Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Business

The Informed Human Firewall: The Impact Of Knowledge Dimensions On Employees' Secure Behavior, Ashraf Mady Apr 2019

The Informed Human Firewall: The Impact Of Knowledge Dimensions On Employees' Secure Behavior, Ashraf Mady

PhD in Business Administration Dissertations

Organizations implement a variety of knowledge mechanisms such as information security education, training, and awareness (SETA) programs and information security policies to influence employees’ secure behavior. However, skills gained through these knowledge mechanisms have not always translated to secure behavior. Protection motivation theory (PMT) is a widely used and accepted theory in information security behavioral research. Nevertheless, information security research has not examined the impact of knowledge mechanisms on PMT psychological processes. This study explains the key psychological processes that influence employees’ secure behavior and seeks to understand how organizational knowledge mechanisms influence these key psychological processes that form threats …


From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord Dec 2018

From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Welcome to the Fall 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.


Investigating Information Security Policy Characteristics: Do Quality, Enforcement And Compliance Reduce Organizational Fraud?, Dennis T. Brown Jul 2018

Investigating Information Security Policy Characteristics: Do Quality, Enforcement And Compliance Reduce Organizational Fraud?, Dennis T. Brown

Doctor of Business Administration Dissertations

Organizational fraud, a deceitful practice or willful device resorted to with intent to deprive another of his right, or in some manner to do harm or injury, is a growing global concern. While cyberattacks from the outside are more expected, the internal security threat from trusted insiders is responsible for significantly more information compromise than external threats. Information systems make life easier but are increasingly used by employees to perpetrate fraudulent activities. For example, a trusted insider employee with access to sensitive customer databases could misappropriate information and sell it to a competitor for personal gain. These type losses are …


Coso: More Relevant Now Than Ever, Heather M. Hermanson Jul 2003

Coso: More Relevant Now Than Ever, Heather M. Hermanson

Faculty Articles

In 1992 when the Committee of Sponsoring Organizations of the Treadway Commission (COSO) issued its internal control framework, few would have guessed that the framework would become an integral part of corporate accountability a decade later, but things are moving in that direction. COSO's framework may become an important tool for implementing the directives set forth in the Sarbanes-Oxley Act of 2002. With the newly mandated reporting on controls and other directives set forth in the Sarbanes-Oxley Act, the full effect of COSO's internal control vision may finally be realized. COSO's framework may help to address compliance with the new …