Showing 1 - 10 of 15
Persistent link: https://www.econbiz.de/10010225521
Persistent link: https://www.econbiz.de/10010379915
Persistent link: https://www.econbiz.de/10011491439
Persistent link: https://www.econbiz.de/10010396132
Despite widespread agreement among practitioners and academicians that organizational insiders are a significant threat to organizational information systems security, insider computer abuse (ICA)—unauthorized and deliberate misuse of organizational information resources by organizational...
Persistent link: https://www.econbiz.de/10013293256
Persistent link: https://www.econbiz.de/10012153333
Practitioners and researchers alike recognize the positive influence insiders' behavior can have on information systems (IS) security. This awareness has resulted in a research stream focused on the performance of protective behaviors. We contribute to this research stream by extending an...
Persistent link: https://www.econbiz.de/10012967404
This manuscript examines the unintended consequences that organizational computer monitoring can foster within the firm. We apply justice and reactance theories to explain why monitoring can actually increase the occurrence of detrimental organizational behaviors. Our model suggests monitoring...
Persistent link: https://www.econbiz.de/10014175700
Protecting information from a wide variety of security threats is an important and sometimes daunting organizational activity. Instead of relying solely on technological advancements to help solve human problems, managers within firms must recognize and understand the roles that organizational...
Persistent link: https://www.econbiz.de/10014191852
Research shows that organisational efforts to protect their information assets from employee security threats do not always reach their full potential and may actually encourage the behaviours they attempt to thwart, such as reactive computer abuse (CA). To better understand this dilemma, we use...
Persistent link: https://www.econbiz.de/10014139311