Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Organizational information security policies: a review and research framework
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …
of organizational policies that specify how users of information and technology resources …
The impact of time pressure on cybersecurity behaviour: a systematic literature review
In today's fast-paced society, users of information technology increasingly operate under
high time pressure. Loaded with multiple tasks and racing against deadlines, users …
high time pressure. Loaded with multiple tasks and racing against deadlines, users …
Seeing the forest and the trees
WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - JSTOR
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …
(and noncompliance) with information security policies. However, the number of competing …
Toward a unified model of information security policy compliance
Information systems security (ISS) behavioral research has produced different models to
explain security policy compliance. This paper (1) reviews 11 theories that have served the …
explain security policy compliance. This paper (1) reviews 11 theories that have served the …
Understanding employee responses to stressful information security requirements: A co** perspective
We use co** theory to explore an underlying relationship between employee stress
caused by burdensome, complex, and ambiguous information security requirements …
caused by burdensome, complex, and ambiguous information security requirements …
What Users Do besides Problem-Focused Co** When Facing IT Security Threats
H Liang, Y Xue, A Pinsonneault, YA Wu - MIS quarterly, 2019 - JSTOR
This paper investigates how individuals cope with IT security threats by taking into account
both problem-focused and emotion-focused co**. While problem-focused co** (PFC) …
both problem-focused and emotion-focused co**. While problem-focused co** (PFC) …
Dispositional and situational factors: influences on information security policy violations
Insiders represent a major threat to the security of an organization's information resources.
Previous research has explored the role of dispositional and situational factors in promoting …
Previous research has explored the role of dispositional and situational factors in promoting …
Increasing accountability through user-interface design artifacts
Access-policy violations are a growing problem with substantial costs for organizations.
Although training programs and sanctions have been suggested as a means of reducing …
Although training programs and sanctions have been suggested as a means of reducing …
The impact of leadership on employees' intended information security behaviour: An examination of the full‐range leadership theory
N Guhr, B Lebek, MH Breitner - Information Systems Journal, 2019 - Wiley Online Library
Explaining the influence of management leadership on employees' information security
behaviour is an important focus in information systems research and for companies and …
behaviour is an important focus in information systems research and for companies and …
Proposing the control‐reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies
Organisations increasingly rely on information and related systems, which are also a source
of risk. Unfortunately, employees represent the greatest risk to organisational information …
of risk. Unfortunately, employees represent the greatest risk to organisational information …