Seeing the forest and the trees

WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - JSTOR
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …

Gender differences in predictors of technology threat avoidance

AR Gillam, AM Waite - Information & Computer Security, 2021 - emerald.com
Purpose The purpose of this paper is to examine gender differences in predictors of
technology threat avoidance motivation and behavior among working US adults …

Technology Threat Avoidance Factors as Predictors of Risky Cybersecurity Behavior Within the Enterprise

AR Gillam - 2019 - search.proquest.com
Recent research of information technology (IT) end-user cybersecurity-related risky
behaviors has focused on items such as IT user decision-making, impulsiveness, and …

Design, development and implementation of an information security and cyberethics course for pre-service teachers: A design-based research

EA Kadıoğlu - 2019 - search.proquest.com
Design, Development and Implementation of an Information Security and Cyberethics
Course for Pre-Service Teachers: a Design-Based Research Abstract With the introduction …

Blockchain Adoption for Supply Chain Resilience: A Study Beyond the Dominant Paradigm

MG Kibria - 2023 - search.proquest.com
Blockchain technology (BCT) is a novel technology that can significantly change the
business operations and models that we have today. It offers various advantages such as …

[图书][B] Understanding Security Education Training and Awareness Program Impact: A Study of Recipient Motivation

CS Duffy - 2019 - search.proquest.com
This study examined the phenomenon of motivation among individuals who experienced a
Security Education Training and Awareness (SETA) program session as members of US …

Analysis of MASEM on Behavioral Intention of Information Security Based on Deterrence Theory

J Kim - Journal of Digital Convergence, 2021 - koreascience.kr
While the importance of information security policies is heightened, numerous empirical
studies have been conducted to investigate the factors that influence employee's willingness …

억제이론기반의정보보안행동의도에대한메타분석.

김종기 - Journal of Digital Convergence, 2021 - search.ebscohost.com
요 약 효과적인 정보보안관리의 핵심요소인 정보보안 정책의 중요성이 고조되는 가운데, 조직
구성원의 보안정책 준수여부에 영향을 미치는 요인에 대하여 다양한 이론에 기반한 실증연구가 …

[引用][C] El derecho fundamental a la protección de datos personales en Argentina y en el mundo: los conflictos extraterritoriales por los delitos informáticos

E Fuentes Benítez - 2022 - Universidad de San Andrés …