Compliance with Bring Your Own Device security policies in organizations: A systematic literature review
Abstract The omnipresence of Bring Your Own Device (BYOD) in organizations and
employees' lives makes it a challenge to ensure adherence to security policy. In such …
employees' lives makes it a challenge to ensure adherence to security policy. In such …
Seeing the forest and the trees
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …
(and noncompliance) with information security policies. However, the number of competing …
The cybersecurity behavioral research: A tertiary study
Context Cybersecurity has seen a rise in behavioral investigation during the past decades.
This includes studies being carried out at the primary as well as secondary levels. There are …
This includes studies being carried out at the primary as well as secondary levels. There are …
“Security begins at home”: Determinants of home computer and mobile device security behavior
Personal computing users are vulnerable to information security threats, as they must
independently make decisions about how to protect themselves, often with little …
independently make decisions about how to protect themselves, often with little …
Shaping intention to resist social engineering through transformational leadership, information security culture and awareness
WR Flores, M Ekstedt - Computers & security, 2016 - Elsevier
This paper empirically investigates how organizational and individual factors complement
each other in shaping employees' intention to resist social engineering. The study followed a …
each other in shaping employees' intention to resist social engineering. The study followed a …
Institutional governance and protection motivation: Theoretical insights into shaping employees' security compliance behavior in higher education institutions in the …
Higher education institutions (HEIs) are progressively computerized to deal with substantial
academic and operational information. With the increase in enriched information systems …
academic and operational information. With the increase in enriched information systems …
Exploring the factors that influence the cybersecurity behaviors of young adults
Young adults aged between 18 and 30 are likely to encounter increasing cyber threats.
Understanding the cybersecurity behaviors of young adults, and identifying the measures …
Understanding the cybersecurity behaviors of young adults, and identifying the measures …
The sufficiency of the theory of planned behavior for explaining information security policy compliance
T Sommestad, H Karlzén, J Hallberg - Information & Computer …, 2015 - emerald.com
Purpose–This paper aims to challenge the assumption that the theory of planned behaviour
(TPB) includes all constructs that explain information security policy compliance and …
(TPB) includes all constructs that explain information security policy compliance and …
From information security awareness to reasoned compliant action: analyzing information security policy compliance in a large banking organization
S Bauer, EWN Bernroider - ACM SIGMIS Database: the DATABASE for …, 2017 - dl.acm.org
Despite the importance of information security, far too many organizations, in particular
banks, are facing behavioral information security incidents. In the context given by the …
banks, are facing behavioral information security incidents. In the context given by the …
A meta-analysis of studies on protection motivation theory and information security behaviour
T Sommestad, H Karlzén, J Hallberg - International Journal of …, 2015 - igi-global.com
Individuals' willingness to take security precautions is imperative to their own information
security and the information security of the organizations they work within. This paper …
security and the information security of the organizations they work within. This paper …