Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

The impact of time pressure on cybersecurity behaviour: a systematic literature review

NH Chowdhury, MTP Adam… - Behaviour & Information …, 2019 - Taylor & Francis
In today's fast-paced society, users of information technology increasingly operate under
high time pressure. Loaded with multiple tasks and racing against deadlines, users …

Seeing the forest and the trees

WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - JSTOR
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …

Toward a unified model of information security policy compliance

GD Moody, M Siponen, S Pahnila - MIS quarterly, 2018 - JSTOR
Information systems security (ISS) behavioral research has produced different models to
explain security policy compliance. This paper (1) reviews 11 theories that have served the …

Understanding employee responses to stressful information security requirements: A co** perspective

J D'Arcy, T Herath, MK Shoss - Journal of management information …, 2014 - Taylor & Francis
We use co** theory to explore an underlying relationship between employee stress
caused by burdensome, complex, and ambiguous information security requirements …

What Users Do besides Problem-Focused Co** When Facing IT Security Threats

H Liang, Y Xue, A Pinsonneault, YA Wu - MIS quarterly, 2019 - JSTOR
This paper investigates how individuals cope with IT security threats by taking into account
both problem-focused and emotion-focused co**. While problem-focused co** (PFC) …

Dispositional and situational factors: influences on information security policy violations

AC Johnston, M Warkentin, M McBride… - European Journal of …, 2016 - Taylor & Francis
Insiders represent a major threat to the security of an organization's information resources.
Previous research has explored the role of dispositional and situational factors in promoting …

Increasing accountability through user-interface design artifacts

A Vance, PB Lowry, D Eggett - MIS quarterly, 2015 - JSTOR
Access-policy violations are a growing problem with substantial costs for organizations.
Although training programs and sanctions have been suggested as a means of reducing …

The impact of leadership on employees' intended information security behaviour: An examination of the full‐range leadership theory

N Guhr, B Lebek, MH Breitner - Information Systems Journal, 2019 - Wiley Online Library
Explaining the influence of management leadership on employees' information security
behaviour is an important focus in information systems research and for companies and …

Proposing the control‐reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies

PB Lowry, GD Moody - Information Systems Journal, 2015 - Wiley Online Library
Organisations increasingly rely on information and related systems, which are also a source
of risk. Unfortunately, employees represent the greatest risk to organisational information …