Mar 10, 2014 | Research library
This is the second part of a longitudinal study that examines how employee Internet abuse may be reduced by non-technical deterrence methods, specifically via IT acceptable use policies (AUP). Both studies used actual usage and audit logs (not self-reporting measures)...
Mar 4, 2014 | Journal article, Research library
This paper aims to pinpoint the variables that impact compliance with organizational information security policies and to determine their significance. A systematic review of empirical studies from existing literature was conducted, with the variables investigated in...
Mar 1, 2014 | Research library
This paper addresses the primary threat to information security, which is non-compliance with security policies by employees. A new model was developed, integrating elements from the Protection Motivation Theory, the Theory of Reasoned Action, and the Cognitive...
Feb 12, 2014 | Research library
Fraudulent transactions occurring via the Internet or Automatic Teller Machines (ATMs) present a considerable problem for financial institutions and consumers alike. Whilst a number of technological improvements have helped reduce the likelihood of security breaches,...
Jan 31, 2014 | Research library
This study used a cross-sectional survey to test the relationships among social cognitive variables and employees’ counterproductive computer security behaviors (CCSB). We used data collected from 201 professionals in Canadian organizations. Components from...
Jan 31, 2014 | Research library
This study investigated employees’ information systems security policy (ISSP) compliance behavioural intentions in organisations from the theoretical lenses of social bonding, social influence, and cognitive processing. Given that previous research on ISSP compliance...