A major stream of research within the field of information systems security examines the use of organizational policies that specify how users of information and technology resources …
Because violations of information security (ISec) and privacy have become ubiquitous in both personal and work environments, academic attention to ISec and privacy has taken on …
Purpose–The purpose of this paper is to identify variables that influence compliance with information security policies of organizations and to identify how important these variables …
Drawing on expectation confirmation research, we develop hypotheses regarding the effect of compensation on key customer outcomes following a major data breach and consequent …
Organizational information security (ISec) threats have exploded with advances in globalization and technology. Thus, organizations are scrambling to find both technical and …
MAA Sallam, NA Wahid - International Business Research, 2012 - nu.edu.sa
The use of celebrity as spokespeople for companies continues to be a popular method of advertising. The reason behind the popularity of celebrity advertising is the advertiser's …
M Siponen, A Vance - European Journal of Information Systems, 2014 - Taylor & Francis
The information systems (IS) field continues to debate the relative importance of rigor and relevance in its research. While the pursuit of rigor in research is important, we argue that …
Determining how to design persuasive information security messages to increase employees' engagement in protection-motivated behaviors is an important organizational …
Persuasion is key to encourage compliance with information security policies through fear appeals, though research has not examined how the perceived quality of their arguments …