Information security awareness and behavior: a theory-based literature review

B Lebek, J Uffen, M Neumann, B Hohler… - Management …, 2014 - emerald.com
Purpose–This paper aims to provide an overview of theories used in the field of employees'
information systems (IS) security behavior over the past decade. Research gaps and …

Review of IS security policy compliance: Toward the building blocks of an IS security theory

P Balozian, D Leidner - ACM SIGMIS Database: The DATABASE for …, 2017 - dl.acm.org
An understanding of insider threats in information systems (IS) is important to help address
one of the dangers lurking within organizations. This article provides a review of the …

Seeing the forest and the trees

WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - JSTOR
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …

Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness

B Bulgurcu, H Cavusoglu, I Benbasat - MIS quarterly, 2010 - JSTOR
Many organizations recognize that their employees, who are often considered the weakest
link in information security, can also be great assets in the effort to reduce risk related to …

Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach

B AlGhanboosi, S Ali, A Tarhini - Computers in Human Behavior, 2023 - Elsevier
Individuals and organizations rely on social media to share files and knowledge. On the
other hand, criminals find social media applications a rich place to attack through techniques …

Understanding information security stress: Focusing on the type of information security compliance activity

C Lee, CC Lee, S Kim - Computers & Security, 2016 - Elsevier
Organizations are intensifying their information security levels, as information security has
become an essential element in business management. However, excessive focus on the …

Determinants of early conformance with information security policies

F Bélanger, S Collignon, K Enget… - Information & …, 2017 - Elsevier
Individuals often fail to perform the security behaviors their organizations request to protect
informational assets. However, forcing individuals into the compliance can trigger undesired …

Antecedents for enhanced level of cyber-security in organisations

S Kumar, B Biswas, MS Bhatia, M Dora - Journal of Enterprise …, 2021 - emerald.com
Purpose The present study aims to identify and investigate the antecedents of enhanced
level of cyber-security at the organisational level from both the technical and the human …

Information security burnout: Identification of sources and mitigating factors from security demands and resources

HC Pham, L Brennan, S Furnell - Journal of Information Security and …, 2019 - Elsevier
This study examines how information security burnout can develop from complying with
organisational security demands, and whether security burnout can be reduced by engaging …

How senior management and workplace norms influence information security attitudes and self-efficacy

S Cuganesan, C Steele, A Hart - Behaviour & Information …, 2018 - Taylor & Francis
Prior information security research establishes the need to investigate the informal factors
that influence employee attitudes and self-efficacy beliefs about information security. Two …