Antecedents and consequences of data breaches: A systematic review
F Schlackl, N Link, H Hoehle - Information & Management, 2022 - Elsevier
Research on data breaches is scattered across disciplines and methodologies. To help
consolidate it, we review 43 articles on data breaches' antecedents and 83 on their …
consolidate it, we review 43 articles on data breaches' antecedents and 83 on their …
Remote vigilance: The roles of cyber awareness and cybersecurity policies among remote workers
JK Nwankpa, PM Datta - Computers & Security, 2023 - Elsevier
The convergence of increased remote working and rising cybersecurity threats have created
a severe challenge for organizations. As firms continue to embrace remote working, the …
a severe challenge for organizations. As firms continue to embrace remote working, the …
What changed in the cyber-security after COVID-19?
This paper examines the transition in the cyber-security discipline induced by the ongoing
COVID-19 pandemic. Using the classical information retrieval techniques, a more than …
COVID-19 pandemic. Using the classical information retrieval techniques, a more than …
Exploring contrasting effects of trust in organizational security practices and protective structures on employees' security-related precaution taking
Employees' precautionary security behaviors are vital to the effective protection of
organizations from cybersecurity threats. Despite substantial security training efforts …
organizations from cybersecurity threats. Despite substantial security training efforts …
Digital transformation security challenges
H Stewart - Journal of Computer Information Systems, 2023 - Taylor & Francis
Digital transformation has become one of the most popular strategies for information
systems (IS). Developing and implementing a digital strategy is a mandatory task for any …
systems (IS). Developing and implementing a digital strategy is a mandatory task for any …
Does privacy breach affect firm performance? An analysis incorporating event-induced changes and event clustering
M Tripathi, A Mukhopadhyay - Information & Management, 2022 - Elsevier
Previous studies have analyzed the impact of cybersecurity breaches on firm performance,
but the impact of the privacy breach on firm performance is less explored. Needless to say …
but the impact of the privacy breach on firm performance is less explored. Needless to say …
How do technology use patterns influence phishing susceptibility? A two-wave study of the role of reformulated locus of control
EW Ayaburi, FK Andoh-Baidoo - European Journal of Information …, 2023 - Taylor & Francis
Phishing attacks continue to be a concern for academia and practice. Practitioners ranked
phishing attacks second to data breaches in a recent industry survey. For scholars, interest …
phishing attacks second to data breaches in a recent industry survey. For scholars, interest …
[HTML][HTML] A maturity model for assessing the digitalization of public health agencies: Development and evaluation
Requests for a coordinated response during the COVID-19 pandemic revealed the
limitations of locally-operating public health agencies (PHAs) and have resulted in a …
limitations of locally-operating public health agencies (PHAs) and have resulted in a …
Enhancing cybersecurity capability investments: Evidence from an experiment
In recent years, investments in cybersecurity capabilities (CC) have emerged as an essential
practice in reducing cyberattacks and optimizing the usage of technologies. Therefore …
practice in reducing cyberattacks and optimizing the usage of technologies. Therefore …
[HTML][HTML] Paradoxical tensions in the implementation of digital security governance: toward an ambidextrous approach to governing digital security
S Schinagl, A Shahim, S Khapova - Computers & Security, 2022 - Elsevier
Due to increasing numbers of cyberattacks, security is one of the leading challenges to
contemporary organizations. As contradictory demands (eg, tensions in digital …
contemporary organizations. As contradictory demands (eg, tensions in digital …