A major stream of research within the field of information systems security examines the use of organizational policies that specify how users of information and technology resources …
With the outbreak of COVID-19, contact tracing is becoming a used intervention to control the spread of this highly infectious disease. This article explores an individual's intention to …
A rich stream of research has identified numerous antecedents to employee compliance (and noncompliance) with information security policies. However, the number of competing …
Cybercriminals are taking advantage of the COVID-19 outbreak and offering COVID-19- related scams to unsuspecting people. Currently, there is a lack of studies that focus on …
We use coping theory to explore an underlying relationship between employee stress caused by burdensome, complex, and ambiguous information security requirements …
Fear appeals, which are used widely in information security campaigns, have become common tools in motivating individual compliance with information security policies and …
Information Security (InfoSec) research is far reaching and includes many approaches to deal with protecting and mitigating threats to the information assets and technical resources …
In this study, we argue that institutional factors determine the extent to which hospitals are symbolic or substantive adopters of information technology (IT) specific organizational …
B Lebek, J Uffen, M Neumann, B Hohler… - Management …, 2014 - emerald.com
Purpose–This paper aims to provide an overview of theories used in the field of employees' information systems (IS) security behavior over the past decade. Research gaps and …