Compliance with Bring Your Own Device security policies in organizations: A systematic literature review

R Palanisamy, AA Norman, MLM Kiah - Computers & Security, 2020 - Elsevier
Abstract The omnipresence of Bring Your Own Device (BYOD) in organizations and
employees' lives makes it a challenge to ensure adherence to security policy. In such …

Seeing the forest and the trees

WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - JSTOR
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …

The cybersecurity behavioral research: A tertiary study

NF Khan, A Yaqoob, MS Khan, N Ikram - Computers & Security, 2022 - Elsevier
Context Cybersecurity has seen a rise in behavioral investigation during the past decades.
This includes studies being carried out at the primary as well as secondary levels. There are …

“Security begins at home”: Determinants of home computer and mobile device security behavior

N Thompson, TJ McGill, X Wang - computers & security, 2017 - Elsevier
Personal computing users are vulnerable to information security threats, as they must
independently make decisions about how to protect themselves, often with little …

Shaping intention to resist social engineering through transformational leadership, information security culture and awareness

WR Flores, M Ekstedt - Computers & security, 2016 - Elsevier
This paper empirically investigates how organizational and individual factors complement
each other in shaping employees' intention to resist social engineering. The study followed a …

Institutional governance and protection motivation: Theoretical insights into shaping employees' security compliance behavior in higher education institutions in the …

S Hina, DDDP Selvam, PB Lowry - Computers & Security, 2019 - Elsevier
Higher education institutions (HEIs) are progressively computerized to deal with substantial
academic and operational information. With the increase in enriched information systems …

Exploring the factors that influence the cybersecurity behaviors of young adults

M Alanazi, M Freeman, H Tootell - Computers in Human Behavior, 2022 - Elsevier
Young adults aged between 18 and 30 are likely to encounter increasing cyber threats.
Understanding the cybersecurity behaviors of young adults, and identifying the measures …

The sufficiency of the theory of planned behavior for explaining information security policy compliance

T Sommestad, H Karlzén, J Hallberg - Information & Computer …, 2015 - emerald.com
Purpose–This paper aims to challenge the assumption that the theory of planned behaviour
(TPB) includes all constructs that explain information security policy compliance and …

From information security awareness to reasoned compliant action: analyzing information security policy compliance in a large banking organization

S Bauer, EWN Bernroider - ACM SIGMIS Database: the DATABASE for …, 2017 - dl.acm.org
Despite the importance of information security, far too many organizations, in particular
banks, are facing behavioral information security incidents. In the context given by the …

A meta-analysis of studies on protection motivation theory and information security behaviour

T Sommestad, H Karlzén, J Hallberg - International Journal of …, 2015 - igi-global.com
Individuals' willingness to take security precautions is imperative to their own information
security and the information security of the organizations they work within. This paper …