K Padayachee - Computers & Security, 2012 - Elsevier
This paper aims at surveying the extrinsic and intrinsic motivations that influence the propensity toward compliant information security behavior. Information security behavior …
A da Veiga, N Martins - Computers & Security, 2017 - Elsevier
When considering an information security culture in an organisation, researchers have to consider the possibility of several information security subcultures that could be present in …
NHA Rahim, S Hamid, ML Mat Kiah, S Shamshirband… - Kybernetes, 2015 - emerald.com
Purpose–The purpose of this paper is to survey, explore and inform researchers about the previous methodologies applied, target audience and coverage of previous assessment of …
A Das, HU Khan - Information & Computer Security, 2016 - emerald.com
Purpose–This paper aims to report on the information security behaviors of smartphone users in an affluent economy of the Middle East. Design/methodology/approach–A model …
Employees' poor compliance with information security policies is a perennial problem. Current information security analysis methods do not allow information security managers to …
Managing information security in Information Technology (IT) outsourcing is important. We conduct a Delphi Study to identify key information security concerns in IT outsourcing. A …
As technology such as the Internet, computers and mobile devices become ubiquitous throughout society, the need to ensure our information remains secure is imperative …
The pressure on software developers to produce secure software has never been greater. But what does security look like in environments that do not produce security-critical …
M Alotaibi, S Furnell, N Clarke - 2016 11th International …, 2016 - ieeexplore.ieee.org
Organisations increasingly perceive their employees as a great asset that needs to be cared for; however, at the same time, they view employees as one of the biggest potential threats …