviour of employees has been identified as a key factor in the protection of organizational i...
Today, the Internet can be considered to be a basic commodity, similar to electricity, without which...
Living in a digital age, where all kinds of information are accessible electronically at all times, ...
Although prior information security research predominantly focuses on organizational in-role securit...
In this paper, we present a social/behavioral meta-study of good corporate information security prac...
Although there are numerous explanations of why users behave in specific ways toward information tec...
Cyberloafing is a routine workplace deviant behavior that may impose potential security threats. Pri...
In today’s digital age, in which all kinds of information can be accessed electronically at all time...
Extra-role security behavior has been recognized as a salient element of information security. Drawi...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...
Information security policies are (ISP) used to guide employees in order to ensure information secur...
There is a great concern when it comes to the investigation of the parameters that affect the formul...
Many of the information systems (IS) security breaches in organizations can be attributed to the sec...
Extra-role security behaviors (ERSBs) – spontaneous security behaviors that are not prescribed in or...
Incidents of computer abuse, proprietary information leaks and other security lapses have been on an...
The behaviour of employees has been identified as a key factor in the protection of organizational i...
Today, the Internet can be considered to be a basic commodity, similar to electricity, without which...
Living in a digital age, where all kinds of information are accessible electronically at all times, ...