Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

Information security awareness and behavior: a theory-based literature review

B Lebek, J Uffen, M Neumann, B Hohler… - Management …, 2014 - emerald.com
Purpose–This paper aims to provide an overview of theories used in the field of employees'
information systems (IS) security behavior over the past decade. Research gaps and …

Seeing the forest and the trees

WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - JSTOR
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …

Health information privacy concerns, antecedents, and information disclosure intention in online health communities

X Zhang, S Liu, X Chen, L Wang, B Gao… - Information & Management, 2018 - Elsevier
This study explores the antecedents and consequences of health information privacy
concerns in online health communities by integrating the dual calculus and protection …

Understanding employee responses to stressful information security requirements: A co** perspective

J D'Arcy, T Herath, MK Shoss - Journal of management information …, 2014 - Taylor & Francis
We use co** theory to explore an underlying relationship between employee stress
caused by burdensome, complex, and ambiguous information security requirements …

What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors

SR Boss, DF Galletta, PB Lowry, GD Moody, P Polak - MIS quarterly, 2015 - JSTOR
Because violations of information security (ISec) and privacy have become ubiquitous in
both personal and work environments, academic attention to ISec and privacy has taken on …

Understanding online safety behaviors: A protection motivation theory perspective

HS Tsai, M Jiang, S Alhabash, R LaRose, NJ Rifon… - Computers & …, 2016 - Elsevier
Internet users experience a variety of online security threats that require them to enact safety
precautions. Protection motivation theory (PMT) provides a theoretical framework for …

What Users Do besides Problem-Focused Co** When Facing IT Security Threats

H Liang, Y Xue, A Pinsonneault, YA Wu - MIS quarterly, 2019 - JSTOR
This paper investigates how individuals cope with IT security threats by taking into account
both problem-focused and emotion-focused co**. While problem-focused co** (PFC) …

Mobile banking services adoption in Pakistan: are there gender differences?

R Glavee-Geo, AA Shaikh, H Karjaluoto - International Journal of bank …, 2017 - emerald.com
Purpose The purpose of this paper is to provide a comprehensive insight into the deciding
factors affecting an individual's intention to adopt mobile banking (m-banking) services in …

“Security begins at home”: Determinants of home computer and mobile device security behavior

N Thompson, TJ McGill, X Wang - computers & security, 2017 - Elsevier
Personal computing users are vulnerable to information security threats, as they must
independently make decisions about how to protect themselves, often with little …