Learn More
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations' IS security policies and procedures. To address this concern , different approaches for ensuring employees' IS security policy compliance have been proposed. Prior research on IS security compliance has criticized these(More)
Information security was the main topic in this paper. An investigation of the compliance to information security policies were discussed. The author mentions that the insignificant relationship between rewards and actual compliance with information security policies does not make sense. Quite possibly this relationship results from not applying rewards for(More)
The level of end-user satisfaction with information technology (IT) has widely been accepted as an indicator of IT success. The present research synthesizes and validates the construct of IT end-user satisfaction using a meta-analysis. It accomplishes this by analysing the empirical results of 45 end-user satisfaction studies published between 1986 and 1998(More)
The key threat to information security is constituted by careless employees who do not comply with information security policies. To ensure that employees comply with organizations' information security procedures, a number of information security policy compliance measures have been proposed in the past. Prior research has criticized these measures as(More)
<b>Introduction</b> Careless employees, who do not follow information security policies, constitute a serious threat to their organization. We conducted a field survey in order to understand which factors help towards employees' compliance with these security policies. Our research shows that the visibility of the desired practices and normative(More)