2021
DOI: 10.1080/08874417.2021.2015725
|View full text |Cite
|
Sign up to set email alerts
|

Self-efficacy in Information Security: A Replication Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 42 publications
0
7
0
Order By: Relevance
“…This combination of theories is produced to expand these theories by illustrating the extent to which these theories can influence the behavior of human's behavior protecting the security of their data in the face of the needs and challenges of the digital world. The use of different study subjects in research not only supports the original model developed by a scholar but also releases the opportunity to further expand existing constructs in different contexts and situations (Xue et al, 2021).…”
Section: Discussionmentioning
confidence: 79%
“…This combination of theories is produced to expand these theories by illustrating the extent to which these theories can influence the behavior of human's behavior protecting the security of their data in the face of the needs and challenges of the digital world. The use of different study subjects in research not only supports the original model developed by a scholar but also releases the opportunity to further expand existing constructs in different contexts and situations (Xue et al, 2021).…”
Section: Discussionmentioning
confidence: 79%
“…The dynamics highlight the challenges posed by the nuanced nature of security regulations, their enforcement, and their impact on organizational efficiency. The detailed security guidelines, combined with lenient enforcement, allow for potential employee negligence, diminishing the policies' effectiveness (Chang and Lin, 2007;Xue et al, 2023).…”
Section: Previous Researchmentioning
confidence: 99%
“…Furthermore, the ORC framework integrates considerations about the general awareness of Information Security (IS) threats. Such awareness is posited to encourage a more proactive approach to compliance, as suggested by Myyry et al (2013) and Xue et al (2023). It also assesses whether compliance is perceived as a rewarding endeavor, thereby motivating active employee engagement.…”
Section: Construct Orcmentioning
confidence: 99%
See 1 more Smart Citation
“…Lack of data, however, makes it challenging to use artificial intelligence models in the medical world due to privacy concerns [21,22]. Private data cannot be guaranteed to be secure using machine learning algorithms since it is so simple for attackers to steal or change information, whether on purpose or accidentally [23].…”
Section: Introductionmentioning
confidence: 99%