2015
DOI: 10.1016/j.cose.2015.01.002
|View full text |Cite
|
Sign up to set email alerts
|

Personality, attitudes, and intentions: Predicting initial adoption of information security behavior

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

10
161
2
4

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 218 publications
(188 citation statements)
references
References 86 publications
10
161
2
4
Order By: Relevance
“…Intention plays an important role in terms of complying with OISPs [32]. In another study, Shropshire, Warkentin [33] used intention to show the adoption of information security behaviour in organisations. Park, Gu [34] showed that intention changes the employees' behaviour toward sharing their knowledge in firms.…”
Section: Isc Intentionmentioning
confidence: 99%
See 1 more Smart Citation
“…Intention plays an important role in terms of complying with OISPs [32]. In another study, Shropshire, Warkentin [33] used intention to show the adoption of information security behaviour in organisations. Park, Gu [34] showed that intention changes the employees' behaviour toward sharing their knowledge in firms.…”
Section: Isc Intentionmentioning
confidence: 99%
“…The extent to which a company appreciates and values its staffs' effort and considers their well-being manifests its support towards its employees [33]. A well-designed team with good people can perform poorly if an organisation does not provide appropriate support and the necessary resources.…”
Section: Organisational Supportmentioning
confidence: 99%
“…There are a number of individual factors that influence whether people take risk messages seriously or not, including personality, for example [32], so this is difficult to accommodate in design.…”
Section: A Risk Perceptionmentioning
confidence: 99%
“…Albrechtsen and Hovden (2007) claim that traditionally, the field of information security has been preoccupied by the first three stages. However, during the last decade it entered the fourth stage by an increased attention to individual awareness and behavior (Stanton et al, 2005;Möller et al, 2011;Shropshire et al, 2015) as well as the concept of information security culture (Ruighaver et al, 2007;van Niekerk and von Solms, 2010;da Veiga, 2015). In order for information security to reach the fifth step, we claim that there is a need to investigate adaptive management strategies.…”
Section: Introductionmentioning
confidence: 99%