UP - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1
hits: 8
1.
  • Employees' information secu... Employees' information security policy compliance: A norm activation perspective
    Yazdanmehr, Adel; Wang, Jingguo Decision Support Systems, December 2016, 2016-12-00, 20161201, Volume: 92
    Journal Article
    Peer reviewed
    Open access

    This study explores the role of norms in employees' compliance with an organizational information security policy (ISP). Drawing upon norm activation theory, social norms theory, and ethical climate ...
Full text

PDF
2.
  • Can peers help reduce viola... Can peers help reduce violations of information security policies? The role of peer monitoring
    Yazdanmehr, Adel; Wang, Jingguo European journal of information systems, 05/2023, Volume: 32, Issue: 3
    Journal Article
    Peer reviewed

    Peers may help others avoid violating organisational information security policies (ISPs). This study explores how peer monitoring reduces employee ISP violation intention. We propose that peer ...
Full text
3.
  • Does stress reduce violatio... Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies
    Yazdanmehr, Adel; Li, Yuan; Wang, Jingguo European journal of information systems, 11/2023, Volume: ahead-of-print, Issue: ahead-of-print
    Journal Article
    Peer reviewed

    Past research suggests that the demands of information security policies (ISPs) cause stress upon employees, leading them to violate the policies. It emphasises the distress process but overlooks a ...
Full text
4.
  • Peers matter: The moderatin... Peers matter: The moderating role of social influence on information security policy compliance
    Yazdanmehr, Adel; Wang, Jingguo; Yang, Zhiyong Information systems journal (Oxford, England), September 2020, Volume: 30, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    Information security in an organization largely depends on employee compliance with information security policy (ISP). Previous studies have mainly explored the effects of command‐and‐control and ...
Full text

PDF
5.
  • Employee responses to infor... Employee responses to information security related stress: Coping and violation intention
    Yazdanmehr, Adel; Li, Yuan; Wang, Jingguo Information systems journal (Oxford, England), 20/May , Volume: 33, Issue: 3
    Journal Article
    Peer reviewed

    Studies on employee responses to the information security policy (ISP) demands to show that employees who experience stress over the demands would resort to emotion‐focused coping to alleviate the ...
Full text
6.
Full text
7.
  • Continuous improvement of i... Continuous improvement of information security management: an organisational learning perspective
    Ghahramani, Fereshteh; Yazdanmehr, Adel; Chen, Daniel ... European journal of information systems, 11/2023, Volume: ahead-of-print, Issue: ahead-of-print
    Journal Article
    Peer reviewed

    This study explores ways to empower organisations to continuously improve their information security management (ISM). Drawing upon the dynamic capabilities approach, we investigated the mechanism ...
Full text
8.
  • Responding to identity thef... Responding to identity theft: A victimization perspective
    Li, Yuan; Yazdanmehr, Adel; Wang, Jingguo ... Decision Support Systems, 06/2019, Volume: 121
    Journal Article
    Peer reviewed
    Open access

    This study examines victims' responses to identity theft and antecedents to their responses. Drawing upon the victimization and coping literature, we recognize an emotional response called perceived ...
Full text
1
hits: 8

Load filters