(2016). Examining the influence of organisational insiders’ psychological capital on information security threat and coping appraisals, Computers in Human Behavior
A. J. Burns, Paul Benjamin Lowry
View PDFchevron_right
Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals
Paul Benjamin Lowry
Computers in Human Behavior, 2017
View PDFchevron_right
(2010). Insiders' protection of organizational information assets: A multidimensional scaling study of protection-motivated behaviors
Paul Benjamin Lowry
Dewald Roode Workshop on IS Security Research 2010, IFIP WG 8.11 / 11.13, Waltham, Massachusetts, USA, October 8–
View PDFchevron_right
A behavioral theory of insider-threat risks
Ignacio J . Martinez-Moyano
ACM Transactions on Modeling and Computer Simulation, 2008
View PDFchevron_right
(2015) "The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets," Journal of Management Information Systems (JMIS)
Paul Benjamin Lowry
Journal of Management Information Systems
View PDFchevron_right
(2011). Motivating the insider to protect organizational information assets: Evidence from protection motivation theory and rival explanations
Paul Benjamin Lowry
Dewald Roode Workshop in Information Systems Security 2011, Blacksburg, Virginia, USA, September 22–23, pp. 1–51
View PDFchevron_right
Motivation and opportunity based model to reduce information security insider threats in organisations
Nader Sohrabi Safa
View PDFchevron_right
(2013). “Insiders’ protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors," MIS Quarterly (MISQ)
Paul Benjamin Lowry
MIS Quarterly, 2013
View PDFchevron_right
(2014). “Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders,” Information & Management
Paul Benjamin Lowry
Information & Management
View PDFchevron_right
Employee behavior: the psychological gateway for cyberattacks
Geraldine Holenweger
Organizational cybersecurity journal, 2024
View PDFchevron_right
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders
Tom Roberts, Paul Benjamin Lowry
Information & Management
View PDFchevron_right
Toward A Cognitive Analysis of Insider Threats
Joel Predd
View PDFchevron_right
Effects of Individual and Organization Based Beliefs and the Moderating Role of Work Experience on Insiders' Good Security Behaviors
Burcu Bulgurcu
2009
View PDFchevron_right
Emotional Acumen on the Propensity of Graduating Technology Students to Whistle-Blow About Organizational Cyber Security Breaches
Nimisha Bhargava
International Journal of Smart Education and Urban Society, 2018
View PDFchevron_right
Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization
Pei-lee Teh
Information & Management, 2019
View PDFchevron_right
Seven (Science-Based) Commandments for Understanding and Countering Insider Threats
Dr. Eric L . Lang
CITRAP "Counter-Insider Threat Research And Practice", 2022
View PDFchevron_right
(2024) "The antecedents of employees’ proactive information security behavior: The perspective of proactive motivation," ISJ
Tawei (David) Wang, Paul Benjamin Lowry, Feng Xu
Information Systems Journal, 2024
View PDFchevron_right
Reflections on Security Dynamics: Core Constructs, Psychological Mechanisms, Relational Contexts, and the Need for an Integrative Theory
Phillip Shaver
Psychological Inquiry, 2007
View PDFchevron_right
A human factors contribution to countering insider threats: Practical prospects from a novel approach to warning and avoiding
Anjali Anjali
Security Journal, 2017
View PDFchevron_right
Human Factor as Insider threat in Organizations
Journal of Computer Science IJCSIS
IJCSIS Vol 17 No 12 December Issue, 2019
View PDFchevron_right
SOFIT: Sociotechnical and Organizational Factors for Insider Threat
Frank Greitzer
2018 IEEE Security and Privacy Workshops (SPW)
View PDFchevron_right
Deterrence and prevention-based model to mitigate information security insider threats in organisations
Nader Sohrabi Safa
View PDFchevron_right
Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors
Paul Benjamin Lowry
MIS Quarterly, 2013
View PDFchevron_right
Leadership and the Psychology of Awareness: Three Theoretical Approaches to Information Security Management
Mikael Sundström
Organization Management Journal, 2012
View PDFchevron_right
Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes
Tom Roberts
Computers & Security
View PDFchevron_right
Inside and out? The Information Security Threat From Insiders
Robert Rowlingson
View PDFchevron_right
Connolly et al. (2015) Investigation of Employee Security Behaviour: A Grounded Theory Approach
Lena Connolly, Michael Lang
View PDFchevron_right
A Systematic Literature Review : Human Factor as Insider threat in Organizations
Journal of Computer Science IJCSIS
International Journal of Computer Science and Information Security (IJCSIS), Vol. 21, No. 6, 2023
View PDFchevron_right
Managing Corporate Computer Crime and the Insider Threat: the Role of Cognitive Distortion Theory
Mark A Harris
2012
View PDFchevron_right
Employee Moral Disengagement in Response to Stressful Information Security Requirements: A Methodological Replication of a Coping-Based Model
Kichan Nam
AIS Transactions on Replication Research, 2018
View PDFchevron_right
Why IT Security Needs Therapy
Annalina Buckmann
Computer Security. ESORICS 2021 International Workshops, 2022
View PDFchevron_right
Behavioral and policy issues in information systems security: The insider threat
Merrill Warkentin
European Journal of Information Systems, 2009
View PDFchevron_right
The emotional vulnerability of organizations
Marcelo Manucci
View PDFchevron_right
2020 "Going beyond deterrence: A middle-range theory of motives and controls for insider computer abuse", Information Systems Research
Paul Benjamin Lowry, A. J. Burns
Information Systems Research, 2022
View PDFchevron_right
Modeling and simulating insider cyber security Threats using psychosocial factors
Mark Ogonji
2013
View PDFchevron_right