[HTML][HTML] The whole of cyber defense: Syncing practice and theory

KM de Nobrega, AF Rutkowski, C Saunders - The Journal of Strategic …, 2024 - Elsevier
This review explores the problems Chief Information Security Officers (CISOs) and other
cyber professionals face when defending their organization against cyberattacks. Using a …

[HTML][HTML] Understanding extra-role security behaviors: An integration of self-determination theory and construal level theory

M Frank, V Kohn - Computers & Security, 2023 - Elsevier
Extra-role security behaviors (ERSBs)–spontaneous security behaviors that are not
prescribed in organizational security policies–are seen as a useful addition to securing …

A construal level theory approach to privacy protection: The conjoint impact of benefits and risks of information disclosure

R Butori, CL Miltgen - Journal of Business Research, 2023 - Elsevier
To stand out from the competition, companies collect massive amounts of personal
information, which they use to create memorable and personalized customer experiences …

Running field experiments using Facebook split test

DC Orazi, AC Johnston - Journal of Business Research, 2020 - Elsevier
Business researchers use experimental methods extensively due to their high internal
validity. However, controlled laboratory and crowdsourcing settings often introduce issues of …

The effects of knowledge mechanisms on employees' information security threat construal

A Mady, S Gupta, M Warkentin - Information Systems Journal, 2023 - Wiley Online Library
Organisations implement a variety of knowledge mechanisms such as information security
education, training and awareness (SETA) programs and information security policies, to …

Integrating elaboration likelihood model and herd theory in information security message persuasiveness

F Xu, M Warkentin - Computers & Security, 2020 - Elsevier
Determining how to design persuasive information security messages to increase
employees' engagement in protection-motivated behaviors is an important organizational …

Seeking rhetorical validity in fear appeal research: An application of rhetorical theory

A Johnston, PM Di Gangi, F Bélanger, RE Crossler… - Computers & …, 2023 - Elsevier
A significant focus of behavioral security research has been on understanding employees'
motives for protecting sensitive assets. To date, theorizing efforts in this space have focused …

Positively fearful: Activating the individual's HERO within to explain volitional security technology adoption

T Mattson, S Aurigemma, J Ren - Journal of the Association for …, 2023 - aisel.aisnet.org
Regardless of what security professionals do to motivate personal users to adopt security
technologies volitionally, the end result seems to be the same—low adoption rates. To …

Autonomous motivation and information security policy compliance: role of job satisfaction, responsibility, and deterrence

Y Hong, M Xu - Journal of Organizational and End User Computing …, 2021 - igi-global.com
Many existing studies focus on the effect of external influence mechanisms (eg, deterrence)
impacting information security policy compliance (ISPC). This study explores the formation of …

Threat specificity in fear appeals: examination of fear response and motivated behavior

K Sobol, M Giroux - Journal of Consumer Marketing, 2023 - emerald.com
Purpose A fear appeal is a communication tactic designed to scare people into adopting
desired behaviors (eg wash hands to avoid contracting COVID-19). While it is generally …