Information security policies: a content analysis

Reading Time: 1 minuteAmong information security controls, the literature gives a central role to information security policies. However, there is a reduced number of empirical studies about the features and components of information security policies. This research...

Perception of information security

Reading Time: 1 minuteThe objective of this study was to investigate people’s perception of information security and to unveil the factors that influence people’s perception of different threats to information security. In the survey study, 602 respondents were asked...

Risk communication, risk perception and information security

Reading Time: 1 minuteThis paper puts forward the view that an individuals perception of the risks associated with information systems determines the likelihood and extent to which she or he will engage in risk taking behaviour when using a computer. It is suggested...