-
2
-
-
84967321284
-
Risk and morality: Three framing devices
-
J. Adams. Risk and morality: Three framing devices. Risk and morality:87-106, 2003.
-
(2003)
Risk and Morality
, pp. 87-106
-
-
Adams, J.1
-
3
-
-
34249871944
-
A qualitative study of users' view on information security
-
E. Albrechtsen. A qualitative study of users' view on information security. Computers & security, 26(4):276-289, 2007.
-
(2007)
Computers & Security
, vol.26
, Issue.4
, pp. 276-289
-
-
Albrechtsen, E.1
-
4
-
-
67649708310
-
The information security digital divide between information security managers and users
-
E. Albrechtsen and J. Hovden. The information security digital divide between information security managers and users. Computers & security, 28(6):476-490, 2009.
-
(2009)
Computers & Security
, vol.28
, Issue.6
, pp. 476-490
-
-
Albrechtsen, E.1
Hovden, J.2
-
5
-
-
77957909604
-
Modelling the human and technological costs and benefits of USB memory stick security
-
A. Beautement, R. Coles, J. Griffin, C. Andronis, B. Monahan, D. Pym, M. A. Sasse and M. Wonham. Modelling the human and technological costs and benefits of USB memory stick security. Managing information risk and the economics of security:141-163, 2009.
-
(2009)
Managing Information Risk and the Economics of Security
, pp. 141-163
-
-
Beautement, A.1
Coles, R.2
Griffin, J.3
Andronis, C.4
Monahan, B.5
Pym, D.6
Sasse, M.A.7
Wonham, M.8
-
7
-
-
85075913934
-
Combining qualitative coding and sentiment analysis: Deconstructing perceptions of usable security in organisations
-
IEEE, San Jose, California, US
-
I. Becker, S. Parkin and M. A. Sasse. Combining qualitative coding and sentiment analysis: deconstructing perceptions of usable security in organisations. In. Learning from Authoritative Security Experiment Results (LASER). IEEE, San Jose, California, US, 2016.
-
(2016)
Learning from Authoritative Security Experiment Results (LASER)
-
-
Becker, I.1
Parkin, S.2
Sasse, M.A.3
-
8
-
-
85075947116
-
Employee rule breakers, excuse makers and security champions: Mapping the risk perceptions and emotions that drive security behaviors
-
Twente, Netherlands
-
O. Beris, A. Beautement and M. A. Sasse. Employee rule breakers, excuse makers and security champions: mapping the risk perceptions and emotions that drive security behaviors. In. NSPW. ACM, Twente, Netherlands, 2015.
-
(2015)
NSPW. ACM
-
-
Beris, O.1
Beautement, A.2
Sasse, M.A.3
-
9
-
-
85075940742
-
Unpacking security policy compliance: The motivators and barriers of employees' security behaviors
-
USENIX Association, Ottawa
-
J. M. Blythe, L. Coventry and L. Little. Unpacking security policy compliance: the motivators and barriers of employees' security behaviors. In Symposium On Usable Privacy and Security (SOUPS). USENIX Association, Ottawa, 2015, pages 103-122.
-
(2015)
Symposium on Usable Privacy and Security (SOUPS)
, pp. 103-122
-
-
Blythe, J.M.1
Coventry, L.2
Little, L.3
-
11
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
B. Bulgurcu, H. Cavusoglu and I. Benbasat. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 34(3):523-548, 2010.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
12
-
-
84876570327
-
Future directions for behavioral information security research
-
R. E. Crossler, A. C. Johnston, P. B. Lowry, Q. Hu, M. Warkentin and R. Baskerville. Future directions for behavioral information security research. Computers & security, 32:90-101, 2013.
-
(2013)
Computers & Security
, vol.32
, pp. 90-101
-
-
Crossler, R.E.1
Johnston, A.C.2
Lowry, P.B.3
Hu, Q.4
Warkentin, M.5
Baskerville, R.6
-
13
-
-
84926419890
-
Understanding employee responses to stressful information security requirements: A coping perspective
-
J. D'Arcy, T. Herath and M. K. Shoss. Understanding employee responses to stressful information security requirements: a coping perspective. Journal of management information systems, 31(2):285-318, 2014.
-
(2014)
Journal of Management Information Systems
, vol.31
, Issue.2
, pp. 285-318
-
-
D'Arcy, J.1
Herath, T.2
Shoss, M.K.3
-
14
-
-
23044525969
-
Current directions in is security research: Towards socio-organizational perspectives
-
G. Dhillon and J. Backhouse. Current directions in is security research: towards socio-organizational perspectives. Information systems journal, 11(2):127-153, 2001.
-
(2001)
Information Systems Journal
, vol.11
, Issue.2
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
15
-
-
81255163048
-
Understanding nonmalicious security violations in the workplace: A composite behavior model
-
K. H. Guo, Y. Yuan, N. P. Archer and C. E. Connelly. Understanding nonmalicious security violations in the workplace: a composite behavior model. Journal of management information systems, 28(2):203-236, 2011.
-
(2011)
Journal of Management Information Systems
, vol.28
, Issue.2
, pp. 203-236
-
-
Guo, K.H.1
Yuan, Y.2
Archer, N.P.3
Connelly, C.E.4
-
16
-
-
77950877250
-
So long, and no thanks for the externalities: The rational rejection of security advice by users
-
C. Herley. So long, and no thanks for the externalities: the rational rejection of security advice by users. In New Security Paradigms Workshop (NSPW), 2009, pages 133-144.
-
(2009)
New Security Paradigms Workshop (NSPW)
, pp. 133-144
-
-
Herley, C.1
-
19
-
-
84897916714
-
Determining employee awareness using the human aspects of information security questionnaire (HAIS-q)
-
K. Parsons, A. McCormac, M. Butavicius, M. Pattinson and C. Jerram. Determining employee awareness using the human aspects of information security questionnaire (HAIS-q). Computers & security, 42:165-176, 2014.
-
(2014)
Computers & Security
, vol.42
, pp. 165-176
-
-
Parsons, K.1
McCormac, A.2
Butavicius, M.3
Pattinson, M.4
Jerram, C.5
-
21
-
-
84925444851
-
From weakest link to security hero: Transforming staff security behavior
-
S. L. Pfleeger, M. A. Sasse and A. Furnham. From weakest link to security hero: transforming staff security behavior. Jhsem, 11(4):489-510, 2014.
-
(2014)
Jhsem
, vol.11
, Issue.4
, pp. 489-510
-
-
Pfleeger, S.L.1
Sasse, M.A.2
Furnham, A.3
-
23
-
-
84863482048
-
Blaming noncompliance is too convenient: What really causes information breaches?
-
K. Renaud. Blaming noncompliance is too convenient: what really causes information breaches? Security & privacy, IEEE, 10(3):57-63, 2012.
-
(2012)
Security & Privacy, IEEE
, vol.10
, Issue.3
, pp. 57-63
-
-
Renaud, K.1
-
24
-
-
84903744055
-
The curious incidence of security breaches by knowledgeable employees and the pivotal role a of security culture
-
Springer
-
K. Renaud and W. Goucher. The curious incidence of security breaches by knowledgeable employees and the pivotal role a of security culture. In, Human Aspects of Information Security, Privacy, and Trust, pages 361-372. Springer, 2014.
-
(2014)
Human Aspects of Information Security, Privacy, and Trust
, pp. 361-372
-
-
Renaud, K.1
Goucher, W.2
-
25
-
-
71949094501
-
Self-efficacy in information security: Its influence on end users' information security practice behavior
-
H.-S. Rhee, C. Kim and Y. U. Ryu. Self-efficacy in information security: its influence on end users' information security practice behavior. Computers & security, 28(8):816-826, 2009.
-
(2009)
Computers & Security
, vol.28
, Issue.8
, pp. 816-826
-
-
Rhee, H.-S.1
Kim, C.2
Ryu, Y.U.3
-
27
-
-
36248967046
-
Employees' adherence to information security policies: An empirical study
-
Springer
-
M. Siponen, S. Pahnila and A. Mahmood. Employees' adherence to information security policies: an empirical study. In, New Approaches for Security, Privacy and Trust in Complex Environments, pages 133-144. Springer, 2007.
-
(2007)
New Approaches for Security, Privacy and Trust in Complex Environments
, pp. 133-144
-
-
Siponen, M.1
Pahnila, S.2
Mahmood, A.3
-
28
-
-
77957068563
-
Neutralization: New insights into the problem of employee information systems security policy violations
-
M. Siponen and A. Vance. Neutralization: new insights into the problem of employee information systems security policy violations. MIS quarterly, 34(3):487, 2010.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 487
-
-
Siponen, M.1
Vance, A.2
-
29
-
-
17844366573
-
Analysis of end user security behaviors
-
J. M. Stanton, K. R. Stam, P. Mastrangelo and J. Jolton. Analysis of end user security behaviors. Computers & security, 24(2):124-133, 2005.
-
(2005)
Computers & Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
31
-
-
33744520370
-
Towards an information security competence maturity model
-
2006
-
K.-L. Thomson and R. von Solms. Towards an information security competence maturity model. Computer fraud & security, 2006(5):11-15, 2006.
-
(2006)
Computer Fraud & Security
, Issue.5
, pp. 11-15
-
-
Thomson, K.-L.1
Von Solms, R.2
-
32
-
-
84930200251
-
Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs
-
A. Tsohou, M. Karyda and S. Kokolakis. Analyzing the role of cognitive and cultural biases in the internalization of information security policies: recommendations for information security awareness programs. Computers & security, 52:128-141, 2015.
-
(2015)
Computers & Security
, vol.52
, pp. 128-141
-
-
Tsohou, A.1
Karyda, M.2
Kokolakis, S.3
-
33
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
M. Workman, W. H. Bommer and D. Straub. Security lapses and the omission of information security measures: a threat control model and empirical test. Computers in human behavior, 24(6):2799-2816, 2008.
-
(2008)
Computers in Human Behavior
, vol.24
, Issue.6
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.H.2
Straub, D.3
|