Information security awareness and behavior: a theory-based literature review
B Lebek, J Uffen, M Neumann, B Hohler… - Management …, 2014 - emerald.com
Purpose–This paper aims to provide an overview of theories used in the field of employees'
information systems (IS) security behavior over the past decade. Research gaps and …
information systems (IS) security behavior over the past decade. Research gaps and …
The role of user behaviour in improving cyber security management
Information security has for long time been a field of study in computer science, software
engineering, and information communications technology. The term 'information security'has …
engineering, and information communications technology. The term 'information security'has …
Toward a unified model of information security policy compliance
Information systems security (ISS) behavioral research has produced different models to
explain security policy compliance. This paper (1) reviews 11 theories that have served the …
explain security policy compliance. This paper (1) reviews 11 theories that have served the …
The acceptance of chatbots in an enterprise context–A survey study
F Brachten, T Kissmer, S Stieglitz - International Journal of Information …, 2021 - Elsevier
While Interactive systems such as Chatbots, are well known in personal environments with
technologies like “Apple's Siri” or the “Google's Assistant”, the acceptance of said …
technologies like “Apple's Siri” or the “Google's Assistant”, the acceptance of said …
Protection motivation and deterrence: a framework for security policy compliance in organisations
Enterprises establish computer security policies to ensure the security of information
resources; however, if employees and end-users of organisational information systems (IS) …
resources; however, if employees and end-users of organisational information systems (IS) …
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
Secure management of information systems is crucially important in information intensive
organizations. Although most organizations have long been using security technologies, it is …
organizations. Although most organizations have long been using security technologies, it is …
Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory
It is widely agreed that a large amount of information systems (IS) security incidents occur in
the workplace because employees subvert existing IS Security Policy (ISSP). In order to …
the workplace because employees subvert existing IS Security Policy (ISSP). In order to …
Proposing the control‐reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies
Organisations increasingly rely on information and related systems, which are also a source
of risk. Unfortunately, employees represent the greatest risk to organisational information …
of risk. Unfortunately, employees represent the greatest risk to organisational information …
The impact of leadership on employees' intended information security behaviour: An examination of the full‐range leadership theory
N Guhr, B Lebek, MH Breitner - Information Systems Journal, 2019 - Wiley Online Library
Explaining the influence of management leadership on employees' information security
behaviour is an important focus in information systems research and for companies and …
behaviour is an important focus in information systems research and for companies and …
Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture
WR Flores, E Antonsen, M Ekstedt - Computers & security, 2014 - Elsevier
This paper presents an empirical investigation on what behavioral information security
governance factors drives the establishment of information security knowledge sharing in …
governance factors drives the establishment of information security knowledge sharing in …