[HTML][HTML] The whole of cyber defense: Syncing practice and theory
KM de Nobrega, AF Rutkowski, C Saunders - The Journal of Strategic …, 2024 - Elsevier
This review explores the problems Chief Information Security Officers (CISOs) and other
cyber professionals face when defending their organization against cyberattacks. Using a …
cyber professionals face when defending their organization against cyberattacks. Using a …
[HTML][HTML] Understanding extra-role security behaviors: An integration of self-determination theory and construal level theory
M Frank, V Kohn - Computers & Security, 2023 - Elsevier
Extra-role security behaviors (ERSBs)–spontaneous security behaviors that are not
prescribed in organizational security policies–are seen as a useful addition to securing …
prescribed in organizational security policies–are seen as a useful addition to securing …
A construal level theory approach to privacy protection: The conjoint impact of benefits and risks of information disclosure
R Butori, CL Miltgen - Journal of Business Research, 2023 - Elsevier
To stand out from the competition, companies collect massive amounts of personal
information, which they use to create memorable and personalized customer experiences …
information, which they use to create memorable and personalized customer experiences …
Running field experiments using Facebook split test
DC Orazi, AC Johnston - Journal of Business Research, 2020 - Elsevier
Business researchers use experimental methods extensively due to their high internal
validity. However, controlled laboratory and crowdsourcing settings often introduce issues of …
validity. However, controlled laboratory and crowdsourcing settings often introduce issues of …
The effects of knowledge mechanisms on employees' information security threat construal
Organisations implement a variety of knowledge mechanisms such as information security
education, training and awareness (SETA) programs and information security policies, to …
education, training and awareness (SETA) programs and information security policies, to …
Integrating elaboration likelihood model and herd theory in information security message persuasiveness
F Xu, M Warkentin - Computers & Security, 2020 - Elsevier
Determining how to design persuasive information security messages to increase
employees' engagement in protection-motivated behaviors is an important organizational …
employees' engagement in protection-motivated behaviors is an important organizational …
Seeking rhetorical validity in fear appeal research: An application of rhetorical theory
A significant focus of behavioral security research has been on understanding employees'
motives for protecting sensitive assets. To date, theorizing efforts in this space have focused …
motives for protecting sensitive assets. To date, theorizing efforts in this space have focused …
Positively fearful: Activating the individual's HERO within to explain volitional security technology adoption
Regardless of what security professionals do to motivate personal users to adopt security
technologies volitionally, the end result seems to be the same—low adoption rates. To …
technologies volitionally, the end result seems to be the same—low adoption rates. To …
Autonomous motivation and information security policy compliance: role of job satisfaction, responsibility, and deterrence
Many existing studies focus on the effect of external influence mechanisms (eg, deterrence)
impacting information security policy compliance (ISPC). This study explores the formation of …
impacting information security policy compliance (ISPC). This study explores the formation of …
Threat specificity in fear appeals: examination of fear response and motivated behavior
K Sobol, M Giroux - Journal of Consumer Marketing, 2023 - emerald.com
Purpose A fear appeal is a communication tactic designed to scare people into adopting
desired behaviors (eg wash hands to avoid contracting COVID-19). While it is generally …
desired behaviors (eg wash hands to avoid contracting COVID-19). While it is generally …