State of the art in information security policy development
Despite the prevalence of research that exists under the label of “information security
policies”(ISPs), there is no consensus on what an ISP means or how ISPs should be …
policies”(ISPs), there is no consensus on what an ISP means or how ISPs should be …
[HTML][HTML] Countermeasures and their taxonomies for risk treatment in cybersecurity: A systematic mapping review
ID Sánchez-García, TSF Gilabert… - Computers & Security, 2023 - Elsevier
Cybersecurity continues to be one of the principal issues in the computing environment.
Organizations and researchers have made various efforts to mitigate the risks of cyberspace …
Organizations and researchers have made various efforts to mitigate the risks of cyberspace …
Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model
Organizational information security (ISec) threats have exploded with advances in
globalization and technology. Thus, organizations are scrambling to find both technical and …
globalization and technology. Thus, organizations are scrambling to find both technical and …
[HTML][HTML] The impact of artificial intelligence adoption for business-to-business marketing on shareholder reaction: A social actor perspective
While AI applications are becoming ever more important in B2B marketing operations, there
is a lack of research to examine whether and how shareholders react to firms' AI-enabled …
is a lack of research to examine whether and how shareholders react to firms' AI-enabled …
The effect of organizational information security climate on information security policy compliance: The mediating effect of social bonding towards healthcare nurses
The advancement of information communication technology in healthcare institutions has
increased information security breaches. Scholars and industry practitioners have reported …
increased information security breaches. Scholars and industry practitioners have reported …
Security behaviors of smartphone users
Purpose–This paper aims to report on the information security behaviors of smartphone
users in an affluent economy of the Middle East. Design/methodology/approach–A model …
users in an affluent economy of the Middle East. Design/methodology/approach–A model …
[HTML][HTML] Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method
Employees' poor compliance with information security policies is a perennial problem.
Current information security analysis methods do not allow information security managers to …
Current information security analysis methods do not allow information security managers to …
Stakeholder perceptions of information security policy: Analyzing personal constructs
S Samonas, G Dhillon, A Almusharraf - International Journal of Information …, 2020 - Elsevier
Organizational stakeholders, such as employees and security managers, may understand
security rules and policies differently. Extant literature suggests that stakeholder perceptions …
security rules and policies differently. Extant literature suggests that stakeholder perceptions …
Cyber-risk in healthcare: Exploring facilitators and barriers to secure behaviour
There are increasing concerns relating to cybersecurity of healthcare data and medical
devices. Cybersecurity in this sector is particularly important given the criticality of healthcare …
devices. Cybersecurity in this sector is particularly important given the criticality of healthcare …
Protective measures and security policy non-compliance intention: It vision conflict as a moderator
KC Chang, YM Seow - Journal of Organizational and End User …, 2019 - igi-global.com
Internal vulnerabilities and insider threats top the list of information security (InfoSec)
incidents; prompting organizations to establish InfoSec policy (ISP). Yet, mitigating user's …
incidents; prompting organizations to establish InfoSec policy (ISP). Yet, mitigating user's …