Learn More
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations' IS security policies and procedures. To address this concern , different approaches for ensuring employees' IS security policy compliance have been proposed. Prior research on IS security compliance has criticized these(More)
The level of end-user satisfaction with information technology (IT) has widely been accepted as an indicator of IT success. The present research synthesizes and validates the construct of IT end-user satisfaction using a meta-analysis. It accomplishes this by analysing the empirical results of 45 end-user satisfaction studies published between 1986 and 1998(More)
Information security was the main topic in this paper. An investigation of the compliance to information security policies were discussed. The author mentions that the insignificant relationship between rewards and actual compliance with information security policies does not make sense. Quite possibly this relationship results from not applying rewards for(More)
<b>Introduction</b> Careless employees, who do not follow information security policies, constitute a serious threat to their organization. We conducted a field survey in order to understand which factors help towards employees' compliance with these security policies. Our research shows that the visibility of the desired practices and normative(More)
User satisfaction has increasingly played an important role in information systems (IS) organizations' effectiveness. Does an IS organization's ability to design and develop increasingly effective systems depend on its maturity? Does maturity depend on bringing in state-of-the-art technology? Is maturity related to the organizational structure of the Data(More)