Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

Seeing the forest and the trees

WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - JSTOR
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …

What Users Do besides Problem-Focused Coping When Facing IT Security Threats

H Liang, Y Xue, A Pinsonneault, YA Wu - MIS quarterly, 2019 - JSTOR
This paper investigates how individuals cope with IT security threats by taking into account
both problem-focused and emotion-focused coping. While problem-focused coping (PFC) …

[HTML][HTML] Toward a better understanding of the intention to use mHealth apps: exploratory study

PR Palos-Sanchez, JR Saura… - JMIR mHealth and …, 2021 - mhealth.jmir.org
Background An increasing number of mobile health (mHealth) apps are becoming available
for download and use on mobile devices. Even with the increase in availability and use of …

Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence

Y Chen, W Xia, K Cousins - Computers & Security, 2022 - Elsevier
Understanding employees' motivations and behaviors toward compliance with information
security policies (ISPs) remains a theoretical and practical challenge. Although previous …

Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization

J D'Arcy, PL Teh - Information & Management, 2019 - Elsevier
We conceptualized security-related stress (SRS) and proposed a theoretical model linking
SRS, discrete emotions, coping response, and information security policy (ISP) compliance …

Motivation and opportunity based model to reduce information security insider threats in organisations

NS Safa, C Maple, T Watson, R Von Solms - Journal of information security …, 2018 - Elsevier
Abstract Information technology has brought with it many advantages for organisations, but
information security is still a major concern for organisations which rely on such technology …

Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model

Y Chen, DF Galletta, PB Lowry, X Luo… - Information Systems …, 2021 - pubsonline.informs.org
Organizational information security (ISec) threats have exploded with advances in
globalization and technology. Thus, organizations are scrambling to find both technical and …

Deterrence and prevention-based model to mitigate information security insider threats in organisations

NS Safa, C Maple, S Furnell, MA Azad, C Perera… - Future Generation …, 2019 - Elsevier
Previous studies show that information security breaches and privacy violations are
important issues for organisations and people. It is acknowledged that decreasing the risk in …

Peers matter: The moderating role of social influence on information security policy compliance

A Yazdanmehr, J Wang, Z Yang - Information Systems Journal, 2020 - Wiley Online Library
Abstract Information security in an organization largely depends on employee compliance
with information security policy (ISP). Previous studies have mainly explored the effects of …