Organizational information security policies: a review and research framework
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …
of organizational policies that specify how users of information and technology resources …
Information security awareness and behavior: a theory-based literature review
B Lebek, J Uffen, M Neumann, B Hohler… - Management …, 2014 - emerald.com
Purpose–This paper aims to provide an overview of theories used in the field of employees'
information systems (IS) security behavior over the past decade. Research gaps and …
information systems (IS) security behavior over the past decade. Research gaps and …
Seeing the forest and the trees
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …
(and noncompliance) with information security policies. However, the number of competing …
Health information privacy concerns, antecedents, and information disclosure intention in online health communities
This study explores the antecedents and consequences of health information privacy
concerns in online health communities by integrating the dual calculus and protection …
concerns in online health communities by integrating the dual calculus and protection …
Understanding employee responses to stressful information security requirements: A co** perspective
We use co** theory to explore an underlying relationship between employee stress
caused by burdensome, complex, and ambiguous information security requirements …
caused by burdensome, complex, and ambiguous information security requirements …
What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors
Because violations of information security (ISec) and privacy have become ubiquitous in
both personal and work environments, academic attention to ISec and privacy has taken on …
both personal and work environments, academic attention to ISec and privacy has taken on …
Understanding online safety behaviors: A protection motivation theory perspective
Internet users experience a variety of online security threats that require them to enact safety
precautions. Protection motivation theory (PMT) provides a theoretical framework for …
precautions. Protection motivation theory (PMT) provides a theoretical framework for …
What Users Do besides Problem-Focused Co** When Facing IT Security Threats
This paper investigates how individuals cope with IT security threats by taking into account
both problem-focused and emotion-focused co**. While problem-focused co** (PFC) …
both problem-focused and emotion-focused co**. While problem-focused co** (PFC) …
Mobile banking services adoption in Pakistan: are there gender differences?
Purpose The purpose of this paper is to provide a comprehensive insight into the deciding
factors affecting an individual's intention to adopt mobile banking (m-banking) services in …
factors affecting an individual's intention to adopt mobile banking (m-banking) services in …
“Security begins at home”: Determinants of home computer and mobile device security behavior
Personal computing users are vulnerable to information security threats, as they must
independently make decisions about how to protect themselves, often with little …
independently make decisions about how to protect themselves, often with little …