Insider threats are one of today's most challenging cybersecurity issues that are not well addressed by commonly employed security solutions. In this work, we propose structural …
A rich stream of research has identified numerous antecedents to employee compliance (and noncompliance) with information security policies. However, the number of competing …
Information systems security (ISS) behavioral research has produced different models to explain security policy compliance. This paper (1) reviews 11 theories that have served the …
T Al-Shehari, RA Alsowail - Entropy, 2021 - mdpi.com
Insider threats are malicious acts that can be carried out by an authorized employee within an organization. Insider threats represent a major cybersecurity challenge for private and …
Device security is one of the major challenges for successful implementation of Internet of Things and fog computing environment in current IT space. Researchers and Information …
Information Security (InfoSec) research is far reaching and includes many approaches to deal with protecting and mitigating threats to the information assets and technical resources …
Intentional insider misuse of information systems resources (ie, IS misuse) represents a significant threat to organizations. For example, industry statistics suggest that between 50 …
T Herath, HR Rao - Decision support systems, 2009 - Elsevier
Secure management of information systems is crucially important in information intensive organizations. Although most organizations have long been using security technologies, it is …
J D'arcy, T Herath - European journal of information systems, 2011 - Taylor & Francis
Deterrence theory is one of the most widely applied theories in information systems (IS) security research, particularly within behavioral IS security studies. Based on the rational …