NeuroIS is a field in Information Systems (IS) that makes use of neuroscience and neurophysiological tools and knowledge to better understand the development, adoption …
Privacy threats in a social media-enabled application (app) can originate from either the institution or other app users. Although privacy in social media is well studied, the role of …
In this essay, we outline some important concerns in the hope of improving the effectiveness of security and privacy research. We discuss the need to re-examine our understanding of …
Our study explores how cyber-capabilities and cyber-attacks drive investment in cybersecurity systems. We assume that cybersecurity investment is a strategic decision in …
In this study, we examine how to motivate computer users to protect themselves from potential security and privacy threats. We draw on the Information Processing framework …
Practitioners and researchers alike recognize the positive influence insiders' behavior can have on information systems (IS) security. This awareness has resulted in a research stream …
CW Yoo, GL Sanders, RP Cerveny - Decision Support Systems, 2018 - Elsevier
The purpose of this study is to investigate the impact of flow and psychological ownership on security education, training, and awareness (SETA) effectiveness, self-efficacy, and security …
Although employee computer abuse is a costly and significant problem for firms, the existing academic literature regarding this issue is limited. To address this gap, we apply a multi …
Information security (ISec) is a pervasive concern of individuals, organizations, and governments. To encourage individuals to engage in and learn about secure behaviors …