CybSafe
  • Why CybSafe?
    • Borderless security awareness
  • Products
    • Our technology
    • Awareness Hub
    • Behaviour Change Hub
    • Culture Hub
    • Managed Service Hub
    • Pricing
  • SebDB
    • About SebDB
  • Customers
    • Case studies
  • Company
    • About CybSafe
    • About our team
    • Research and Analysis
    • Events
    • Press
    • Careers
    • Legal
    • Contact us
    • Support
  • Resources
    • All Resources
    • Blog
    • Whitepapers
    • Research library
    • Webinars
  • Login
  • Watch the Demo
Select Page

The sufficiency of the theory of planned behavior for explaining information security policy compliance

Jun 23, 2015 | Research

This paper aims to challenge the assumption that the theory of planned behaviour (TPB) includes all constructs that explain information security policy compliance and investigates if anticipated regret or constructs from the protection motivation theory add...

Perceived information security risk as a function of probability and severity

Jan 1, 2015 | Research

Information security risks are frequently assessed in terms of the probability that a threat will be realized and the severity of the consequences of a realized threat. In methods and manuals, the product of this probability and severity is often thought of as the...

Variables influencing information security policy compliance: A systematic review of quantitative studies

Mar 4, 2014 | Research

The purpose of this paper is to identify variables that influence compliance with information security policies of organizations and to identify how important these variables are. A systematic review of empirical studies described in extant literature is performed....

Variables influencing information security policy compliance

Mar 4, 2014 | Research

The purpose of this paper is to identify variables that influence compliance with information security policies of organizations and to identify how important these variables are.

A review of the theory of planned behaviour in the context of information security policy compliance

Jul 1, 2013 | Research

The behaviour of employees influences information security in virtually all organisations. To inform the employees regarding what constitutes desirable behaviour, an information security policy can be formulated and communicated. However, not all employees comply with...
Sign up

Recent Posts

  • [Technology] Condeco
  • [TEISS2020] Panel discussion
  • [IMPACT2020] Laura Shipp – How private is your period?
  • [PEEPSEC] Professor David Carroll, Associate Professor of Media Design at Parsons School of Design
  • [PEEPSEC] James Linton, Social Engineer & Threat Hunter
cybsafe icon teal

Why CybSafe?

Borderless security awareness

Products

Our technology

Awareness Hub

Behaviour Change Hub

Culture Hub

Managed Service Hub

Pricing

Customers

Case studies

Support

Resources

All resources

Webinars

Whitepapers

Research library

Blog

Partners

Become a partner

Partner portal

Company

About CybSafe

About our team

About Research & Analysis

Events

Press

CybSafe careers

Contact us

Legal

  • Follow
  • Follow
Copyright © 2020 CybSafe Ltd. All Rights Reserved.
Privacy policy | Cookies policy | Terms of website use