Information Security Policy Compliance
@inproceedings{Li2019InformationSP, title={Information Security Policy Compliance}, author={Yuanxiang Li and E. Hoffman}, year={2019} }
One of the most challenging problems modern firms face is that their weakest link in maintaining information security is the behavior of employees: clicking on phishing emails, telling friends and family private information, and searching for private information about themselves (Loch, Carr and Warkentin 1992). A survey conducted by the Computer Security Institute reported that the average monetary loss per incident was $288,618 and that 44% of those who responded to the survey reported insider… Expand
7 Citations
Website Information Security and Privacy Concerns in 4IR: The Moderating Role of Trust in B2C e-Commerce
- Computer Science
- 2019
Organisational culture, procedural countermeasures, and employee security behaviour: A qualitative study
- Computer Science, Political Science
- Inf. Comput. Secur.
- 2017
- 21
- Highly Influenced
- PDF
Using protection motivation theory in the design of nudges to improve online security behavior
- Psychology, Computer Science
- Int. J. Hum. Comput. Stud.
- 2019
- 22
Susceptibility to phishing on social network sites: A personality information processing model
- Computer Science, Medicine
- Computers & Security
- 2020
- 4
- Highly Influenced
Information Security in Agile Software Development Projects: a Critical Success factor Perspective
- Computer Science
- ECIS
- 2019
- 1
- PDF
References
SHOWING 1-10 OF 83 REFERENCES
Organizations' Information Security Policy Compliance: Stick or Carrot Approach?
- Economics, Computer Science
- J. Manag. Inf. Syst.
- 2013
- 194
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- Business, Computer Science
- MIS Q.
- 2010
- 1,266
- PDF
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
- Business, Computer Science
- Decis. Support Syst.
- 2009
- 652
- Highly Influential
- PDF
Protection motivation and deterrence: a framework for security policy compliance in organisations
- Business, Computer Science
- Eur. J. Inf. Syst.
- 2009
- 888
- Highly Influential
- PDF
If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security
- Psychology, Computer Science
- Eur. J. Inf. Syst.
- 2009
- 320
- PDF
Compliance with Information Security Policies: An Empirical Investigation
- Computer Science
- Computer
- 2010
- 196
Don't make excuses! Discouraging neutralization to reduce IT policy violation
- Business, Computer Science
- Comput. Secur.
- 2013
- 110
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
- Psychology, Computer Science
- Inf. Syst. Res.
- 2009
- 900
- PDF
Human factors in information security: The insider threat - Who can you trust these days?
- Computer Science
- Inf. Secur. Tech. Rep.
- 2009
- 266
- Highly Influential
- PDF