If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security
SR Boss, LJ Kirsch, I Angermeier… - European Journal of …, 2009 - Taylor & Francis
Abstract Information security has become increasingly important to organizations. Despite
the prevalence of technical security measures, individual employees remain the key link …
the prevalence of technical security measures, individual employees remain the key link …
The last line of defense: motivating employees to follow corporate security guidelines
L Kirsch, S Boss - ICIS 2007 proceedings, 2007 - aisel.aisnet.org
Abstract Information security has become increasingly important to organizations. Despite
the prevalence of technical security measures, individual employees remain the last line …
the prevalence of technical security measures, individual employees remain the last line …
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
Secure management of information systems is crucially important in information intensive
organizations. Although most organizations have long been using security technologies, it is …
organizations. Although most organizations have long been using security technologies, it is …
[PDF][PDF] Unpacking security policy compliance: The motivators and barriers of employees' security behaviors
The body of research that focuses on employees' Information Security Policy compliance is
problematic as it treats compliance as a single behavior. This study explored the underlying …
problematic as it treats compliance as a single behavior. This study explored the underlying …
Technical opinion Are employees putting your company at risk by not following information security policies?
M Siponen, MA Mahmood, S Pahnila - Communications of the ACM, 2009 - dl.acm.org
Introduction Careless employees, who do not follow information security policies, constitute
a serious threat to their organization. We conducted a field survey in order to understand …
a serious threat to their organization. We conducted a field survey in order to understand …
Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness
Many organizations recognize that their employees, who are often considered the weakest
link in information security, can also be great assets in the effort to reduce risk related to …
link in information security, can also be great assets in the effort to reduce risk related to …
Which factors explain employees' adherence to information security policies? An empirical study
S Pahnila, M Siponen, A Mahmood - 2007 - aisel.aisnet.org
It is widely agreed that a key threat to information security is caused by careless employees
who do not adhere to the information security policies of their organizations. In order to …
who do not adhere to the information security policies of their organizations. In order to …
Protection motivation and deterrence: a framework for security policy compliance in organisations
Enterprises establish computer security policies to ensure the security of information
resources; however, if employees and end-users of organisational information systems (IS) …
resources; however, if employees and end-users of organisational information systems (IS) …
[HTML][HTML] Seeing the forest and the trees: a meta-analysis of the antecedents to information security policy compliance
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …
(and noncompliance) with information security policies. However, the number of competing …
Employees' adherence to information security policies: An exploratory field study
M Siponen, MA Mahmood, S Pahnila - Information & management, 2014 - Elsevier
The key threat to information security comes from employees who do not comply with
information security policies. We developed a new multi-theory based model that explained …
information security policies. We developed a new multi-theory based model that explained …