A comprehensive survey of phishing: Mediums, intended targets, attack and defence techniques and a novel taxonomy

R Goenka, M Chawla, N Tiwari - International Journal of Information …, 2024 - Springer
The recent surge in phishing incidents in the post-COVID era poses a serious threat towards
the social and economic well-being of users. The escalation in dependency upon the …

Motivating IS security compliance: Insights from habit and protection motivation theory

A Vance, M Siponen, S Pahnila - Information & management, 2012 - Elsevier
Employees' failure to comply with IS security procedures is a key concern for organizations
today. A number of socio-cognitive theories have been used to explain this. However, prior …

Information security: Critical review and future directions for research

M Silic, A Back - Information Management & Computer Security, 2014 - emerald.com
Purpose–The purpose of this literature review is to analyze current trends in information
security and suggest future directions for research. Design/methodology/approach–The …

Hype and heavy tails: A closer look at data breaches

B Edwards, S Hofmeyr, S Forrest - Journal of Cybersecurity, 2016 - academic.oup.com
Recent widely publicized data breaches have exposed the personal information of hundreds
of millions of people. Some reports point to alarming increases in both the size and …

Understanding security behaviors in personal computer usage: A threat avoidance perspective

H Liang, YL Xue - Journal of the association for information …, 2010 - aisel.aisnet.org
This study aims to understand the IT threat avoidance behaviors of personal computer users.
We tested a research model derived from Technology Threat Avoidance Theory (TTAT) …

Avoidance of information technology threats: A theoretical perspective

H Liang, Y Xue - MIS quarterly, 2009 - JSTOR
This paper describes the development of the technology threat avoidance theory (TTAT),
which explains individual IT users' behavior of avoiding the threat of malicious information …

Employees' behavior towards IS security policy compliance

S Pahnila, M Siponen… - 2007 40th Annual Hawaii …, 2007 - ieeexplore.ieee.org
The literature agrees that the major threat to IS security is constituted by careless employees
who do not comply with organizations' IS security policies and procedures. To address this …

The centrality of awareness in the formation of user behavioral intention toward protective information technologies

T Dinev, Q Hu - Journal of the Association for Information Systems, 2007 - aisel.aisnet.org
While there is a rich body of literature on user acceptance of technologies with positive
outcomes, little is known about user behavior toward what we call protective technologies …

The behavioral roots of information systems security: Exploring key factors related to unethical IT use

S Chatterjee, S Sarker, JS Valacich - Journal of Management …, 2015 - Taylor & Francis
Unethical information technology (IT) use, related to activities such as hacking, software
piracy, phishing, and spoofing, has become a major security concern for individuals …

Information security: management's effect on culture and policy

KJ Knapp, TE Marshall, R Kelly Rainer… - … & Computer Security, 2006 - emerald.com
Purpose–This study proposes to put forward and test a theoretical model that demonstrates
the influence of top management support on an organization's security culture and level of …