About
8
Publications
4,031
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
50
Citations
Introduction
Skills and Expertise
Publications
Publications (8)
Deterrence theory is one of the most commonly used theories to study information security policy non-compliance behavior. However, the results of studies in the information security field are ambiguous. To further address this heterogeneity, various influencing factors have been considered in the context of deterrence theory. However, a current cha...
Information security attacks typically exploit the weakest link in the chain, which in most cases is the IT end user at the workplace. While great strides have been made in understanding and explaining information security behavior, little is known about how such behavior is acquired by individuals in the first place. This research approaches the p...
Companies around the world are faced with challenges in dealing with data breaches. While in Germany companies need to notify the affected and fear to lose their valuable customers, in Bolivia, where rapid digital globalization increases vulnerability, data security overall is not a publicly present topic, and customers are directly exposed to the...
Information security compliance behavior research has produced several theoretical models derived from different disciplines to explain or predict violations of information security policies (ISP) or related employee intentions. The application of these theories to ISP violations has led to an increasing number of information security behavioral mo...
Information security has become an important aspect of contemporary information technology in organizations and influence the way in which work is done and information is sent between organizations. Human information system behaviors with regard to information security policies, i.e. information security compliance (ISC) must not be ignored, as the...