Information security awareness and behavior: a theory-based literature review

B Lebek, J Uffen, M Neumann, B Hohler… - Management …, 2014 - emerald.com
Purpose–This paper aims to provide an overview of theories used in the field of employees'
information systems (IS) security behavior over the past decade. Research gaps and …

The role of user behaviour in improving cyber security management

AA Moustafa, A Bello, A Maurushat - Frontiers in Psychology, 2021 - frontiersin.org
Information security has for long time been a field of study in computer science, software
engineering, and information communications technology. The term 'information security'has …

Cyber security awareness, knowledge and behavior: A comparative study

M Zwilling, G Klien, D Lesjak, Ł Wiechetek… - Journal of Computer …, 2022 - Taylor & Francis
Cyber-attacks represent a potential threat to information security. As rates of data usage and
internet consumption continue to increase, cyber awareness turned to be increasingly …

Correlating human traits and cyber security behavior intentions

M Gratian, S Bandi, M Cukier, J Dykstra, A Ginther - computers & security, 2018 - Elsevier
In this paper, we correlate human characteristics with cyber security behavior intentions.
While previous papers have identified correlations between certain human traits and specific …

Individual differences and information security awareness

A McCormac, T Zwaans, K Parsons, D Calic… - Computers in Human …, 2017 - Elsevier
The main purpose of this study was to examine the relationship between individuals'
Information Security Awareness (ISA) and individual difference variables, namely age …

More than the individual: Examining the relationship between culture and Information Security Awareness

A Wiley, A McCormac, D Calic - Computers & security, 2020 - Elsevier
The relationship between security culture and Information Security Awareness (ISA) has
received preliminary support; however, its interplay with organisational culture is yet to be …

Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours

L Hadlington - Heliyon, 2017 - cell.com
The present study explored the relationship between risky cybersecurity behaviours,
attitudes towards cybersecurity in a business environment, Internet addiction, and …

Personality, attitudes, and intentions: Predicting initial adoption of information security behavior

J Shropshire, M Warkentin, S Sharma - computers & security, 2015 - Elsevier
Investigations of computer user behavior become especially important when behaviors like
security software adoption affect organizational information resource security, but adoption …

Protection motivation and deterrence: a framework for security policy compliance in organisations

T Herath, HR Rao - European Journal of information systems, 2009 - Taylor & Francis
Enterprises establish computer security policies to ensure the security of information
resources; however, if employees and end-users of organisational information systems (IS) …

Human factor, a critical weak point in the information security of an organization's Internet of things

K Hughes-Lartey, M Li, FE Botchey, Z Qin - Heliyon, 2021 - cell.com
Abstract Internet of Things (IoT) presents opportunities for designing new technologies for
organizations. Many organizations are beginning to accept these technologies for their daily …