eBooks/eGuides

The 7 Dimensions of Security Culture

Issue link: https://insights.oneneck.com/i/1476862

Contents of this Issue

Navigation

Page 40 of 43

41 The 7 dimensions of security culture Bibliography Abawajy, J., (2014). User preference of cyber security awareness delivery methods. Behaviour and information technology, Vol. 33, pp. 237-248 Abdelwahed, A. S., Mahmoud, A. Y., & Bdair, R. A. (2016). Information Security Policies and their Relationship with the Effectiveness of the Management Information Systems of Major Palestinian Universities in the Gaza Strip. International Journal of Information Science and Management (IJISM), 15(1). Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211. Ajzen, I., Fishbein, M., (2005). The influence of attitudes on behavior. The handbook of attitudes 173 (221), 31 Albrechtsen, E., & Hovden, J. (2010). Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study. Computers & Security, 29(4), 432-445. AlHogail, A. (2015). Design and validation of information security culture framework. Computers in Human Behavior, 49, 567-575. AlHogail, A. (2017). Managing Human Factor to Improve Information Security in Organization. AlKalbani, A., Deng, H., & Kam, B., (2014). A Conceptual Framework for Information Security in Public Organizations for E-Government Development, in Felix B Tan, Deborah Bunker (ed.) Proceedings of the 25th Australasian Conference on Information Systems (ACIS 2014) 1-11. AlKalbani, A., Deng, H., Kam, B., & Zhang, X. (2017). Information Security compliance in organizations: an institutional perspective. Data and Information Management, 1(2), 104-114. Al-Najjar, F.J. (2010). Management Information Systems - Administrative Perspective. Dar El-Hamed for publishing and distribution. Amman. Jordan. Al-Omari, A., El-Gayar, O., and Deokar, A. (2012). Information security policy compliance: The role of information security awareness. AMCIS. Anderson, B. B., Vance, A., Kirwan, C. B., Eargle, D., and Jenkins, J. L. (2016). How users perceive and respond to security messages: A NeuroIS research agenda and empirical study. European Journal of Information Systems, 25(4), 364-390. Arhin, K., and Wiredu, G. O. (2018). An Organizational Communication Approach to Information Security. The African Journal of Information Systems, 10(4), 1. Ashenden, D. (2018). In their own words: employee attitudes towards information security. Information & Computer Security, 26(3), 327-337. Augoustinos, M., Walker, I., & Donaghue, N. (2006). Social cognition: an integrated introduction. Aurigemma, S., and Mattson, T. (2014). Do it OR ELSE! Exploring the effectiveness of deterrence on employee compliance with information security policies. Backhouse, J., and Dhillon, G., (1996). Structures of responsibility and security of information systems, European Journal of Information Systems, 5:1, 2-9. Banaji, M. R., and Heiphetz, L. (2010). Attitudes. In S. T. Fiske, D. T. Gilbert, & G. Lindzey (Eds.), Handbook of social psychology [5],1,353–393. Hoboken, NJ: John Wiley & Sons. Barlow, J. B., Warkentin, M., Ormond, D., and Dennis, A. R. (2018). Don't Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance. Journal of the Association for Information Systems, 19(8). Bicchieri, C. (2016). Norms in the wild: How to diagnose, measure, and change social norms. Oxford University Press. Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., and Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837-864. Bryce, J., & Fraser, J. (2014). The role of disclosure of personal information in the evaluation of risk and trust in young peoples' online interactions. Computers in Human Behavior, 30, 299-306. Kirsch, L.J., and Boss, S.R. (2007). The Last Line of Defense: Motivating Employees to Follow Corporate Security Guidelines. Proceedings of the International Conference on Information Systems (ICIS). Boss, S. R., Kirsch, L. J., Angermeier, I., Shingler, R. A. and Boss, R. W. (2009) If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security, European Journal of Information Systems, 18, 2, 151-164. Bulgurcu, B., Cavusoglu, H., and Benbasat, I. (2010). Information Security Policy Compliance: An Empirical Study of Rationality- Based Beliefs and Information Security Awareness. MIS Quarterly, 34(3), 523-548. Ciampa, M. (2013). A comparison of password feedback mechanisms and their impact on password entropy. Information Management & Computer Security, 21(5), 344-359. Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., and Baskerville, R. (2013). Future directions for behavioral information security research. Computers & Security, 32, 90-101. Cuganesan, S., Steele, C., and Hart, A. (2018). How senior management and workplace norms influence information security attitudes and self-efficacy. Behaviour & Information Technology, 37(1), 50-65. da Veiga, A. and Martins, N. (2015). Improving the information security culture through monitoring and implementation actions illustrated through a case study. Computers & Security, 49, pp.162-176. De Houwer, J., Thomas, S., & Baeyens, F. (2001). Association learning of likes and dislikes: A review of 25 years of research on human evaluative conditioning. Psychological Bulletin, 127(6), 853-869.

Articles in this issue

Archives of this issue

view archives of eBooks/eGuides - The 7 Dimensions of Security Culture