Mar 4, 2014 | Journal article, Research library
This paper aims to pinpoint the variables that impact compliance with organizational information security policies and to determine their significance. A systematic review of empirical studies from existing literature was conducted, with the variables investigated in...
Jan 5, 2014 | Journal article, Research library
Software engineering researcher Shari Lawrence Pfleeger and her co-authors review the latest psychological research on moral values and habit formation, discussing how principles and theories can be leverages to encourage people to behave in a cyber secure manner....
May 31, 2013 | Journal article, Research library
Past research on information technology (IT) security training and awareness has focused on informing employees about security policies and formal sanctions for violating those policies. However, research suggests that deterrent sanctions may not be the most powerful...
Oct 31, 2012 | Journal article, Research library
Computer self-efficacy (CSE) has been a popular and important construct in information systems research for more than two decades. Although CSE researchers have conducted extensive qualitative reviews, quantitative analyses are lacking for studies of the relationships...
Oct 15, 2012 | Journal article, Research library
We proposed and empirically tested a mediating model for examining the effects of multilevel sanctions on preventing information security violations in the workplace. The results of the experiment suggested that personal self-sanctions and workgroup sanctions have...
Sep 10, 2012 | Journal article, Research library
This study finds individuals with differing personality traits react differently to the same conditions, and thus cyber security training should be tailored based on individual needs.