The Role of Individual Characteristics on Insider Abuse Intentions
@inproceedings{Warkentin2012TheRO, title={The Role of Individual Characteristics on Insider Abuse Intentions}, author={M. Warkentin and Maranda E. McBride and Lemuria Carter and A. Johnston}, booktitle={AMCIS}, year={2012} }
Insiders represent a major threat to the security of an organization’s information resources (Warkentin & Willison, 2009; Stanton et al., 2005). Previous research has explored the role of protection motivation or of deterrence in promoting compliant behavior, but these factors have not been studied together. Furthermore, other individual differences, such as the Big Five personality factors may serve as critical influences on cybersecurity compliance. In this study we use a factorial survey… CONTINUE READING
19 Citations
Identifying and predicting the factors affecting end-users' risk-taking behavior
- Psychology, Computer Science
- Inf. Comput. Secur.
- 2018
- 6
- PDF
Self-reported secure and insecure cyber behaviour: factor structure and associations with personality factors
- Psychology
- 2017
- 7
- PDF
Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior
- Psychology, Medicine
- PloS one
- 2018
- 1
- PDF
Risk as affect: The affect heuristic in cybersecurity
- Computer Science, Psychology
- Comput. Secur.
- 2020
- PDF
Personality, attitudes, and intentions: Predicting initial adoption of information security behavior
- Psychology, Computer Science
- Comput. Secur.
- 2015
- 154
- PDF
References
SHOWING 1-10 OF 58 REFERENCES
Beyond Deterrence: An Expanded View of Employee Computer Abuse
- Psychology, Computer Science
- MIS Q.
- 2013
- 371
- PDF
Fear Appeals and Information Security Behaviors: An Empirical Study
- Psychology, Computer Science
- MIS Q.
- 2010
- 837
- PDF
If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security
- Psychology, Computer Science
- Eur. J. Inf. Syst.
- 2009
- 319
- PDF
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
- Psychology, Computer Science
- Inf. Syst. Res.
- 2009
- 892
- PDF
Individual perceptions and the social construction of hate crimes: A factorial survey
- Psychology
- 2008
- 38
Impact of Negative Message Framing on Security Adoption
- Business, Computer Science
- J. Comput. Inf. Syst.
- 2010
- 22
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- Business, Computer Science
- MIS Q.
- 2010
- 1,259
- PDF
Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations
- Economics, Computer Science
- MIS Q.
- 2010
- 693
- Highly Influential