Seeing the forest and the trees

WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - JSTOR
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …

“Security begins at home”: Determinants of home computer and mobile device security behavior

N Thompson, TJ McGill, X Wang - computers & security, 2017 - Elsevier
Personal computing users are vulnerable to information security threats, as they must
independently make decisions about how to protect themselves, often with little …

[PDF][PDF] An empirical assessment of cybersecurity readiness and resilience in small businesses

D Eilts - 2020 - core.ac.uk
This chapter comprises a review of the relevant research studies pertaining to cybersecurity
readiness and resilience in small businesses. The purpose of this literature review is to …

Short-term and long-term effects of fear appeals in improving compliance with password guidelines

F Mwagwabi, T McGill, M Dixon - Communications of the …, 2018 - aisel.aisnet.org
Passwords are the most widely used method of authentication on the Internet, but users find
compliance with password guidelines difficult, and we know little about the long-term effects …

Analyzing home PC security adoption behavior

CL Claar, J Johnson - Journal of Computer Information Systems, 2012 - Taylor & Francis
The home Internet user faces a hostile environment abundant in potential attacks on their
computers. These attacks have been increasing at an alarming rate and cause damage to …

Empirical assessment of mobile device users' information security behavior towards data breach: Leveraging protection motivation theory

AD Giwah, L Wang, Y Levy, I Hur - Journal of Intellectual Capital, 2020 - emerald.com
Purpose The purpose of this paper is to investigate the information security behavior of
mobile device users in the context of data breach. Much of the previous research done in …

Improving compliance with password guidelines: How user perceptions of passwords and security threats affect compliance with guidelines

F Mwagwabi, T McGill, M Dixon - 2014 47th Hawaii …, 2014 - ieeexplore.ieee.org
Passwords have long been the preferred method of user authentication, yet poor password
practices cause security issues. The study described in this paper investigates how user …

Advancement of Cybersecurity and Information Security Awareness to Facilitate Digital Transformation: Opportunities and Challenges

H Taherdoost, M Madanchian… - Handbook of Research on …, 2021 - igi-global.com
As the pace of changes in the digital world is increasing exponentially, the appeal to shift
from traditional platforms to digital ones is increasing as well. Accomplishing digital …

Cyber security on the farm: an assessment of cyber security practices in the United States agriculture industry

A Geil, G Sagers, AD Spaulding, JR Wolf - International Food and …, 2018 - brill.com
The goal of this study was to survey farmers and agribusiness owners about their
perceptions of cyber security, and how age, gender, and education might affect those …

[图书][B] The adoption of computer security: An analysis of home personal computer user behavior using the health belief model

CL Claar - 2011 - search.proquest.com
The primary purpose of this research was to examine the adoption of computer security
software in the home computer environment. The use of the Health Belief Model as a …