The Role of Situational Factors and Personality on Cybersecurity Policy Violation
Merrill Warkentin
2012
View PDFchevron_right
Exploring the Role of Individual Employee Characteristics and Personality on Employee Compliance with Cybersecurity Policies1
Maranda McBride
View PDFchevron_right
Motivation and opportunity based model to reduce information security insider threats in organisations
Nader Sohrabi Safa
View PDFchevron_right
Effects of Individual and Organization Based Beliefs and the Moderating Role of Work Experience on Insiders' Good Security Behaviors
Burcu Bulgurcu
2009
View PDFchevron_right
Behavioral and policy issues in information systems security: The insider threat
Merrill Warkentin
European Journal of Information Systems, 2009
View PDFchevron_right
Personality and Employees’ Information Security Behavior among Generational Cohorts
Dr. Javaid Syed, Salem University, Salem, WV, U.S.A, Dr. Ruth M Tappin
Computer and Information Science, 2021
View PDFchevron_right
Examining the impact of deterrence factors and norms on resistance to Information Systems Security
Mohammad Merhi
Computers in Human Behavior, 2019
View PDFchevron_right
Antecedent factors of violation of information security rules
Alexandre Cappellozza
RAUSP Management Journal
View PDFchevron_right
Development and validation of instruments of information security deviant behavior
Beatriz de Sousa
View PDFchevron_right
Future directions for behavioral information security research
Merrill Warkentin
Computers and Security, 2013
View PDFchevron_right
Personality and IT security: An application of the five-factor model
Mark Schmidt
2006
View PDFchevron_right
(2024) "The antecedents of employees’ proactive information security behavior: The perspective of proactive motivation," ISJ
Tawei (David) Wang, Paul Benjamin Lowry, Feng Xu
Information Systems Journal, 2024
View PDFchevron_right
Deterrence and prevention-based model to mitigate information security insider threats in organisations
Nader Sohrabi Safa
View PDFchevron_right
A Path Way to Successful Management of Individual Intention to Security Compliance: A Role of Organizational Security Climate
Dan J. Kim
SSRN Electronic Journal, 2013
View PDFchevron_right
Unpacking Security Policy Compliance: The Motivators and Barriers of Employees' Security Behaviors
Lynne Coventry
2015
View PDFchevron_right
“The Insider Threat” Comparing malicious and non-malicious information security behaviours using a rational choice model
Sean Browne
2018
View PDFchevron_right
(2017) Cognitive-affective drivers of employees’ daily compliance with information security policies: A multilevel, longitudinal Study, Information Systems Journal
Paul Benjamin Lowry
View PDFchevron_right
Evolvement of Information Security Research on Employees' Behavior: A Systematic Review and Future Direction
Mohamed Askar
2015 48th Hawaii International Conference on System Sciences, 2015
View PDFchevron_right
Personality Difference Associated with the Information Security Performance of Employees’ in the Information Network Security Agency (INSA)
Anemut Mehari
2022
View PDFchevron_right
Employee Rule Breakers, Excuse Makers and Security Champions
Angela Sasse
Proceedings of the 2015 New Security Paradigms Workshop, 2015
View PDFchevron_right
(2010). Be careful what you wish for: Proposing the IT policy control-reactance model (ITPCRM) to predict professionals’ intent to comply with new it security policies along with their resulting anger
Paul Benjamin Lowry
MIS Quarterly Pre-ICIS Workshop for Authors at the International Conference on System Sciences, St. Louis, Missouri, USA, December 1
View PDFchevron_right
Organizational Climate and Individual Factors Effects on Information Security Compliance Behaviour
Adnan Ajis
2013
View PDFchevron_right
A behavioral theory of insider-threat risks
Ignacio J . Martinez-Moyano
ACM Transactions on Modeling and Computer Simulation, 2008
View PDFchevron_right
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
Norm Archer
2011
View PDFchevron_right
(2011). Motivating the insider to protect organizational information assets: Evidence from protection motivation theory and rival explanations
Paul Benjamin Lowry
Dewald Roode Workshop in Information Systems Security 2011, Blacksburg, Virginia, USA, September 22–23, pp. 1–51
View PDFchevron_right
An Integrative Behavioral Model of Information Security Policy Compliance
Kyung Hoon Yang
The Scientific World Journal, 2014
View PDFchevron_right
Factors Influencing Employees' Participation in Non-Malicious, Information Systems Security Deviant Behavior: Focus on Formal Control Mechanisms and Sanctions
Princely Ifinedo
2017
View PDFchevron_right
Understanding Information Security Policy Violation from a Situational Action Perspective
Han Li
Journal of the Association for Information Systems, 2021
View PDFchevron_right
The dark side of leadership in information systems security: A model of the effect of manager transgressions on employee security behaviors
Jeffrey Wall
View PDFchevron_right
Exploring the Impacts of Individual Styles on Security Compliance Behavior: A Preliminary Analysis
Kweku-Muata Osei-Bryson
2017
View PDFchevron_right