Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

Information security awareness and behavior: a theory-based literature review

B Lebek, J Uffen, M Neumann, B Hohler… - Management …, 2014 - emerald.com
Purpose–This paper aims to provide an overview of theories used in the field of employees'
information systems (IS) security behavior over the past decade. Research gaps and …

Health information privacy concerns, antecedents, and information disclosure intention in online health communities

X Zhang, S Liu, X Chen, L Wang, B Gao… - Information & Management, 2018 - Elsevier
This study explores the antecedents and consequences of health information privacy
concerns in online health communities by integrating the dual calculus and protection …

Understanding employee responses to stressful information security requirements: A coping perspective

J D'Arcy, T Herath, MK Shoss - Journal of management information …, 2014 - Taylor & Francis
We use coping theory to explore an underlying relationship between employee stress
caused by burdensome, complex, and ambiguous information security requirements …

What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors

SR Boss, DF Galletta, PB Lowry, GD Moody, P Polak - MIS quarterly, 2015 - JSTOR
Because violations of information security (ISec) and privacy have become ubiquitous in
both personal and work environments, academic attention to ISec and privacy has taken on …

Understanding online safety behaviors: A protection motivation theory perspective

HS Tsai, M Jiang, S Alhabash, R LaRose, NJ Rifon… - Computers & …, 2016 - Elsevier
Internet users experience a variety of online security threats that require them to enact safety
precautions. Protection motivation theory (PMT) provides a theoretical framework for …

Mobile banking services adoption in Pakistan: are there gender differences?

R Glavee-Geo, AA Shaikh, H Karjaluoto - International Journal of bank …, 2017 - emerald.com
Purpose The purpose of this paper is to provide a comprehensive insight into the deciding
factors affecting an individual's intention to adopt mobile banking (m-banking) services in …

[HTML][HTML] What users do besides problem-focused coping when facing IT security threats: An emotion-focused coping perspective

H Liang, Y Xue, A Pinsonneault, YA Wu - MIS quarterly, 2019 - dl.acm.org
This paper investigates how individuals cope with IT security threats by taking into account
both problem-focused and emotion-focused coping. While problem-focused coping (PFC) …

“Security begins at home”: Determinants of home computer and mobile device security behavior

N Thompson, TJ McGill, X Wang - computers & security, 2017 - Elsevier
Personal computing users are vulnerable to information security threats, as they must
independently make decisions about how to protect themselves, often with little …

[HTML][HTML] A comprehensive model of information security factors for decision-makers

R Diesch, M Pfaff, H Krcmar - Computers & Security, 2020 - Elsevier
Decision-making in the context of organizational information security is highly dependent on
various information. For information security managers, not only relevant information has to …