A major stream of research within the field of information systems security examines the use of organizational policies that specify how users of information and technology resources …
A rich stream of research has identified numerous antecedents to employee compliance (and noncompliance) with information security policies. However, the number of competing …
Information systems security (ISS) behavioral research has produced different models to explain security policy compliance. This paper (1) reviews 11 theories that have served the …
A grave concern to an organization's information security is employees' behavior when they do not value information security policy compliance (ISPC). Most ISPC studies evaluate …
Many organizations recognize that their employees, who are often considered the weakest link in information security, can also be great assets in the effort to reduce risk related to …
Q Hu, T Dinev, P Hart, D Cooke - Decision Sciences, 2012 - Wiley Online Library
We develop an individual behavioral model that integrates the role of top management and organizational culture into the theory of planned behavior in an attempt to better understand …
B Lebek, J Uffen, M Neumann, B Hohler… - Management …, 2014 - emerald.com
Purpose–This paper aims to provide an overview of theories used in the field of employees' information systems (IS) security behavior over the past decade. Research gaps and …
Recent academic investigations of computer security policy violations have largely focused on non-malicious noncompliance due to poor training, low employee motivation, weak …
Although firms are expending substantial resources to develop technology and processes that can help safeguard the security of their computing assets, increased attention is being …