Information security awareness and behavior: a theory-based literature review

B Lebek, J Uffen, M Neumann, B Hohler… - Management …, 2014 - emerald.com
Purpose–This paper aims to provide an overview of theories used in the field of employees'
information systems (IS) security behavior over the past decade. Research gaps and …

The role of user behaviour in improving cyber security management

AA Moustafa, A Bello, A Maurushat - Frontiers in Psychology, 2021 - frontiersin.org
Information security has for long time been a field of study in computer science, software
engineering, and information communications technology. The term 'information security'has …

Toward a unified model of information security policy compliance

GD Moody, M Siponen, S Pahnila - MIS quarterly, 2018 - JSTOR
Information systems security (ISS) behavioral research has produced different models to
explain security policy compliance. This paper (1) reviews 11 theories that have served the …

The acceptance of chatbots in an enterprise context–A survey study

F Brachten, T Kissmer, S Stieglitz - International Journal of Information …, 2021 - Elsevier
While Interactive systems such as Chatbots, are well known in personal environments with
technologies like “Apple's Siri” or the “Google's Assistant”, the acceptance of said …

Protection motivation and deterrence: a framework for security policy compliance in organisations

T Herath, HR Rao - European Journal of information systems, 2009 - Taylor & Francis
Enterprises establish computer security policies to ensure the security of information
resources; however, if employees and end-users of organisational information systems (IS) …

Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness

T Herath, HR Rao - Decision support systems, 2009 - Elsevier
Secure management of information systems is crucially important in information intensive
organizations. Although most organizations have long been using security technologies, it is …

Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory

L Cheng, Y Li, W Li, E Holm, Q Zhai - Computers & Security, 2013 - Elsevier
It is widely agreed that a large amount of information systems (IS) security incidents occur in
the workplace because employees subvert existing IS Security Policy (ISSP). In order to …

Proposing the control‐reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies

PB Lowry, GD Moody - Information Systems Journal, 2015 - Wiley Online Library
Organisations increasingly rely on information and related systems, which are also a source
of risk. Unfortunately, employees represent the greatest risk to organisational information …

The impact of leadership on employees' intended information security behaviour: An examination of the full‐range leadership theory

N Guhr, B Lebek, MH Breitner - Information Systems Journal, 2019 - Wiley Online Library
Explaining the influence of management leadership on employees' information security
behaviour is an important focus in information systems research and for companies and …

Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture

WR Flores, E Antonsen, M Ekstedt - Computers & security, 2014 - Elsevier
This paper presents an empirical investigation on what behavioral information security
governance factors drives the establishment of information security knowledge sharing in …