Examining the differential effectiveness of fear appeals in information security management using two-stage meta-analysis

PB Lowry, GD Moody, S Parameswaran… - Journal of …, 2023 - Taylor & Francis
Most of the information security management research involving fear appeals is guided by
either protection motivation theory or the extended parallel processing model. Over time …

Insider threats and individual differences: Intention and unintentional motivations

JR Schoenherr - IEEE Transactions on Technology and …, 2022 - ieeexplore.ieee.org
The present study extends a cybersecurity questionnaire (CSEC) by including items that
differentiate cyber hygiene behavior, self-disclosure vulnerability, intrusion vulnerability, and …

A Framework for Analyzing and Improving ISP Compliance

X Chen, CK Tyran - Journal of Computer Information Systems, 2023 - Taylor & Francis
Even though abundant research has been done on the factors that may impact employee
information security policy (ISP) compliance intention, the results are mixed. To more fully …

Validating and extending the unified model of information security policy compliance

M Gerdin - Information & Computer Security, 2024 - emerald.com
Purpose The purpose of this study is to further validate and extend the unified model of
information security policy compliance (UMISPC) developed by. Design/methodology …

A study of information security awareness on teleworking security risks and recommendations since Covid19 pandemic

L Galajda - 2023 - diva-portal.org
This study is looking at “the changed” world for employees that were lucky and could
continue their work from places other than office since the Covid-19 pandemic outbreak …

All things merge into one, and a river runs through it: exploring the dimensions of blended learning by developing a case study template for blended activities

D Gordon, P Doyle, A Becevel, T Baloh - 2022 - arrow.tudublin.ie
Abstract The BLITT (Blended Learning International Train the Trainer) Project is focused on
developing a training programme to equip teachers to become proficient in championing the …

Applying Predictive Behavioral Theories to Phishing Email Defense: To What Extent Can the UMISPC Predict Which Users Will Fail to Comply with Phishing Policies …

L Buehrly-Harris - 2024 - search.proquest.com
As long as users are on the other end of the computer, threat actors will continue to try and
trick them into disclosing sensitive information. Phishing is a continual threat to the security …

Neutralization Techniques' Effect on US Employees' Intent to Violate Organizational Information Security Policy: A Quantitative Study

TL Wagner - 2023 - search.proquest.com
Employee noncompliance with information security policy makes a company vulnerable to
attack by malicious actors. This quantitative non-experimental study is significant to …

Communicating Information Security

S Kokolakis, A Tsohou - The Routledge Handbook of Privacy and Social … - taylorfrancis.com
Cybersecurity attack techniques are continuously evolving, creating a dynamic landscape of
threats that organizations and individuals face when using online information systems and …

[PDF][PDF] Is it good enough

D Lindvall - lup.lub.lu.se
SAMMANFATTNING (MAX. 200 ORD): Previous research in information security research
has pointed out the importance of aware employees, while practitioners have focused on …