Employees’ compliance with Information Systems Security Policies (ISP) is critical for protecting organizational data. Both the technical side and the social aspects of IT-use were shown to have significant influence on ISP-compliance. However, they have been mostly studied in isolation, despite the literature’s emphasis on the socio-technical nature of security. Also, while the technical side has been extensively explored, there is a scarcity of research on the social mechanisms that underlie ISP-compliance. Here, we aim at bridging the gap between the technical and social sides of compliance. We also build upon Social Impact Theory to provide a more nuanced understanding of the social influence on ISP-compliance. We suggest that transpare...
Information security is one of the organizations\u27 top agendas worldwide. Similarly, there is a gr...
Information security is one of the organizations\u27 top agendas worldwide. Similarly, there is a gr...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...
Employees’ compliance with Information Systems Security Policies (ISP) is critical for protecting or...
In the face of ever-growing IS-security breaches and their substantial impacts on organizations and ...
Information security in an organization largely depends on employee compliance with information secu...
Recent research on information security has recognized that cultural differences need to be consider...
Protection of data and information security are crucial to business processes and include technical,...
Information security policy compliance (ISP) is one of the key concerns that face organizations toda...
The adherence of employees towards Information Security Policy (ISP) established in the organization...
Organizations continually experience losses, financial and otherwise, due to non-compliant behav- io...
The increase reliance on information systems has created unprecedented challenges for organizations ...
Information security is one of the organizations' top agendas worldwide. Similarly, there is a growi...
Information security is one of the organizations' top agendas worldwide. Similarly, there is a growi...
This paper is an attempt to develop a model that explores the factors that affect the frequency of v...
Information security is one of the organizations\u27 top agendas worldwide. Similarly, there is a gr...
Information security is one of the organizations\u27 top agendas worldwide. Similarly, there is a gr...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...
Employees’ compliance with Information Systems Security Policies (ISP) is critical for protecting or...
In the face of ever-growing IS-security breaches and their substantial impacts on organizations and ...
Information security in an organization largely depends on employee compliance with information secu...
Recent research on information security has recognized that cultural differences need to be consider...
Protection of data and information security are crucial to business processes and include technical,...
Information security policy compliance (ISP) is one of the key concerns that face organizations toda...
The adherence of employees towards Information Security Policy (ISP) established in the organization...
Organizations continually experience losses, financial and otherwise, due to non-compliant behav- io...
The increase reliance on information systems has created unprecedented challenges for organizations ...
Information security is one of the organizations' top agendas worldwide. Similarly, there is a growi...
Information security is one of the organizations' top agendas worldwide. Similarly, there is a growi...
This paper is an attempt to develop a model that explores the factors that affect the frequency of v...
Information security is one of the organizations\u27 top agendas worldwide. Similarly, there is a gr...
Information security is one of the organizations\u27 top agendas worldwide. Similarly, there is a gr...
Compliance and systems misuse has been the focus of researchers in the last couple of years. However...