A major stream of research within the field of information systems security examines the use of organizational policies that specify how users of information and technology resources …
A rich stream of research has identified numerous antecedents to employee compliance (and noncompliance) with information security policies. However, the number of competing …
Fear appeals, which are used widely in information security campaigns, have become common tools in motivating individual compliance with information security policies and …
J D'Arcy, PB Lowry - Information Systems Journal, 2019 - Wiley Online Library
We present a model of employee compliance with information security policy (ISP) that (1) explicates stable, cognitive beliefs regarding the consequences of compliance and …
C Liu, N Wang, H Liang - International Journal of Information Management, 2020 - Elsevier
Employees' non-compliance with organizational information security policy (ISP) when using informational resources has become the main reason for continuous security incidents …
In this essay, we outline some important concerns in the hope of improving the effectiveness of security and privacy research. We discuss the need to re-examine our understanding of …
N Guhr, B Lebek, MH Breitner - Information Systems Journal, 2019 - Wiley Online Library
Explaining the influence of management leadership on employees' information security behaviour is an important focus in information systems research and for companies and …
This study explores the role of norms in employees' compliance with an organizational information security policy (ISP). Drawing upon norm activation theory, social norms theory …
Modern households are increasingly becoming digitized as they contain numerous Internet- connected networked devices throughout the home. However, this growth in the adoption of …