Protecting organizational information is a top priority for most firms. This reality, coupled with the fact that organizational insiders control much of their organizations’ valuable information, has led both researchers and practitioners to acknowledge the importance of insiders’ behavior for information security. Until recently, researchers have employed only a few theories to understand these influences, and this has generated calls for a broadened theoretical repertoire. Given this opportunity, we incorporate the previously developed framework of emotions and add the broaden-and-build theory (BBT) to understand the influence of discrete positive and negative emotions on insiders’ precaution-taking activities. Our findings demonstrate th...
Traditional insider threat practices involve negative incentives that attempt to force employees to ...
This paper investigates how individuals cope with IT security threats by taking into account both pr...
This paper investigates how individuals cope with IT security threats by taking into account both pr...
This study explores the relationship between positive emotions and protection-motivated behaviours b...
Advancements in social media have complicated issues of unauthorized disclosure of organizational in...
© 2015 Taylor & Francis Group, LLC.Insiders may act to sustain and improve organizational informatio...
This dissertation research seeks to examine the role of organizational insiders\u27 psychological ca...
Employees continue to be the weak link in organizational security management and efforts to im-prove...
Individual users can create vulnerabilities in an organization’s information security by carelessnes...
Although much attention has been devoted to understanding employee resistance to change, relatively ...
In an organizational context, individuals are prone to feel stressed by overwhelming and complicated...
This research examined the role trait affect, a lifelong and generally stable type of affect, has on...
In recent years, organisations have been exposed to unprecedented levels of security breaches leadin...
The purpose of this paper is to investigate the effect of internal motivators (psychological ownersh...
Information system security literature has primarily focused on cognitive processes and their impact...
Traditional insider threat practices involve negative incentives that attempt to force employees to ...
This paper investigates how individuals cope with IT security threats by taking into account both pr...
This paper investigates how individuals cope with IT security threats by taking into account both pr...
This study explores the relationship between positive emotions and protection-motivated behaviours b...
Advancements in social media have complicated issues of unauthorized disclosure of organizational in...
© 2015 Taylor & Francis Group, LLC.Insiders may act to sustain and improve organizational informatio...
This dissertation research seeks to examine the role of organizational insiders\u27 psychological ca...
Employees continue to be the weak link in organizational security management and efforts to im-prove...
Individual users can create vulnerabilities in an organization’s information security by carelessnes...
Although much attention has been devoted to understanding employee resistance to change, relatively ...
In an organizational context, individuals are prone to feel stressed by overwhelming and complicated...
This research examined the role trait affect, a lifelong and generally stable type of affect, has on...
In recent years, organisations have been exposed to unprecedented levels of security breaches leadin...
The purpose of this paper is to investigate the effect of internal motivators (psychological ownersh...
Information system security literature has primarily focused on cognitive processes and their impact...
Traditional insider threat practices involve negative incentives that attempt to force employees to ...
This paper investigates how individuals cope with IT security threats by taking into account both pr...
This paper investigates how individuals cope with IT security threats by taking into account both pr...