Cyber–information security compliance and violation behaviour in organisations: A systematic review

NS Sulaiman, MA Fauzi, W Wider, J Rajadurai… - Social Sciences, 2022 - mdpi.com
Cyber and information security (CIS) is an issue of national and international interest.
Despite sophisticated security systems and extensive physical countermeasures to combat …

What do we know about information security governance? “From the basement to the boardroom”: towards digital security governance

S Schinagl, A Shahim - Information & Computer Security, 2020 - emerald.com
Purpose This paper aims to review the information security governance (ISG) literature and
emphasises the tensions that exist at the intersection of the rapidly changing business …

Keeping customers' data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce

N Ameen, A Tarhini, MH Shah, N Madichie… - Computers in Human …, 2021 - Elsevier
Employees are increasingly relying on mobile devices. In international organizations, more
employees are using their personal smartphones for work purposes. Meanwhile, the number …

Managing cyber and information risks in supply chains: insights from an exploratory analysis

C Colicchia, A Creazza, DA Menachof - Supply Chain Management …, 2019 - emerald.com
Purpose The purpose of this paper is to explore how companies approach the management
of cyber and information risks in their supply chain, what initiatives they adopt to this aim …

A path to build supply chain cyber-resilience through absorptive capacity and visibility: Two empirical studies

K Sadeghi, A Azadegan, D Ojha - Industrial Marketing Management, 2023 - Elsevier
Little is known about cyber-resilience in supply chain management. Using two empirical
studies, this paper examines how visibility impacts cyber-resilience in times of data …

The cybersecurity behavioral research: A tertiary study

NF Khan, A Yaqoob, MS Khan, N Ikram - Computers & Security, 2022 - Elsevier
Context Cybersecurity has seen a rise in behavioral investigation during the past decades.
This includes studies being carried out at the primary as well as secondary levels. There are …

Firm-level antecedents and consequences of knowledge hiding climate

J Haar, C O'Kane, JA Cunningham - Journal of Business Research, 2022 - Elsevier
Abstract Knowledge hiding at the firm-level has received limited empirical attention. We
address this gap by examining the antecedents and consequences of knowledge hiding …

Literature review on supply chain collaboration: comparison of various collaborative techniques

N JS, A Chilkapure, VM Pillai - Journal of Advances in Management …, 2019 - emerald.com
Purpose The purpose of this paper is to create an understanding on the magnitude and
dimension of supply chain collaboration (SCC) reported in the literature. The detailed review …

The impact of information security initiatives on supply chain robustness and performance: an empirical study

S PN - Information & Computer Security, 2021 - emerald.com
Purpose Information security is an essential element in all business activities. The damage
to businesses from information security breaches has become pervasive. The scope of …

Responding to cybersecurity challenges: Securing vulnerable US emergency alert systems

AW Green, AB Woszczynski, K Dodson… - Communications of the …, 2020 - aisel.aisnet.org
Emergency alert systems (EASs) in the United States (US) form part of the nation's critical
infrastructure. These systems rely on aging platforms and suffer from a fragmented …