Deterrent effects of punishment and training on insider security threats: a field experiment on phishing attacks
Published 2019 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Deterrent effects of punishment and training on insider security threats: a field experiment on phishing attacks
Authors
Keywords
-
Journal
BEHAVIOUR & INFORMATION TECHNOLOGY
Volume -, Issue -, Pages 1-20
Publisher
Informa UK Limited
Online
2019-08-20
DOI
10.1080/0144929x.2019.1653992
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Sanction severity and employees’ information security policy compliance: Investigating mediating, moderating, and control variables
- (2018) Xiaofeng Chen et al. INFORMATION & MANAGEMENT
- Self-control, organizational context, and rational choice in Internet abuses at work
- (2018) Han Li et al. INFORMATION & MANAGEMENT
- Toward a Unified Model of Information Security Policy Compliance
- (2018) Gregory D. Moody et al. MIS QUARTERLY
- Organizational information security policies: a review and research framework
- (2017) W. Alec Cram et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Training to Mitigate Phishing Attacks Using Mindfulness Techniques
- (2017) Matthew L. Jensen et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- A Deterrence Approach to Regulate Nurses’ Compliance with Electronic Medical Records Privacy Policy
- (2017) Kuang-Ming Kuo et al. JOURNAL OF MEDICAL SYSTEMS
- Defending against phishing attacks: taxonomy of methods, current issues and future directions
- (2017) B. B. Gupta et al. TELECOMMUNICATION SYSTEMS
- Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study
- (2017) Puhakainen et al. MIS QUARTERLY
- Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- (2017) Bulgurcu et al. MIS QUARTERLY
- Dispositional and situational factors: influences on information security policy violations
- (2016) Allen C Johnston et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Why phishing still works: User strategies for combating phishing attacks
- (2015) Mohamed Alsharnouby et al. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES
- Employees’ adherence to information security policies: An exploratory field study
- (2013) Mikko Siponen et al. INFORMATION & MANAGEMENT
- Organizations' Information Security Policy Compliance: Stick or Carrot Approach?
- (2013) Yan Chen et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Phishing for phishing awareness
- (2011) K. Jansson et al. BEHAVIOUR & INFORMATION TECHNOLOGY
- The state of phishing attacks
- (2011) Jason Hong COMMUNICATIONS OF THE ACM
- Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
- (2011) Arun Vishwanath et al. DECISION SUPPORT SYSTEMS
- Out of fear or desire? Toward a better understanding of employees’ motivation to follow IS security policies
- (2011) Jai-Yeol Son INFORMATION & MANAGEMENT
- Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea
- (2011) Anat Hovav et al. INFORMATION & MANAGEMENT
- Teaching Johnny not to fall for phish
- (2010) Ponnurangam Kumaraguru et al. ACM Transactions on Internet Technology
- Compliance with Information Security Policies: An Empirical Investigation
- (2010) Mikko Siponen et al. COMPUTER
- The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived
- (2010) Ryan T. Wright et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- The amplification effects of procedural justice on a threat control model of information systems security behaviours
- (2009) Michael Workman et al. BEHAVIOUR & INFORMATION TECHNOLOGY
- Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
- (2009) Tejaswini Herath et al. DECISION SUPPORT SYSTEMS
- Behavioral and policy issues in information systems security: the insider threat
- (2009) Merrill Warkentin et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationPublish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn More