Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

A decade of NeuroIS research: progress, challenges, and future directions

R Riedl, T Fischer, PM Léger, FD Davis - ACM SIGMIS Database: the …, 2020 - dl.acm.org
NeuroIS is a field in Information Systems (IS) that makes use of neuroscience and
neurophysiological tools and knowledge to better understand the development, adoption …

Seeing the forest and the trees

WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - JSTOR
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …

[HTML][HTML] A comprehensive model of information security factors for decision-makers

R Diesch, M Pfaff, H Krcmar - Computers & Security, 2020 - Elsevier
Decision-making in the context of organizational information security is highly dependent on
various information. For information security managers, not only relevant information has to …

Risk perceptions of cyber-security and precautionary behaviour

P Van Schaik, D Jeske, J Onibokun, L Coventry… - Computers in Human …, 2017 - Elsevier
A quantitative empirical online study examined a set of 16 security hazards on the Internet
and two comparisons in 436 UK-and US students, measuring perceptions of risk and other …

Don't even think about it! The effects of antineutralization, informational, and normative communication on information security compliance

JB Barlow, M Warkentin, D Ormond… - Journal of the …, 2018 - aisel.aisnet.org
Organizations use security education, training, and awareness (SETA) programs to counter
internal security threats and promote compliance with information security policies. Yet …

Fostering information security compliance as organizational citizenship behavior

A Vedadi, M Warkentin, DW Straub… - Information & …, 2024 - Elsevier
Abstract Information security is heightened when employees develop a strong sense of
information stewardship for information assets, a form of organizational citizenship behavior …

Tuning out security warnings

A Vance, JL Jenkins, BB Anderson, DK Bjornn… - MIS Quarterly, 2018 - JSTOR
Research in the fields of information systems and human-computer interaction has shown
that habituation—decreased response to repeated stimulation—is a serious threat to the …

Towards a NeuroIS research methodology: intensifying the discussion on methods, tools, and measurement

R Riedl, FD Davis, AR Hevner - Journal of the Association for …, 2014 - aisel.aisnet.org
The genesis of the Neuro-Information Systems (NeuroIS) field took place in 2007. Since
then, a considerable number of IS scholars and academics from related disciplines have …

More harm than good? How messages that interrupt can make us vulnerable

JL Jenkins, BB Anderson, A Vance… - Information Systems …, 2016 - pubsonline.informs.org
System-generated alerts are ubiquitous in personal computing and, with the proliferation of
mobile devices, daily activity. While these interruptions provide timely information, research …