Security lapses and the omission of information security measures: A threat control model and empirical test

M Workman, WH Bommer, D Straub - Computers in human behavior, 2008 - Elsevier
Organizations and individuals are increasingly impacted by misuses of information that
result from security lapses. Most of the cumulative research on information security has …

Gaining access with social engineering: An empirical study of the threat

M Workman - Information Systems Security, 2007 - Taylor & Francis
Recently, research on information security has expanded from its purely technological
orientation into striving to understand and explain the role of human behavior in security …

The dark side of social networking sites: Understanding phishing risks

M Silic, A Back - Computers in Human Behavior, 2016 - Elsevier
Abstract LinkedIn, with over 1.5 million Groups, has become a popular place for business
employees to create private groups to exchange information and communicate. Recent …

A test of interventions for security threats from social engineering

M Workman - Information Management & Computer Security, 2008 - emerald.com
Purpose–Recently, the role of human behavior has become a focal point in the study of
information security countermeasures. However, few empirical studies have been conducted …

Exploring the relationship between organizational culture and information security culture

JS Lim, S Chang, S Maynard, A Ahmad - 2009 - ro.ecu.edu.au
Abstract Managing Information Security is becoming more challenging in today's business
because people are both a cause of information security incidents as well as a key part of …

Intrusion detection: systems and models

JS Sherif, TG Dearmond - Proceedings. Eleventh IEEE …, 2002 - ieeexplore.ieee.org
Organizations more often than not lack comprehensive security policies and are not
adequately prepared to protect their systems against intrusions. This paper puts forward a …

[PDF][PDF] Intrusion detection system methodologies based on data analysis

S Akbar, KN Rao, JA Chandulal - International Journal of Computer …, 2010 - Citeseer
With the rapidly growing and wide spread use of computer networks the number of new
threats has grown extensively. Intrusion and detection system can only identifying and …

Intrusion detection: the art and the practice. Part I

JS Sherif, R Ayers, TG Dearmond - Information Management & …, 2003 - emerald.com
Organizations more often than not lack comprehensive security policies and are not
adequately prepared to protect their systems against intrusions. This paper puts forward a …

Data collection

AA Ghorbani, W Lu, M Tavallaee, AA Ghorbani… - … Intrusion Detection and …, 2010 - Springer
Data collection is one of the most important steps when designing an Intrusion Detection
System (IDS) and it influences the whole design and implementation process, and also the …

Understanding Factors Affecting Executives' Behaviors toward Security: An Embedded Single-Case Study

PM Omaoeng - 2016 - search.proquest.com
Abstract Information security professionals have continually been developing safeguards to
avert the increasing security and privacy risks in many organizations using various controls …