13,612
Views
219
CrossRef citations to date
0
Altmetric
Guest Editorial

Behavioral and policy issues in information systems security: the insider threat

Pages 101-105 | Published online: 19 Dec 2017

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (31)

Rathika Palanisamy, Azah Anir Norman & Miss Laiha Mat Kiah. (2024) Employees’ BYOD Security Policy Compliance in the Public Sector. Journal of Computer Information Systems 64:1, pages 62-77.
Read now
Feng Lin, Xiaoning Qian, Bobak Mortazavi, Zhangyang Wang, Shuai Huang & Cynthia Chen. (2023) Modeling user choice behavior under data corruption: Robust learning of the latent decision threshold model. IISE Transactions 0:0, pages 1-14.
Read now
Princely Ifinedo. (2023) Exploring Personal and Environmental Factors that Can Reduce Nonmalicious Information Security Violations. Information Systems Management 40:4, pages 316-336.
Read now
Hsieh-Hong Huang & Jian-Wei Lin. (2023) Inconsistencies Between Information Security Policy Compliance and Shadow IT Usage. Journal of Computer Information Systems 0:0, pages 1-11.
Read now
Lakshmi Goel, Justin Zuopeng Zhang & Steven Williamson. (2023) IT assimilation: construct, measurement, and implications in cybersecurity. Enterprise Information Systems 17:7.
Read now
Rahul Dwivedi, Sridhar Nerur & George Mangalaraj. (2023) Predicting Insider Breaches Using Employee Reviews. Journal of Computer Information Systems 0:0, pages 1-15.
Read now
Botong Xue, Merrill Warkentin, Leigh A. Mutchler & Puzant Balozian. (2023) Self-efficacy in Information Security: A Replication Study. Journal of Computer Information Systems 63:1, pages 1-10.
Read now
Charlette Donalds & Corlane Barclay. (2022) Beyond technical measures: a value-focused thinking appraisal of strategic drivers in improving information security policy compliance. European Journal of Information Systems 31:1, pages 58-73.
Read now
Malte Dewies, Astrid Schop-Etman, Kirsten I. M. Rohde & Semiha Denktaş. (2021) Nudging is Ineffective When Attitudes Are Unsupportive: An Example from a Natural Field Experiment. Basic and Applied Social Psychology 43:4, pages 213-225.
Read now
Gaurav Bansal. (2021) Restoring Trust after an Insider Breach: Both the Genders Matter—CEOs and Users. Journal of Computer Information Systems 61:1, pages 11-29.
Read now
Bora Kim, Do-Yeon Lee & Beomsoo Kim. (2020) Deterrent effects of punishment and training on insider security threats: a field experiment on phishing attacks. Behaviour & Information Technology 39:11, pages 1156-1175.
Read now
Areej Alyami, David Sammon, Karen Neville & Carolanne Mahony. (2020) Exploring IS security themes: a literature analysis. Journal of Decision Systems 29:sup1, pages 425-437.
Read now
Xue Yang, Xinwei Wang, Wei Thoo Yue, Choon Ling Sia & Xin (Robert) Luo. (2019) Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD) – A Persuasion and Cognitive Elaboration Perspective. Journal of Organizational Computing and Electronic Commerce 29:4, pages 274-293.
Read now
Habib Ullah Khan & Khalid A. AlShare. (2019) Violators versus non-violators of information security measures in organizations—A study of distinguishing factors. Journal of Organizational Computing and Electronic Commerce 29:1, pages 4-23.
Read now
Giuseppe Cascavilla, Mauro Conti, David G. Schwartz & Inbal Yahav. (2018) The insider on the outside: a novel system for the detection of information leakers in social networks. European Journal of Information Systems 27:4, pages 470-485.
Read now
Paul Benjamin Lowry, Tamara Dinev & Robert Willison. (2017) Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda. European Journal of Information Systems 26:6, pages 546-563.
Read now
Clay Posey, Uzma Raja, Robert E. Crossler & A. J. Burns. (2017) Taking stock of organisations’ protection of privacy: categorising and assessing threats to personally identifiable information in the USA. European Journal of Information Systems 26:6, pages 585-604.
Read now
Rajinder Sandhu, Amandeep Singh Sohal & Sandeep K. Sood. (2017) Identification of malicious edge devices in fog computing environments. Information Security Journal: A Global Perspective 26:5, pages 213-228.
Read now
Shirley Ou Yang, Carol Hsu, Suprateek Sarker & Allen S. Lee. (2017) Enabling Effective Operational Risk Management in a Financial Institution: An Action Research Study. Journal of Management Information Systems 34:3, pages 727-753.
Read now
Elina Niemimaa & Marko Niemimaa. (2017) Information systems security policy implementation in practice: from best practices to situated practices. European Journal of Information Systems 26:1, pages 1-20.
Read now
Mahmud Akhter Shareef, Yogesh K. Dwivedi, Sven Laumer & Norm Archer. (2016) Citizens’ Adoption Behavior of Mobile Government (mGov): A Cross-Cultural Study. Information Systems Management 33:3, pages 268-283.
Read now
Bonnie Brinton Anderson, Anthony Vance, C Brock Kirwan, David Eargle & Jeffrey L Jenkins. (2016) How users perceive and respond to security messages: a NeuroIS research agenda and empirical study. European Journal of Information Systems 25:4, pages 364-390.
Read now
Allen C Johnston, Merrill Warkentin, Maranda McBride & Lemuria Carter. (2016) Dispositional and situational factors: influences on information security policy violations. European Journal of Information Systems 25:3, pages 231-251.
Read now
Gongjun Yan, Kenneth Shemroske & Gary Black. (2014) Altering Security Perceptions Through the Use of Geo-Authentication. Journal of Information Privacy and Security 10:4, pages 225-235.
Read now
Michele Maasberg & Nicole L. Beebe. (2014) The Enemy Within the Insider: Detecting the Insider Threat Through Addiction Theory. Journal of Information Privacy and Security 10:2, pages 59-70.
Read now
Jeffrey D. Wall, Prashant Palvia & Paul Benjamin Lowry. (2013) Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy. Journal of Information Privacy and Security 9:4, pages 52-79.
Read now
Jian Hua & Sanjay Bapna. (2013) Who Can We Trust?: The Economic Impact of Insider Threats. Journal of Global Information Technology Management 16:4, pages 47-67.
Read now
John D'Arcy & Tejaswini Herath. (2011) A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings. European Journal of Information Systems 20:6, pages 643-658.
Read now
Kaushik Ghosh, Parag Dhumal & Sudhir Chawla. (2011) Viability of Fee-Based Email Service for Retail Customers. Journal of Computer Information Systems 52:1, pages 56-65.
Read now
Merrill Warkentin, Allen C Johnston & Jordan Shropshire. (2011) The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. European Journal of Information Systems 20:3, pages 267-284.
Read now
Jordan D. Shropshire, Merrill Warkentin & Allen C. Johnston. (2010) Impact of Negative Message Framing on Security Adoption. Journal of Computer Information Systems 51:1, pages 41-51.
Read now

Articles from other publishers (188)

Gregory Lyon. (2023) Informational inequality: the role of resources and attributes in information security awareness. Information & Computer Security 32:2, pages 197-217.
Crossref
Ozcan Ozyurt & Ahmet Ayaz. (2024) Identifying cyber security competencies and skills from online job advertisements through topic modeling. Security Journal.
Crossref
Xiaolong Wang, Changlin Wang, Tianyu Yi & Wenli Li. (2024) Understanding the deterrence effect of punishment for marine information security policies non-compliance. Journal of Ocean Engineering and Science 9:1, pages 9-12.
Crossref
Malte Greulich, Sebastian Lins, Daniel Pienta, Jason Bennett Thatcher & Ali Sunyaev. (2024) Exploring Contrasting Effects of Trust in Organizational Security Practices and Protective Structures on Employees’ Security-Related Precaution Taking. Information Systems Research.
Crossref
Keshnee Padayachee. (2024) An exploration of dark and light triad personality traits towards situational crime prevention and compliant information security behaviour. Information & Computer Security.
Crossref
Karen Renaud, Merrill Warkentin, Ganna Pogrebna & Karl van der Schyff. (2024) VISTA: An inclusive insider threat taxonomy, with mitigation strategies. Information & Management 61:1, pages 103877.
Crossref
Nan (Peter) Liang, Rudy Hirschheim, Xin (Robert) Luo & Hayden Hollingsworth. (2023) Identifying the idiosyncrasies of behavioral information security discourse and proposing future research directions: A Foucauldian perspective. Journal of Information Technology 38:4, pages 382-415.
Crossref
Mücahit KUTSAL, Bihter DAŞ, Ziya AŞKAR, Ali Necdet GÜVERCİN & Resul DAŞ. (2023) Detection of Shadow IT Incidents for Centralized IT Management in Enterprises using Statistical and Machine Learning Algorithms. European Journal of Technic.
Crossref
Clay Posey & Mindy Shoss. (2023) Employees as a Source of Security Issues in Times of Change and Stress: A Longitudinal Examination of Employees’ Security Violations during the COVID-19 Pandemic. Journal of Business and Psychology.
Crossref
Xiaolong Wang, Changlin Wang, Zaiguan Sun & Chunhui Wang. (2023) An optimal coupling incentive mechanism concerning insider's compliance behavior towards marine information security policy. Journal of Ocean Engineering and Science 8:5, pages 573-575.
Crossref
Yuanxiang John Li & Elizabeth Hoffman. (2023) Designing an incentive mechanism for information security policy compliance: An experiment. Journal of Economic Behavior & Organization 212, pages 138-159.
Crossref
Thomas E. Dearden, Katalin Parti, James Hawdon, Randy Gainey, Tancy Vandecar-Burdin & Jay Albanese. (2023) Differentiating Insider and Outsider Cyberattacks on Businesses. American Journal of Criminal Justice 48:4, pages 871-886.
Crossref
Ashraf Mady, Saurabh Gupta & Merrill Warkentin. (2023) The effects of knowledge mechanisms on employees' information security threat construal. Information Systems Journal 33:4, pages 790-841.
Crossref
Joseph K. Nwankpa & Pratim Milton Datta. (2023) Remote vigilance: The roles of cyber awareness and cybersecurity policies among remote workers. Computers & Security 130, pages 103266.
Crossref
Muhammad Ali Fauzi, Prosper Yeng, Bian Yang, Dita Rachmayani & Peter Nimbe. (2023) Examining the Relationship Between Stress Levels and Cybersecurity Practices Among Hospital Employees in Three Countries: Ghana, Norway, and Indonesia. Examining the Relationship Between Stress Levels and Cybersecurity Practices Among Hospital Employees in Three Countries: Ghana, Norway, and Indonesia.
Mohammed Abbas & Adnan Alghail. (2021) The impact of mobile shadow IT usage on knowledge protection: an exploratory study. VINE Journal of Information and Knowledge Management Systems 53:4, pages 830-848.
Crossref
Derrick Boakye, David Sarpong, Dirk Meissner & George Ofosu. (2023) How TalkTalk did the walk-walk: strategic reputational repair in a cyber-attack. Information Technology & People.
Crossref
Pierre‐Emmanuel Arduin. (2021) A cognitive approach to the decision to trust or distrust phishing emails. International Transactions in Operational Research 30:3, pages 1263-1298.
Crossref
Yadagiri Vamsi Krishna, Gudipudi Jahnavi, Medam Tharun, Sravya Geethika Yegineti, G. Raja & B. Suneetha. (2023) Survey: Analysis of Security Issues on Social Media using Data Science techniques. Survey: Analysis of Security Issues on Social Media using Data Science techniques.
Wen-Lung Shiau, Xiaoqun Wang & Fei Zheng. (2023) What are the trend and core knowledge of information security? A citation and co-citation analysis. Information & Management 60:3, pages 103774.
Crossref
Karen Renaud. (2022) Human-centred cyber secure software engineeringCybersicherheit durch menschzentrierte Softwareentwicklung. Zeitschrift für Arbeitswissenschaft 77:1, pages 45-55.
Crossref
Emilia N. Mwim, Jabu Mtsweni & Bester Chimbo. 2023. Advances in Information and Communication. Advances in Information and Communication 729 742 .
Peter Langendörfer, Stephan Kornemann, Wael Alsabbagh & Erik Hermann. 2023. The Future of Smart Production for SMEs. The Future of Smart Production for SMEs 335 341 .
Humayun Zafar. (2022) Detecting and Rectifying the Non-Malicious Insider Threat in a Healthcare Setting. International Journal of Systems and Software Security and Protection 13:1, pages 1-20.
Crossref
Thomas F. Stafford. (2022) Platform-Dependent Computer Security Complacency: The Unrecognized Insider Threat. IEEE Transactions on Engineering Management 69:6, pages 3814-3825.
Crossref
Jaeung Lee, Melchor C. de Guzman, Jingguo Wang, Manish Gupta & H. Raghav Rao. (2022) Investigating perceptions about risk of data breaches in financial institutions: A routine activity-approach. Computers & Security 121, pages 102832.
Crossref
Puzant Balozian, Dorothy Leidner & Botong Xue. (2021) Toward an intellectual capital cyber security theory: insights from Lebanon. Journal of Intellectual Capital 23:6, pages 1328-1347.
Crossref
Canchu Lin, Jenell L.S. Wittmer & Xin (Robert) Luo. (2022) Cultivating proactive information security behavior and individual creativity: The role of human relations culture and IT use governance. Information & Management 59:6, pages 103650.
Crossref
David Thornton. 2022. Global Perspectives on Information Security Regulations. Global Perspectives on Information Security Regulations 72 99 .
Xiaolong Wang. (2022) Simulation of the role of emphasis on scheduling in the optimal incentive scheme for marine engineering employee's routine job and information security compliance. Journal of Ocean Engineering and Science.
Crossref
Forough Nasirpouri Shadbad & David Biros. (2020) Technostress and its influence on employee information security policy compliance. Information Technology & People 35:1, pages 119-141.
Crossref
Noor Afiza MAT RAZALI, Nurjannatul Jannah Aqilah MD SAAD, Muslihah WOOK, Nor Asiakin HASBULLAH, Normaizeerah MOHD NOOR & Khairul Khalil ISHAK. (2022) Fear Assessment in Information Security Dialog Box based on Hybrid Kansei Engineering and KJ Method. International Journal of Affective Engineering 21:1, pages 23-32.
Crossref
Shaun Joseph Smyth, Kevin Curran & Nigel McKelvey. 2022. Research Anthology on Business Aspects of Cybersecurity. Research Anthology on Business Aspects of Cybersecurity 280 299 .
Azadeh Sadat Mozafari Mehr, Renata M. de Carvalho & Boudewijn van Dongen. 2022. Advanced Data Mining and Applications. Advanced Data Mining and Applications 397 412 .
Gaurav Bansal & Merrill Warkentin. (2021) Do You Still Trust?. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 52:4, pages 9-44.
Crossref
Botong Xue, Feng Xu, Xin Luo & Merrill Warkentin. (2021) Ethical leadership and employee information security policy (ISP) violation: exploring dual-mediation paths. Organizational Cybersecurity Journal: Practice, Process and People 1:1, pages 5-23.
Crossref
Muhammad Ali Fauzi, Prosper Yeng, Bian Yang & Dita Rachmayani. (2021) Examining the Link Between Stress Level and Cybersecurity Practices of Hospital Staff in Indonesia. Examining the Link Between Stress Level and Cybersecurity Practices of Hospital Staff in Indonesia.
Sutirtha Chatterjee, Suprateek Sarker, Michael J. Lee, Xiao Xiao & Amany Elbanna. (2020) A possible conceptualization of the information systems ( IS ) artifact: A general systems theory perspective 1 . Information Systems Journal 31:4, pages 550-578.
Crossref
Sanjay Goel, Kevin J. Williams, Jingyi Huang & Merrill Warkentin. (2021) Can financial incentives help with the struggle for security policy compliance?. Information & Management 58:4, pages 103447.
Crossref
Yusuf Muhammad Tukur, Dhavalkumar Thakker & Irfan‐Ullah Awan. (2020) Edge‐based blockchain enabled anomaly detection for insider attack prevention in Internet of Things . Transactions on Emerging Telecommunications Technologies 32:6.
Crossref
Kumju Hwang & Hyemi Um. (2021) Social Controls and Bonds of Public Information Consumer on Sustainable Utilization and Provision for Computing. Sustainability 13:9, pages 5263.
Crossref
Iqbal H. Sarker, Md Hasan Furhad & Raza Nowrozy. (2021) AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions. SN Computer Science 2:3.
Crossref
Lennart Jaeger, Andreas Eckhardt & Julia Kroenung. (2021) The role of deterrability for the effect of multi-level sanctions on information security policy compliance: Results of a multigroup analysis. Information & Management 58:3, pages 103318.
Crossref
Meenakshi Bhrugubanda & A.V. L. Prasuna. (2021) A Review on Role of Cyber Security in Data Science. International Journal of Advanced Research in Science, Communication and Technology, pages 132-140.
Crossref
Canchu Lin & Xin (Robert) Luo. (2021) Toward a Unified View of Dynamic Information Security Behaviors. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 52:1, pages 65-90.
Crossref
Gaurav Bansal, Steven Muzatko & Soo Il Shin. (2020) Information system security policy noncompliance: the role of situation-specific ethical orientation. Information Technology & People 34:1, pages 250-296.
Crossref
Canchu Lin, Anand S. Kunnathur & Long Li. 2021. Research Anthology on Privatizing and Securing Data. Research Anthology on Privatizing and Securing Data 522 545 .
Margareth Stoll. 2021. Research Anthology on Privatizing and Securing Data. Research Anthology on Privatizing and Securing Data 304 326 .
Matthew Canham, Clay Posey, Delainey Strickland & Michael Constantino. (2021) Phishing for Long Tails: Examining Organizational Repeat Clickers and Protective Stewards. SAGE Open 11:1, pages 215824402199065.
Crossref
Manlio Del Giudice, Veronica Scuotto, Armando Papa, Shlomo Y. Tarba, Stefano Bresciani & Merrill Warkentin. (2021) A Self‐Tuning Model for Smart Manufacturing SMEs: Effects on Digital Innovation. Journal of Product Innovation Management 38:1, pages 68-89.
Crossref
Moneer Alshaikh, Sean B. Maynard & Atif Ahmad. (2021) Applying social marketing to evaluate current security education training and awareness programs in organisations. Computers & Security 100, pages 102090.
Crossref
Kun Liu, Yunkun Wu, Wenting Wei, Zhonghui Wang, Jiaqi Zhu & Hongan Wang. 2021. Proceedings of 6th International Conference on Harmony Search, Soft Computing and Applications. Proceedings of 6th International Conference on Harmony Search, Soft Computing and Applications 365 376 .
Sonja StirnimannSonja Stirnimann. 2021. Der Mensch als Risikofaktor bei Wirtschaftskriminalität. Der Mensch als Risikofaktor bei Wirtschaftskriminalität 3 63 .
Iqbal H. Sarker, A. S. M. Kayes, Shahriar Badsha, Hamed Alqahtani, Paul Watters & Alex Ng. (2020) Cybersecurity data science: an overview from machine learning perspective. Journal of Big Data 7:1.
Crossref
Hwee-Joo Kam, Thomas Mattson & Sanjay Goel. (2019) A Cross Industry Study of Institutional Pressures on Organizational Effort to Raise Information Security Awareness. Information Systems Frontiers 22:5, pages 1241-1264.
Crossref
Neetesh Saxena, Emma Hayes, Elisa Bertino, Patrick Ojo, Kim-Kwang Raymond Choo & Pete Burnap. (2020) Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses. Electronics 9:9, pages 1460.
Crossref
Adel Yazdanmehr, Jingguo Wang & Zhiyong Yang. (2020) Peers matter: The moderating role of social influence on information security policy compliance. Information Systems Journal 30:5, pages 791-844.
Crossref
Asif Shaikh. (2020) IoT Devices in the Workplace. IoT Devices in the Workplace.
Michele Maasberg, Xiao Zhang, Myung Ko, Stewart R. Miller & Nicole Lang Beebe. (2020) An Analysis of Motive and Observable Behavioral Indicators Associated With Insider Cyber-Sabotage and Other Attacks. IEEE Engineering Management Review 48:2, pages 151-165.
Crossref
Anthony Vance, Mikko T. Siponen & Detmar W. Straub. (2020) Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures. Information & Management 57:4, pages 103212.
Crossref
Soohyun Jeon, Insoo Son & Jinyoung Han. (2020) Exploring the role of intrinsic motivation in ISSP compliance: enterprise digital rights management system case. Information Technology & People 34:2, pages 599-616.
Crossref
David J. Howard & Paul E. Spector. 2020. The Cambridge Handbook of the Changing Nature of Work. The Cambridge Handbook of the Changing Nature of Work 509 531 .
Canchu Lin, Anand S. Kunnathur & Long Li. (2020) The Cultural Foundation of Information Security Behavior. Journal of Database Management 31:2, pages 21-41.
Crossref
Charlette Donalds & Kweku-Muata Osei-Bryson. (2020) Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents. International Journal of Information Management 51, pages 102056.
Crossref
Seoungyong Lee, Julak Lee & Jeyong Jung. (2019) An exploration of the necessary competencies of professional police investigators for industrial espionage cases in South Korea. Security Journal 33:1, pages 119-138.
Crossref
Imran Mahmud, T. Ramayah, Md. Mahedi Hasan Nayeem, S. M. Muzahidul Islam & Pei Leng Gan. 2020. Cyber Warfare and Terrorism. Cyber Warfare and Terrorism 321 341 .
Emma J Williams & Adam N Joinson. (2020) Developing a measure of information seeking about phishing. Journal of Cybersecurity 6:1.
Crossref
John M. Blythe, Alan Gray & Emily Collins. 2020. HCI for Cybersecurity, Privacy and Trust. HCI for Cybersecurity, Privacy and Trust 76 91 .
Pierre-Emmanuel Arduin. 2020. Decision Support Systems X: Cognitive Decision Support Systems and Technologies. Decision Support Systems X: Cognitive Decision Support Systems and Technologies 73 85 .
Indren Govender & Bruce Watson. 2020. Information and Cyber Security. Information and Cyber Security 131 144 .
Zheng Li & Kun Liu. 2020. Advances in Harmony Search, Soft Computing and Applications. Advances in Harmony Search, Soft Computing and Applications 44 53 .
A. J. Burns, Tom L. Roberts, Clay PoseyPaul Benjamin Lowry. (2019) The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders’ Security-Based Precaution Taking. Information Systems Research 30:4, pages 1228-1247.
Crossref
Yusuf Muhammad Tukur & Yusuf Sahabi Ali. (2019) Demonstrating the Effect of Insider Attacks on Perception Layer of Internet of Things (IoT) Systems. Demonstrating the Effect of Insider Attacks on Perception Layer of Internet of Things (IoT) Systems.
Yusuf Muhammad Tukur, Dhavalkumar Thakker & Irfan-Ullah Awan. (2019) Ethereum Blockchain-Based Solution to Insider Threats on Perception Layer of IoT Systems. Ethereum Blockchain-Based Solution to Insider Threats on Perception Layer of IoT Systems.
Alaadin Addas, Julie Thorpe & Amirali Salehi-Abari. (2019) Towards models for quantifying the known adversary. Towards models for quantifying the known adversary.
Anjali Pathania & Gowhar Rasool. (2019) Investigating power styles and behavioural compliance for effective hospital administration. International Journal of Health Care Quality Assurance 32:6, pages 958-977.
Crossref
Youngkeun Choi. (2019) Organizational Control Policy, Information Security Deviance, and Moderating Effect of Power Distance Orientation. International Journal of Cyber Behavior, Psychology and Learning 9:3, pages 48-60.
Crossref
Yaojie Li, Tom Stafford, Bryan Fuller & Selwyn Ellis. (2019) Information Securing in Organizations. Information Securing in Organizations.
Bertrand Venard. (2019) The determinants of individual cyber security behaviours: Qualitative research among French students. The determinants of individual cyber security behaviours: Qualitative research among French students.
Hiep Cong Pham, Linda Brennan & Steven Furnell. (2019) Information security burnout: Identification of sources and mitigating factors from security demands and resources. Journal of Information Security and Applications 46, pages 96-107.
Crossref
A. R. Schmitt, C. Edinger, T. Mayer, J. Niederl & T. Kiesling. (2018) Simulation-supported aviation cyber-security risk analysis: a case study. CEAS Aeronautical Journal 10:2, pages 517-530.
Crossref
Abhishek Mahalle, Jianming Yong & Xiaohui Tao. (2019) Insider Threat and Mitigation for Cloud Architecture Infrastructure in Banking and Financial Services Industry. Insider Threat and Mitigation for Cloud Architecture Infrastructure in Banking and Financial Services Industry.
Asif Shaikh & Diogo Oliveira. (2019) Informal IT and Routine Activity Theory -A Theoretical Review. Informal IT and Routine Activity Theory -A Theoretical Review.
Mark Grimes & Jim Marquardson. (2019) Quality matters: Evoking subjective norms and coping appraisals by system design to increase security intentions. Decision Support Systems 119, pages 23-34.
Crossref
Eran Toch, Claudio Bettini, Erez Shmueli, Laura Radaelli, Andrea Lanzi, Daniele Riboni & Bruno Lepri. (2018) The Privacy Implications of Cyber Security Systems. ACM Computing Surveys 51:2, pages 1-27.
Crossref
Nadine Guhr, Benedikt Lebek & Michael H. Breitner. (2018) The impact of leadership on employees' intended information security behaviour: An examination of the full‐range leadership theory. Information Systems Journal 29:2, pages 340-362.
Crossref
Shaun Joseph Smyth, Kevin Curran & Nigel McKelvey. 2019. Cybersecurity Education for Awareness and Compliance. Cybersecurity Education for Awareness and Compliance 33 52 .
Margareth Stoll. (2019) A Data Privacy Governance Model. International Journal of IT/Business Alignment and Governance 10:1, pages 74-93.
Crossref
Ruben Xing, Jinluan Ren, Jianghua Sun & Lihua Liu. 2019. Web Services. Web Services 75 88 .
Margareth Stoll. 2019. Censorship, Surveillance, and Privacy. Censorship, Surveillance, and Privacy 219 242 .
Nasim Talebi, Emmanuel Ayaburi & Suhail Chakravarty. 2019. Global Information Diffusion and Management in Contemporary Society. Global Information Diffusion and Management in Contemporary Society 153 171 .
Benoît Dupont. (2019) The cyber-resilience of financial institutions: significance and applicability. Journal of Cybersecurity 5:1.
Crossref
Dominik Zellhofer. 2019. Organizing for the Digital World. Organizing for the Digital World 49 62 .
Charlette Donalds, Kweku-Muata Osei-Bryson & Sergey Samoilenko. 2019. Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D. Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D 751 762 .
Bridget Kirby, Kaitlyn Malley & Robert West. 2019. Information Systems and Neuroscience. Information Systems and Neuroscience 19 27 .
Carl F. Weems, Irfan Ahmed, Golden G. Richard, Justin D. Russell & Erin L. Neill. (2018) Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior. PLOS ONE 13:12, pages e0207408.
Crossref
Yang Lu. (2018) Cybersecurity Research: A Review of Current Research Topics. Journal of Industrial Integration and Management 03:04, pages 1850014.
Crossref
Andrew Harrison, James Summers & Brian Mennecke. (2016) The Effects of the Dark Triad on Unethical Behavior. Journal of Business Ethics 153:1, pages 53-77.
Crossref
Myeonggil Choi & Jeongseok Song. (2018) Social control through deterrence on the compliance with information security policy. Soft Computing 22:20, pages 6765-6772.
Crossref
Bernd Carsten Stahl, Stephen Rainey, Emma Harris & B Tyr Fothergill. (2018) The role of ethics in data governance of large neuro-ICT projects. Journal of the American Medical Informatics Association 25:8, pages 1099-1107.
Crossref
Zheng Yan, Thomas Robertson, River Yan, Sung Yong Park, Samantha Bordoff, Quan Chen & Ethan Sprissler. (2018) Finding the weakest links in the weakest link: How well do undergraduate students make cybersecurity judgment?. Computers in Human Behavior 84, pages 375-382.
Crossref
Cindy Zhiling Tu, Yufei Yuan, Norm Archer & Catherine E. Connelly. (2018) Strategic value alignment for information security management: a critical success factor analysis. Information & Computer Security 26:2, pages 150-170.
Crossref
Thomas Stafford, George Deitz & Yaojie Li. (2018) The role of internal audit and user training in information security policy compliance. Managerial Auditing Journal 33:4, pages 410-424.
Crossref
Yun Ji Moon, Myeonggil Choi & Deborah J. Armstrong. (2018) The impact of relational leadership and social alignment on information security system effectiveness in Korean governmental organizations. International Journal of Information Management 40, pages 54-66.
Crossref
Amandeep Singh Sohal, Rajinder Sandhu, Sandeep K. Sood & Victor Chang. (2018) A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Computers & Security 74, pages 340-354.
Crossref
Robert Willison & Paul Benjamin Lowry. (2018) Disentangling the Motivations for Organizational Insider Computer Abuse through the Rational Choice and Life Course Perspectives. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 49:SI, pages 81-102.
Crossref
Jeffrey D. Wall & Rahul Singh. (2018) The Organization Man and the Innovator. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 49:SI, pages 67-80.
Crossref
Robert Willison, Merrill Warkentin & Allen C. Johnston. (2016) Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives. Information Systems Journal 28:2, pages 266-293.
Crossref
Richard Baskerville, Frantz Rowe & François-Charles Wolff. (2018) Integration of Information Systems and Cybersecurity Countermeasures. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 49:1, pages 33-52.
Crossref
Kwasi Dankwa & Keiichi Nakata. 2018. Digitalisation, Innovation, and Transformation. Digitalisation, Innovation, and Transformation 228 237 .
Mario Silic, Mato Njavro, Dario Silic & Goran Oblakovic. 2018. HCI in Business, Government, and Organizations. HCI in Business, Government, and Organizations 187 205 .
Panagiotis Karampelas. 2018. Surveillance in Action. Surveillance in Action 369 393 .
Yazan Alshboul & Kevin Streff. (2017) Beyond Cybersecurity Awareness. Beyond Cybersecurity Awareness.
Mario Silic, Jordan B. Barlow & Andrea Back. (2017) A new perspective on neutralization and deterrence: Predicting shadow IT usage. Information & Management 54:8, pages 1023-1037.
Crossref
Stefan Bauer & Edward W.N. Bernroider. (2017) From Information Security Awareness to Reasoned Compliant Action. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 48:3, pages 44-68.
Crossref
Puzant Balozian & Dorothy Leidner. (2017) Review of IS Security Policy Compliance. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 48:3, pages 11-43.
Crossref
Ron Hirschprung, Eran Toch, Hadas Schwartz-Chassidim, Tamir Mendel & Oded Maimon. (2017) Analyzing and Optimizing Access Control Choice Architectures in Online Social Networks. ACM Transactions on Intelligent Systems and Technology 8:4, pages 1-22.
Crossref
Sang Soo Kim & Yong Jin Kim. (2017) The effect of compliance knowledge and compliance support systems on information security compliance behavior. Journal of Knowledge Management 21:4, pages 986-1010.
Crossref
Steven Alter. (2017) Six Work System Lenses for Describing, Analyzing, or Evaluating Important Aspects of IS Security. International Journal of Systems and Society 4:2, pages 69-82.
Crossref
Youngkeun Choi. (2017) Human Resource Management and Security Policy Compliance. International Journal of Human Capital and Information Technology Professionals 8:3, pages 68-81.
Crossref
Stefan Bauer, Edward W.N. Bernroider & Katharina Chudzikowski. (2017) Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks. Computers & Security 68, pages 145-159.
Crossref
Peter Schaab, Kristian Beckers & Sebastian Pape. (2017) Social engineering defence mechanisms and counteracting training strategies. Information & Computer Security 25:2, pages 206-222.
Crossref
A. J. Burns, Clay Posey, James F. Courtney, Tom L. Roberts & Prabhashi Nanayakkara. (2015) Organizational information security as a complex adaptive system: insights from three agent-based models. Information Systems Frontiers 19:3, pages 509-524.
Crossref
Salvatore Aurigemma & Thomas Mattson. (2017) Privilege or procedure: Evaluating the effect of employee status on intent to comply with socially interactive information security threats and controls. Computers & Security 66, pages 218-234.
Crossref
Inho Hwang, Daejin Kim, Taeha Kim & Sanghyun Kim. (2017) Why not comply with information security? An empirical approach for the causes of non-compliance. Online Information Review 41:1, pages 2-18.
Crossref
Ahmed Falah, Lei Pan & Mohamed Abdelrazek. (2017) Visual representation of penetration testing actions and skills in a technical tree model. Visual representation of penetration testing actions and skills in a technical tree model.
Sangseo Park & Jane Moon. 2017. Healthcare Ethics and Training. Healthcare Ethics and Training 1141 1171 .
Imran Mahmud, T. Ramayah, Md. Mahedi Hasan Nayeem, S. M. Muzahidul Islam & Pei Leng Gan. 2017. Design Solutions for User-Centric Information Systems. Design Solutions for User-Centric Information Systems 253 273 .
Mils Hills & Anjali Anjali. (2017) A human factors contribution to countering insider threats: Practical prospects from a novel approach to warning and avoiding. Security Journal 30:1, pages 142-152.
Crossref
Fayez Hussain Alqahtani. (2017) Developing an Information Security Policy: A Case Study Approach. Procedia Computer Science 124, pages 691-697.
Crossref
Kristian Beckers, Daniel Schosser, Sebastian Pape & Peter Schaab. 2017. Trust, Privacy and Security in Digital Business. Trust, Privacy and Security in Digital Business 232 246 .
Yung Shin Van Der Sype, Jonathan Guislain, Jean-Marc Seigneur & Xavier Titi. 2017. Data Protection and Privacy: (In)visibilities and Infrastructures. Data Protection and Privacy: (In)visibilities and Infrastructures 241 269 .
Merrill Warkentin, Allen C. Johnston, Jordan Shropshire & William D. Barnett. (2016) Continuance of protective security behavior: A longitudinal study. Decision Support Systems 92, pages 25-35.
Crossref
Hiep-Cong Pham, Jamal El-Den & Joan Richardson. (2016) Stress-based security compliance model – an exploratory study. Information & Computer Security 24:4, pages 326-347.
Crossref
Mario Silic & Andrea Back. (2016) The dark side of social networking sites:Understanding phishing risks. Computers in Human Behavior 60, pages 35-43.
Crossref
Hung-Pin Shih, Xitong Guo, Kee-hung Lai & T. C. E. Cheng. (2016) Taking promotion and prevention mechanisms matter for information systems security policy in Chinese SMEs. Taking promotion and prevention mechanisms matter for information systems security policy in Chinese SMEs.
Jeffrey Gainer Proudfoot, Randall Boyle & Ryan M. Schuetzler. (2016) Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews. Decision Support Systems 85, pages 23-33.
Crossref
Sangseo Park & Jane Moon. 2016. Improving Health Management through Clinical Decision Support Systems. Improving Health Management through Clinical Decision Support Systems 329 359 .
Eric Ortiz, Lauren Reinerman-Jones & Gerald Matthews. 2016. Advances in Human Factors in Cybersecurity. Advances in Human Factors in Cybersecurity 267 277 .
Gurpreet Dhillon, Spyridon Samonas & Ugo Etudo. 2016. ICT Systems Security and Privacy Protection. ICT Systems Security and Privacy Protection 49 61 .
Hadrian Geri Djajadikerta, Saiyidi Mat Roni & Terri Trireksani. (2015) Dysfunctional information system behaviors are not all created the same: Challenges to the generalizability of security-based research. Information & Management 52:8, pages 1012-1024.
Crossref
Jingguo Wang, Nan Xiao & H. Raghav Rao. (2015) Research Note—An Exploration of Risk Characteristics of Information Security Threats and Related Public Information Search Behavior. Information Systems Research 26:3, pages 619-633.
Crossref
Paul Benjamin Lowry & Gregory D. Moody. (2014) Proposing the control‐reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies. Information Systems Journal 25:5, pages 433-463.
Crossref
Denis Fischbacher-Smith & Liam Smith. (2015) Navigating the ‘dark waters of globalisation’: Global markets, inequalities and the spatial dynamics of risk. Risk Management 17:3, pages 179-203.
Crossref
Jordan Shropshire, Merrill Warkentin & Shwadhin Sharma. (2015) Personality, attitudes, and intentions: Predicting initial adoption of information security behavior. Computers & Security 49, pages 177-191.
Crossref
Adnan Akhunzada, Mehdi Sookhak, Nor Badrul Anuar, Abdullah Gani, Ejaz Ahmed, Muhammad Shiraz, Steven Furnell, Amir Hayat & Muhammad Khurram Khan. (2015) Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions. Journal of Network and Computer Applications 48, pages 44-57.
Crossref
Merrill Warkentin. 2015. Wiley Encyclopedia of Management. Wiley Encyclopedia of Management 1 9 .
Pei-Lee Teh, Pervaiz K. Ahmed & John D'Arcy. (2015) What Drives Information Security Policy Violations among Banking Employees?. Journal of Global Information Management 23:1, pages 44-64.
Crossref
Kenneth J. Knapp & Claudia J. Ferrante. 2015. Standards and Standardization. Standards and Standardization 751 771 .
Margareth Stoll. 2015. Handbook of Research on Emerging Developments in Data Privacy. Handbook of Research on Emerging Developments in Data Privacy 216 238 .
Xiao-long Wang & Wen-li Li. 2015. Proceedings of the 5th International Asia Conference on Industrial Engineering and Management Innovation (IEMI2014). Proceedings of the 5th International Asia Conference on Industrial Engineering and Management Innovation (IEMI2014) 353 358 .
Dongmei Han, Yonghui Dai, Tianlin Han & Xingyun Dai. (2015) Explore Awareness of Information Security: Insights from Cognitive Neuromechanism. Computational Intelligence and Neuroscience 2015, pages 1-8.
Crossref
Salvatore Aurigemma & Thomas Mattson. (2015) The Role of Social Status and Controllability on Employee Intent to Follow Organizational Information Security Requirements. The Role of Social Status and Controllability on Employee Intent to Follow Organizational Information Security Requirements.
Soohyun Jeon & Anat Hovav. (2015) Empowerment or Control: Reconsidering Employee Security Policy Compliance in Terms of Authorization. Empowerment or Control: Reconsidering Employee Security Policy Compliance in Terms of Authorization.
Marko Niemimaa & Anna Elina Laaksonen. 2015. Materiality, Rules and Regulation. Materiality, Rules and Regulation 223 249 .
Brenton Borgman, Sameera Mubarak & Kim-Kwang Raymond Choo. (2015) Cyber security readiness in the South Australian Government. Computer Standards & Interfaces 37, pages 1-8.
Crossref
Syed Irfan Nabi, Zaheeruddin Asif & Abdulrahman A. Mirza. (2014) When Sentry Goes Stealing: An Information Systems Security Case Study in Behavioural Context. Acta Informatica Pragensia 3:3, pages 222-238.
Crossref
Mario Silic & Andrea Back. (2014) Shadow IT – A view from behind the curtain. Computers & Security 45, pages 274-283.
Crossref
Clay Posey, Tom L. Roberts, Paul Benjamin Lowry & Ross T. Hightower. (2014) Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders. Information & Management 51:5, pages 551-567.
Crossref
Amos Azaria, Ariella Richardson, Sarit Kraus & V. S. Subrahmanian. (2014) Behavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in Imbalanced Data. IEEE Transactions on Computational Social Systems 1:2, pages 135-155.
Crossref
Waldo Rocha Flores, Egil Antonsen & Mathias Ekstedt. (2014) Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture. Computers & Security 43, pages 90-110.
Crossref
Merrill Warkentin & Leigh Mutchler. 2014. Computing Handbook, Third Edition. Computing Handbook, Third Edition 54-1 54-20 .
Kenneth J. Knapp & Claudia J. Ferrante. (2014) Information Security Program Effectiveness in Organizations. Journal of Organizational and End User Computing 26:1, pages 27-46.
Crossref
Toshihiko Takemura. 2014. Approaches and Processes for Managing the Economics of Information Systems. Approaches and Processes for Managing the Economics of Information Systems 181 198 .
Max Soyref & Philip Seltsikas. (2014) Towards a Holistic Understanding of Security Process: Formal Controls and Informal Relationships. Towards a Holistic Understanding of Security Process: Formal Controls and Informal Relationships.
Morgan Shepherd, Roberto Mejias & Gary Klein. (2014) A Longitudinal Study to Determine Non-technical Deterrence Effects of Severity and Communication of Internet Use Policy for Reducing Employee Internet Abuse. A Longitudinal Study to Determine Non-technical Deterrence Effects of Severity and Communication of Internet Use Policy for Reducing Employee Internet Abuse.
Jordan B. Barlow, Merrill Warkentin, Dustin Ormond & Alan R. Dennis. (2013) Don't make excuses! Discouraging neutralization to reduce IT policy violation. Computers & Security 39, pages 145-159.
Crossref
Kai S. Koong, Mohammad I. Merhi & Jun Sun. (2013) Push and pull effects of homeland information security incentives. Information Management & Computer Security 21:3, pages 155-176.
Crossref
Salvatore Aurigemma. (2013) A Composite Framework for Behavioral Compliance with Information Security Policies. Journal of Organizational and End User Computing 25:3, pages 32-51.
Crossref

Displaying 200 of 219 citing articles. Use the download link below to view the full list of citing articles.

Download full citations list

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.