Antecedents and consequences of data breaches: A systematic review

F Schlackl, N Link, H Hoehle - Information & Management, 2022 - Elsevier
Research on data breaches is scattered across disciplines and methodologies. To help
consolidate it, we review 43 articles on data breaches' antecedents and 83 on their …

Remote vigilance: The roles of cyber awareness and cybersecurity policies among remote workers

JK Nwankpa, PM Datta - Computers & Security, 2023 - Elsevier
The convergence of increased remote working and rising cybersecurity threats have created
a severe challenge for organizations. As firms continue to embrace remote working, the …

What changed in the cyber-security after COVID-19?

R Kumar, S Sharma, C Vachhani, N Yadav - Computers & security, 2022 - Elsevier
This paper examines the transition in the cyber-security discipline induced by the ongoing
COVID-19 pandemic. Using the classical information retrieval techniques, a more than …

Exploring contrasting effects of trust in organizational security practices and protective structures on employees' security-related precaution taking

M Greulich, S Lins, D Pienta… - Information Systems …, 2024 - pubsonline.informs.org
Employees' precautionary security behaviors are vital to the effective protection of
organizations from cybersecurity threats. Despite substantial security training efforts …

Digital transformation security challenges

H Stewart - Journal of Computer Information Systems, 2023 - Taylor & Francis
Digital transformation has become one of the most popular strategies for information
systems (IS). Developing and implementing a digital strategy is a mandatory task for any …

Does privacy breach affect firm performance? An analysis incorporating event-induced changes and event clustering

M Tripathi, A Mukhopadhyay - Information & Management, 2022 - Elsevier
Previous studies have analyzed the impact of cybersecurity breaches on firm performance,
but the impact of the privacy breach on firm performance is less explored. Needless to say …

How do technology use patterns influence phishing susceptibility? A two-wave study of the role of reformulated locus of control

EW Ayaburi, FK Andoh-Baidoo - European Journal of Information …, 2023 - Taylor & Francis
Phishing attacks continue to be a concern for academia and practice. Practitioners ranked
phishing attacks second to data breaches in a recent industry survey. For scholars, interest …

[HTML][HTML] A maturity model for assessing the digitalization of public health agencies: Development and evaluation

E Doctor, T Eymann, D Fürstenau, M Gersch… - Business & Information …, 2023 - Springer
Requests for a coordinated response during the COVID-19 pandemic revealed the
limitations of locally-operating public health agencies (PHAs) and have resulted in a …

Enhancing cybersecurity capability investments: Evidence from an experiment

A Pigola, PR Da Costa, M Ferasso, LFC da Silva - Technology in Society, 2024 - Elsevier
In recent years, investments in cybersecurity capabilities (CC) have emerged as an essential
practice in reducing cyberattacks and optimizing the usage of technologies. Therefore …

[HTML][HTML] Paradoxical tensions in the implementation of digital security governance: toward an ambidextrous approach to governing digital security

S Schinagl, A Shahim, S Khapova - Computers & Security, 2022 - Elsevier
Due to increasing numbers of cyberattacks, security is one of the leading challenges to
contemporary organizations. As contradictory demands (eg, tensions in digital …