UP - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1 2 3 4 5
hits: 19,433
21.
  • Seeing the Forest and the T... Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance
    Cram, W. Alec; D'Arcy, John; Proudfoot, Jeffrey G. MIS quarterly, 06/2019, Volume: 43, Issue: 2
    Journal Article
    Peer reviewed

    A rich stream of research has identified numerous antecedents to employee compliance (and noncompliance) with information security policies. However, the number of competing theoretical perspectives ...
Full text
22.
  • Individual differences and ... Individual differences and Information Security Awareness
    McCormac, Agata; Zwaans, Tara; Parsons, Kathryn ... Computers in human behavior, April 2017, 2017-04-00, 20170401, Volume: 69
    Journal Article
    Peer reviewed

    The main purpose of this study was to examine the relationship between individuals' Information Security Awareness (ISA) and individual difference variables, namely age, gender, personality and ...
Full text
23.
  • Applications of social netw... Applications of social network analysis in behavioural information security research: Concepts and empirical analysis
    Dang-Pham, Duy; Pittayachawan, Siddhi; Bruno, Vince Computers & security, 07/2017, Volume: 68
    Journal Article
    Peer reviewed

    The rapid digital transformation and technological disruption in modern organisations demand the development of people-centric security workplaces, whereby the employees can build up their security ...
Full text
24.
Full text
25.
Full text

PDF
26.
  • Modelling the effects of pe... Modelling the effects of personal factors on information security awareness
    Albayrak, Ebru; Bağcı, Hakkı Journal of information science, 10/2022
    Journal Article
    Peer reviewed

    According to research, the number of attacks on the Internet has been increasing each year. Hence, information security awareness is a very significant skill. Accordingly, this study aimed to ...
Full text
27.
  • Compliance with Information... Compliance with Information Security Policies: An Empirical Investigation
    Siponen, M.; Pahnila, S.; Mahmood, M.A. Computer (Long Beach, Calif.), 2010-Feb., 2010-02-00, 20100201, Volume: 43, Issue: 2
    Journal Article
    Peer reviewed

    Information security was the main topic in this paper. An investigation of the compliance to information security policies were discussed. The author mentions that the insignificant relationship ...
Full text
28.
Full text
29.
  • Information security manage... Information security management: An information security retrieval and awareness model for industry
    Kritzinger, E.; Smith, E. Computers & security, 10/2008, Volume: 27, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    The purpose of this paper is to present a conceptual view of an Information Security Retrieval and Awareness (ISRA) model that can be used by industry to enhance information security awareness among ...
Full text

PDF
30.
  • Effects of sanctions, moral... Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures
    Vance, Anthony; Siponen, Mikko T.; Straub, Detmar W. Information & management, June 2020, 2020-06-00, Volume: 57, Issue: 4
    Journal Article
    Peer reviewed

    A principal concern of organizations is the failure of employees to comply with information security policies (ISPs). Deterrence theory is one of the most frequently used theories for examining ISP ...
Full text
1 2 3 4 5
hits: 19,433

Load filters