Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures

I Homoliak, F Toffalini, J Guarnizo, Y Elovici… - ACM Computing …, 2019 - dl.acm.org
Insider threats are one of today's most challenging cybersecurity issues that are not well
addressed by commonly employed security solutions. In this work, we propose structural …

Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

[HTML][HTML] Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity

FA Shaikh, M Siponen - Computers & Security, 2023 - Elsevier
Abstract Information Systems (IS) research on managerial response to cybersecurity
breaches has largely focused on externally oriented actions such as customer redressal and …

An empirical validation of a unified model of electronic government adoption (UMEGA)

YK Dwivedi, NP Rana, M Janssen, B Lal… - Government Information …, 2017 - Elsevier
In electronic government (hereafter e-government), a large variety of technology adoption
models are employed, which make researchers and policymakers puzzled about which one …

Does government social media promote users' information security behavior towards COVID-19 scams? Cultivation effects and protective motivations

Z Tang, AS Miller, Z Zhou, M Warkentin - Government Information Quarterly, 2021 - Elsevier
Cybercriminals are taking advantage of the COVID-19 outbreak and offering COVID-19-
related scams to unsuspecting people. Currently, there is a lack of studies that focus on …

An enhanced fear appeal rhetorical framework

AC Johnston, M Warkentin, M Siponen - MIS quarterly, 2015 - JSTOR
Fear appeals, which are used widely in information security campaigns, have become
common tools in motivating individual compliance with information security policies and …

An exploratory study of cyber hygiene behaviors and knowledge

AA Cain, ME Edwards, JD Still - Journal of information security and …, 2018 - Elsevier
End users' cyber hygiene often plays a large role in cybersecurity breaches. Therefore, we
need a deeper understanding of the user differences that are associated with either good or …

Future directions for behavioral information security research

RE Crossler, AC Johnston, PB Lowry, Q Hu… - computers & …, 2013 - Elsevier
Information Security (InfoSec) research is far reaching and includes many approaches to
deal with protecting and mitigating threats to the information assets and technical resources …

Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness

B Bulgurcu, H Cavusoglu, I Benbasat - MIS quarterly, 2010 - JSTOR
Many organizations recognize that their employees, who are often considered the weakest
link in information security, can also be great assets in the effort to reduce risk related to …

Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study

J D'Arcy, PB Lowry - Information Systems Journal, 2019 - Wiley Online Library
We present a model of employee compliance with information security policy (ISP) that (1)
explicates stable, cognitive beliefs regarding the consequences of compliance and …