Mar 14, 2015 | Research
Fear appeals, which are used widely in information security campaigns, have become common tools in motivating individual compliance with information security policies and procedures. However, empirical assessments of the effectiveness of fear appeals have yielded...Sep 10, 2012 | Research
This study finds individuals with differing personality traits react differently to the same conditions, and thus cyber security training should be tailored based on individual needs. Sep 3, 2012 | Research
Appropriate cybersecurity designs, especially within the workplace, should be based on an informed deep understanding of insider psychological profiles. Our research is designed to provide such knowledge. In this study, we identify some individual personality traits...Jan 1, 2012 | Research
Insiders represent a major threat to the security of an organization’s information resources (Warkentin & Willison, 2009; Stanton et al., 2005). Previous research has explored the role of protection motivation or of deterrence in promoting compliant behavior, but...Jun 14, 2010 | Research
Information technology executives strive to align the actions of end users with the desired security posture of management and of the firm through persuasive communication. In many cases, some element of fear is incorporated within these communications. However,...