Mar 1, 2012 | Research library
This study examined contributing factors in the relationship between organizational culture and employee attitudes towards information security policy. Guiding the investigation was the question: To what extent, if any, is there a relationship between an...
Feb 12, 2012 | Research library
Research examining the information security behavior of individuals with respect to risk has focused primarily on only a handful of constructs; most of which have their roots in Protection Motivation Theory (PMT). However, there is still a lot we do not know about the...
Feb 11, 2012 | Research library
Researchers tested how harshness and unpredictability experienced in early childhood (age 0-5) and in later childhood (age 6-16) predicted sexual and risky behavior at age 23. Findings showed the strongest predictor of both sexual and risky behavior was an...
Feb 7, 2012 | Research library
To understand user behavior, researchers have examined intention to use, and system usage through some common conceptualizations such as actual usage, reported usage, and assessed usage. Although this entire body of research has produced important findings, it has yet...
Feb 4, 2012 | Research library
The Internet is a lucrative medium for criminals targeting Internet users. Most common Internet attacks require some form of user interaction such as clicking on an exploit link. Hence, the problem at hand is not only a technical one, but it also has a strong human...
Feb 1, 2012 | Research library
This research investigated information systems security policy (ISSP) compliance by drawing upon two relevant theories i.e. the theory of planned behavior (TPB) and the protection motivation theory (PMT). A research model that fused constituents of the aforementioned...