Mar 1, 2014 | Research library
This paper addresses the primary threat to information security, which is non-compliance with security policies by employees. A new model was developed, integrating elements from the Protection Motivation Theory, the Theory of Reasoned Action, and the Cognitive...
Feb 12, 2014 | Research library
Fraudulent transactions occurring via the Internet or Automatic Teller Machines (ATMs) present a considerable problem for financial institutions and consumers alike. Whilst a number of technological improvements have helped reduce the likelihood of security breaches,...
Jan 31, 2014 | Research library
This study used a cross-sectional survey to test the relationships among social cognitive variables and employees’ counterproductive computer security behaviors (CCSB). We used data collected from 201 professionals in Canadian organizations. Components from...
Jan 31, 2014 | Research library
This study investigated employees’ information systems security policy (ISSP) compliance behavioural intentions in organisations from the theoretical lenses of social bonding, social influence, and cognitive processing. Given that previous research on ISSP compliance...
Jan 10, 2014 | Research library
This paper reports on the researchers’ efforts to collect and analyse data from unintentional insider threats, noting how difficult data collection and analysis is in this area. Researchers note overcoming data collection and analysis issues is and will be...
Jan 10, 2014 | Research library
Organizations have long relied upon the threat of sanctions to influence employees to follow information security policies. Unfortunately, the belief in the power of deterrence has provided mixed results in both research and in real life. This study explored the...