What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors

SR Boss, DF Galletta, PB Lowry, GD Moody, P Polak - MIS quarterly, 2015 - JSTOR
Because violations of information security (ISec) and privacy have become ubiquitous in
both personal and work environments, academic attention to ISec and privacy has taken on …

User participation in information systems security risk management

JL Spears, H Barki - MIS quarterly, 2010 - JSTOR
This paper examines user participation in information systems security risk management
and its influence in the context of regulatory compliance via a multi-method study at the …

Incident-centered information security: Managing a strategic balance between prevention and response

R Baskerville, P Spagnoletti, J Kim - Information & management, 2014 - Elsevier
Abstract Information security strategies employ principles and practices grounded in both the
prevention and response paradigms. The prevention paradigm aims at managing predicted …

[图书][B] Measuring an information security awareness program

MJ Wolf - 2010 - search.proquest.com
Research shows security awareness lacks a uniform definition. This thesis explores the
various attempts that have been made to define security awareness and then presents a …

Definition and multidimensionality of security awareness: Close encounters of the second order

B Hanus, JC Windsor, Y Wu - ACM SIGMIS Database: the DATABASE for …, 2018 - dl.acm.org
This study proposes and examines a multidimensional definition of information security
awareness. We also investigate its antecedents and analyze its effects on compliance with …

We want to do it our way: The neutralisation approach to managing information systems security by small businesses

K Njenga, P Jordaan - The African Journal of …, 2016 - digitalcommons.kennesaw.edu
Small businesses thrive in the developing economy of South Africa and address the
important issue of unemployment and poverty that exists in the country. A large number of …

[PDF][PDF] An information security and privacy self-assessment (ISPSA) tool for internet users

T Galba, K Solic, I Lukic - Acta Polytechnica Hungarica, 2015 - acta.uni-obuda.hu
Privacy and overall information security are significantly affected by an Internet users'
awareness, knowledge and behavior. Therefore, there is a user's awareness assessment …

Complexity and knowledge in organisational context: Concepts, approaches, boundaries and relations

CFB Jorge, MLP Valentim, MJD Sutton… - Journal of Information …, 2021 - World Scientific
The study sought to understand the relationship among organisations, knowledge and
complexity so that managers could develop more effective strategies when working with …

Empirical study on ICT system's users' risky behavior and security awareness

K Solic, T Velki, T Galba - 2015 38th International Convention …, 2015 - ieeexplore.ieee.org
In this study authors gathered information on ICT users from different areas in Croatia with
different knowledge, experience, working place, age and gender background in order to …

Empirical study on the risky behavior and security awareness among secondary school pupils-validation and preliminary results

T Velki, K Solic, V Gorjanac… - 2017 40th International …, 2017 - ieeexplore.ieee.org
This study was based on the validated Users' Information Security Awareness Questionnaire
(UISAQ). Authors gathered information on risky behavior and security awareness among …