Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

A decade of NeuroIS research: progress, challenges, and future directions

R Riedl, T Fischer, PM Léger, FD Davis - ACM SIGMIS Database: the …, 2020 - dl.acm.org
NeuroIS is a field in Information Systems (IS) that makes use of neuroscience and
neurophysiological tools and knowledge to better understand the development, adoption …

Privacy concerns and benefits of engagement with social media-enabled apps: A privacy calculus perspective

M Jozani, E Ayaburi, M Ko, KKR Choo - Computers in Human Behavior, 2020 - Elsevier
Privacy threats in a social media-enabled application (app) can originate from either the
institution or other app users. Although privacy in social media is well studied, the role of …

Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda

PB Lowry, T Dinev, R Willison - European Journal of Information …, 2017 - Taylor & Francis
In this essay, we outline some important concerns in the hope of improving the effectiveness
of security and privacy research. We discuss the need to re-examine our understanding of …

[HTML][HTML] Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: A UK survey for 2018 and 2019

IF De Arroyabe, CFA Arranz, MF Arroyabe… - Computers & …, 2023 - Elsevier
Our study explores how cyber-capabilities and cyber-attacks drive investment in
cybersecurity systems. We assume that cybersecurity investment is a strategic decision in …

The impact of information security threat awareness on privacy-protective behaviors

S Mamonov, R Benbunan-Fich - Computers in Human Behavior, 2018 - Elsevier
In this study, we examine how to motivate computer users to protect themselves from
potential security and privacy threats. We draw on the Information Processing framework …

Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals

AJ Burns, C Posey, TL Roberts, PB Lowry - Computers in Human Behavior, 2017 - Elsevier
Practitioners and researchers alike recognize the positive influence insiders' behavior can
have on information systems (IS) security. This awareness has resulted in a research stream …

Exploring the influence of flow and psychological ownership on security education, training and awareness effectiveness and security compliance

CW Yoo, GL Sanders, RP Cerveny - Decision Support Systems, 2018 - Elsevier
The purpose of this study is to investigate the impact of flow and psychological ownership on
security education, training, and awareness (SETA) effectiveness, self-efficacy, and security …

Examining employee computer abuse intentions: Insights from justice, deterrence and neutralization perspectives

R Willison, M Warkentin… - Information Systems …, 2018 - Wiley Online Library
Although employee computer abuse is a costly and significant problem for firms, the existing
academic literature regarding this issue is limited. To address this gap, we apply a multi …

The effectiveness of abstract versus concrete fear appeals in information security

SW Schuetz, P Benjamin Lowry, DA Pienta… - Journal of …, 2020 - Taylor & Francis
Information security (ISec) is a pervasive concern of individuals, organizations, and
governments. To encourage individuals to engage in and learn about secure behaviors …