Can perceptual differences account for enigmatic information security behaviour in an organisation?

[1]  Spyros Kokolakis,et al.  Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon , 2017, Comput. Secur..

[2]  Nigel Martin,et al.  Expectations of privacy and trust: examining the views of IT professionals , 2016, Behav. Inf. Technol..

[3]  Steven Furnell,et al.  Information security policy compliance model in organizations , 2016, Comput. Secur..

[4]  Steven Furnell,et al.  Information security conscious care behaviour formation in organizations , 2015, Comput. Secur..

[5]  H. J. Smith,et al.  Exploring information privacy regulation, risks, trust, and behavior , 2015, Inf. Manag..

[6]  Areej AlHogail,et al.  Design and validation of information security culture framework , 2015, Comput. Hum. Behav..

[7]  Bahadir K. Akcam,et al.  Exploring Business Student Perception of Information and Technology , 2015 .

[8]  Aggeliki Tsohou,et al.  Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs , 2015, Comput. Secur..

[9]  Adéle da Veiga,et al.  An Information Security Training and Awareness Approach (ISTAAP) to Instil an Information Security-Positive Culture , 2015, HAISA.

[10]  H. Keser,et al.  DEVELOPMENT OF INFORMATION SECURITY AWARENESS SCALE , 2015 .

[11]  Rahul Gupta,et al.  Role of Information Security Awareness in Success of an Organization , 2015 .

[12]  Gordon Hull,et al.  Successful failure: what Foucault can teach us about privacy self-management in a world of Facebook and big data , 2015, Ethics and Information Technology.

[13]  Mathias Ekstedt,et al.  Investigating personal determinants of phishing and the effect of national culture , 2015, Inf. Comput. Secur..

[14]  Mohammed A. Alnatheer,et al.  Information Security Culture Critical Success Factors , 2015, 2015 12th International Conference on Information Technology - New Generations.

[15]  Nico Martins,et al.  Improving the information security culture through monitoring and implementation actions illustrated through a case study , 2015, Comput. Secur..

[16]  Antonio Carlos Gastaud Maçada,et al.  Measuring user satisfaction with information security practices , 2015, Comput. Secur..

[17]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[18]  Bladimiros Spandonidis Linking Information Security Awareness to Information Security Management Strategy.A Study in an IT Company , 2015 .

[19]  M. Sasikumar,et al.  Trust Model for Measuring Security Strength of Cloud Computing Service , 2015 .

[20]  Hennie A. Kruger,et al.  Considering the influence of human trust in practical social engineering exercises , 2014, 2014 Information Security for South Africa.

[21]  Areej AlHogail,et al.  Information security culture: A definition and a literature review , 2014, 2014 World Congress on Computer Applications and Information Systems (WCCAIS).

[22]  Teodor Sommestad,et al.  Variables influencing information security policy compliance: A systematic review of quantitative studies , 2014, Inf. Manag. Comput. Secur..

[23]  Tom L. Roberts,et al.  Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders , 2014, Inf. Manag..

[24]  Paul P. Tallon Do you see what I see? The search for consensus among executives’ perceptions of IT business value , 2014, Eur. J. Inf. Syst..

[25]  Malcolm Robert Pattinson,et al.  Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q) , 2014, Comput. Secur..

[26]  Princely Ifinedo,et al.  Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition , 2014, Inf. Manag..

[27]  Mariki M. Eloff,et al.  Human Aspects of Information Assurance: A Questionnaire-based Quantitative Approach to Assessment , 2014, HAISA.

[28]  France Bélanger,et al.  Religiosity and Information Security Policy Compliance , 2013, AMCIS.

[29]  Hennie A. Kruger,et al.  Phishing and Organisational Learning , 2013, SEC.

[30]  Rossouw von Solms,et al.  Phishing for phishing awareness , 2013, Behav. Inf. Technol..

[31]  James Cox,et al.  Information systems user security: A structured model of the knowing-doing gap , 2012, Comput. Hum. Behav..

[32]  M. Butavicius,et al.  Why Do Some People Manage Phishing Emails Better Than Others? , 2012, Inf. Manag. Comput. Secur..

[33]  Charalampos Manifavas,et al.  How Effective Is Your Security Awareness Program? An Evaluation Methodology , 2012, Inf. Secur. J. A Glob. Perspect..

[34]  Gavriel Salvendy,et al.  Factors affecting perception of information security and their impacts on IT adoption and security practices , 2011, Int. J. Hum. Comput. Stud..

[35]  Marcus A. Butavicius,et al.  Human Factors and Information Security: Individual, Culture and Security Environment , 2010 .

[36]  Stewart Kowalski,et al.  Group Dynamics in a Security Risk Management Team Context: A Teaching Case Study , 2010, SEC.

[37]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[38]  Antonio Lioy,et al.  A psychological approach to information technology security , 2010, 3rd International Conference on Human System Interaction.

[39]  Ponnurangam Kumaraguru,et al.  Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions , 2010, CHI.

[40]  Pieter H. Hartel Review of "P. Kumaraguru, J. Cranshaw, A. Acquisti, L. Cranor, J. Hong, M. Blair, T. Pham, School of phish: a real-world evaluation of anti-phishing training" , 2010 .

[41]  Wang Tao,et al.  An empirical study of customers' perceptions of security and trust in e-payment systems , 2010, Electron. Commer. Res. Appl..

[42]  Eirik Albrechtsen,et al.  The information security digital divide between information security managers and users , 2009, Comput. Secur..

[43]  Tyler Moore,et al.  Information security: where computer science, economics and psychology meet , 2009, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[44]  Steven Furnell,et al.  From culture to disobedience: Recognising the varying user acceptance of IT security , 2009 .

[45]  Alessandro Acquisti,et al.  School of Phish: A Real-Word Evaluation of Anti-Phishing Training (CMU-CyLab-09-002) , 2009 .

[46]  Markus Huber,et al.  Measuring Readiness for Automated Social Engineering , 2008 .

[47]  Markus Jakobsson,et al.  Social phishing , 2007, CACM.

[48]  Herbert J. Mattord,et al.  Principles of Information Security , 2004 .

[49]  S. Ellis,et al.  Practical significance (effect sizes) versus or in combination with statistical significance (p-values) : research note , 2003 .

[50]  Jacob Cohen Statistical Power Analysis , 1992 .