Organizational cybersecurity is threatened by increasingly sophisticated cyberattacks. Early detection of such threats is paramount to ensure organizations’ welfare. Particularly for advanced cyberattacks, such as spear phishing, human perception can complement or even outperform technical detection procedures. However, employees’ usage of reporting tools is scarce. Whereas prior cybersecurity literature has limited its scope to utilitarian motives, we specifically take hedonic motives in the form of warm glow into account to provide a more nuanced understanding of cyber incident reporting behavior. Drawing on a vignette experiment, we test how the design features of report reasoning and risk indication impact users’ reporting tool acceptan...
The present study explored the relationship between risky cybersecurity behaviours, attitudes toward...
Our understanding of the defense mechanisms against cyber-attacks is, to a great extent, based on pr...
As technology and digital applications increase in volume and complexity, organization is facing gre...
With computers being a standard part of life now with the evolution of the internet, many aspects of...
Due to a massive rise in data breaches caused by negligent information systems users, organizations ...
Cyber crime is rising at an unprecedented rate. Organisations are spending more than ever combating ...
Phishing, as a social engineering attack has become an increasing threat to organizations in cybersp...
This paper identifies opportunities for potential theoretical and practical improvements in employee...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
Information security has for long time been a field of study in computer science, software engineeri...
As implementation of computer systems has continued to grow in business contexts, employee-driven cy...
This paper is primarily intended to firstly define and review the literature in cybersecurity and vi...
Cyber exploitation and malicious activities have become more sophisticated. Insider threat is one of...
Information security has for long time been a field of study in computer science, software engineeri...
Despite increased awareness of cybersecurity incidents and consequences, organisations still struggl...
The present study explored the relationship between risky cybersecurity behaviours, attitudes toward...
Our understanding of the defense mechanisms against cyber-attacks is, to a great extent, based on pr...
As technology and digital applications increase in volume and complexity, organization is facing gre...
With computers being a standard part of life now with the evolution of the internet, many aspects of...
Due to a massive rise in data breaches caused by negligent information systems users, organizations ...
Cyber crime is rising at an unprecedented rate. Organisations are spending more than ever combating ...
Phishing, as a social engineering attack has become an increasing threat to organizations in cybersp...
This paper identifies opportunities for potential theoretical and practical improvements in employee...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
Information security has for long time been a field of study in computer science, software engineeri...
As implementation of computer systems has continued to grow in business contexts, employee-driven cy...
This paper is primarily intended to firstly define and review the literature in cybersecurity and vi...
Cyber exploitation and malicious activities have become more sophisticated. Insider threat is one of...
Information security has for long time been a field of study in computer science, software engineeri...
Despite increased awareness of cybersecurity incidents and consequences, organisations still struggl...
The present study explored the relationship between risky cybersecurity behaviours, attitudes toward...
Our understanding of the defense mechanisms against cyber-attacks is, to a great extent, based on pr...
As technology and digital applications increase in volume and complexity, organization is facing gre...