CybSafe
  • Home
  • Behaviour-IQ
  • CybSafe Connect app
  • SebDB
  • About us
  • Login
Select Page

The sufficiency of the theory of planned behavior for explaining information security policy compliance

Jun 23, 2015 | Research

This paper aims to challenge the assumption that the theory of planned behaviour (TPB) includes all constructs that explain information security policy compliance and investigates if anticipated regret or constructs from the protection motivation theory add...

Perceived information security risk as a function of probability and severity

Jan 1, 2015 | Research

Information security risks are frequently assessed in terms of the probability that a threat will be realized and the severity of the consequences of a realized threat. In methods and manuals, the product of this probability and severity is often thought of as the...

Variables influencing information security policy compliance: A systematic review of quantitative studies

Mar 4, 2014 | Research

The purpose of this paper is to identify variables that influence compliance with information security policies of organizations and to identify how important these variables are. A systematic review of empirical studies described in extant literature is performed....

Variables influencing information security policy compliance

Mar 4, 2014 | Research

The purpose of this paper is to identify variables that influence compliance with information security policies of organizations and to identify how important these variables are.

A review of the theory of planned behaviour in the context of information security policy compliance

Jul 1, 2013 | Research

The behaviour of employees influences information security in virtually all organisations. To inform the employees regarding what constitutes desirable behaviour, an information security policy can be formulated and communicated. However, not all employees comply with...
Sign up

Recent Posts

  • How successful was the UK’s National Cyber Security Strategy (NCSS) 2016-2021?
  • How can phishing affect a business?
  • How can we prepare for the challenges of hybrid working in 2021?
  • What the government must do to tackle cyber crime
  • CybSafe secures £5.6 million Series A1 investment round
cybsafe icon teal

CybSafe

Why CybSafe?

Borderless security awareness

Product

Product

Our technology

Awareness Hub

Behaviour Change Hub

Culture Hub

Managed Service Hub

Pricing

Customers

Our customers

Case studies

Support

Partners

Become a partner

Partner portal

Resources

All resources

Blog

Webinars

Whitepapers

Research library

Help

Help centre

Contact us

Company

About us

About our team

About Research & Analysis

Events

Press

Careers

Legal

CybStore

  • Follow
  • Follow
Copyright © 2021 CybSafe Ltd. All Rights Reserved. 
Privacy policy | Cookies policy | Terms of website use