2013
DOI: 10.1016/j.cose.2012.09.010
|View full text |Cite
|
Sign up to set email alerts
|

Future directions for behavioral information security research

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

8
314
1
4

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 496 publications
(344 citation statements)
references
References 72 publications
8
314
1
4
Order By: Relevance
“…Beyond the financial impact [4], a cyber-attack may, for example, cause irreparable damage to a firm in the form of corporate liability [5], a weakened competitive position, and loss of credibility [6].…”
Section: Introductionmentioning
confidence: 99%
“…Beyond the financial impact [4], a cyber-attack may, for example, cause irreparable damage to a firm in the form of corporate liability [5], a weakened competitive position, and loss of credibility [6].…”
Section: Introductionmentioning
confidence: 99%
“…42,43]. However, BI may not always lead to actual behaviors [44]. Indeed, several studies suggest that, in an information security context, it is better and more realistic to measure actual behaviors rather than intentions [44][45][46].…”
Section: Relationship Between Behavior Intention (Bi) and Actual Behamentioning
confidence: 99%
“…Indeed, users often feel overwhelmed with how to control others' access to their personal information [19]. This is crucial because citizens' understanding of information security and privacy threats, and knowledge of the tools they can use to protect themselves, are necessary to provide a more secure society, particularly since individuals are the weakest link in security [12] and the last line of defense in information privacy [20].…”
Section: Background and Theoretical Foundationsmentioning
confidence: 99%
“…Disclosure of information, even voluntary, is not only an information privacy issue but also an information security issue. Information security refers to individuals protecting themselves against threats to their information assets [12], while information privacy is viewed as an individual's ability to control information about themselves [e.g., 13,14,15]. Today's smartphones are typically set up with complex information security and privacy settings, with many default settings often set to give away most information.…”
Section: Background and Theoretical Foundationsmentioning
confidence: 99%
See 1 more Smart Citation