“…To protect the main IS assets held in such systems from misuse, abuse and destruction; organizations often utilize a variety of methods such as installing firewalls, updating anti-virus software, backing up their systems, maintaining and restricting access controls, using encryption keys, using surge protectors, and using wide-ranging monitoring systems (Ryan, 2004;Workman, Bommer and Straub, 2008;Lee and Larsen, 2009). However, the said methods offer a technological or technical solution to the problem, and are hardly sufficient in providing total protection of IS organizational resources (Rhodes, 2001;Sasse et al, 2004;Stanton, Stam, Mastrangelo, and Jolton 2005;Herath and Rao, 2009).…”