Showing 1 - 10 of 115
One of the most challenging problems modern firms face is that their weakest link in maintaining information security is the behavior of employees: clicking on phishing emails, telling friends and family private information, and searching for private information about themselves (Loch et al. 1992;...
Persistent link: https://www.econbiz.de/10012898068
Much information security research focuses on policies firms could adopt to reduce or eliminate employees’ violation behavior. However, current information security policies are based on increasingly outmoded models of compliance behavior. This paper proposes a novel behavioral-based mechanism...
Persistent link: https://www.econbiz.de/10014344438
Persistent link: https://www.econbiz.de/10014472113
Purpose: Tax Identity Theft involves the illegal use of a potential taxpayer’s identity, usually the social security number, to fraudulently file a tax return and claim a refund. The victim is the real owner of the social security number who will have difficulties getting a tax refund, as the...
Persistent link: https://www.econbiz.de/10012638362
Persistent link: https://www.econbiz.de/10011979010
Persistent link: https://www.econbiz.de/10001936378
Persistent link: https://www.econbiz.de/10001297165
Persistent link: https://www.econbiz.de/10011625607
"Laboratory experiments have generally supported the fundamental theorem that, in classical property rights environments, noncooperative behavior in large group markets yields efficient social outcomes. Experiments, however, regularly fail to support the game theoretic prediction of...
Persistent link: https://www.econbiz.de/10009468384
Persistent link: https://www.econbiz.de/10012235202