Most of the information security management research involving fear appeals is guided by either protection motivation theory or the extended parallel processing model. Over time …
Organizations today are greatly challenged by information security threats, which is often due to employee non-compliance with the information security policies (ISPs). By drawing …
Abstract Information security is heightened when employees develop a strong sense of information stewardship for information assets, a form of organizational citizenship behavior …
Many of the theories used in behavioral cybersecurity research have been applied with a nomothetic approach, which is characterized by cross-sectional data (eg, one-time surveys) …
W Wu, Q Yang, X Gong, RM Davison - Information Technology & …, 2023 - emerald.com
Purpose Crowdsourcing platforms have emerged as an innovative way to generate ideas and solving problems. However, promoting sustained participation among crowdworkers is …
X Zhang, T Kim - Journal of Cloud Computing, 2023 - Springer
Enterprises have both new opportunities and new challenges as a result of the rapid advancements in information technology that have accompanied the age of economic …
D Ganye, K Smith - Internet Research, 2024 - emerald.com
Purpose Enforcing employee compliance with information systems security policies (ISSP) is a herculean task for organizations as security breaches due to non-compliance continue to …
A rich body of research examines the cybersecurity behavior of employees, with a particular focus on explaining the reasons why employees comply with (or violate) organizational …
S Jeon, I Son, J Han - Behaviour & Information Technology, 2023 - Taylor & Francis
As the importance of information assets increases, employees are increasingly required to comply with organisational policies for information security (InfoSec). Since security-related …