Understanding Shadow IT usage intention: a view of the dual-factor model

T Nguyen - Online Information Review, 2024 - emerald.com
Purpose Despite the growing concern about security breaches and risks emerging from
Shadow IT usage, a type of information security violation committed by organizational …

Cyberattack, cyber risk mitigation capabilities, and firm productivity in Kenya

GK Tetteh, C Otioma - Small Business Economics, 2024 - Springer
Most scholarly work has focused on the positive effects of digitalisation in Sub-Saharan
Africa without accounting for the associated risks and mitigation measures at the firm level …

Technological-personal factors of university students' behavioral intention to continue using online services after the pandemic

B Khashab, M Alraja, R Ayoubi, M Shah - Cogent Psychology, 2023 - Taylor & Francis
We examine the role of technological-personal factors of university students' behavioural
intention (BI) to continue using online services provided by the Ministry of Education in …

Information System Approaches in Cybersecurity

PAW Putro, EY Handri, DI Sensuse - Procedia Computer Science, 2024 - Elsevier
Although there have been reviews of research in cybersecurity, there has yet to be an
identification of the information systems approach used. This study aims to identify the trends …

Behavior Types from Cybersecurity Perspective: An Overview

A Almansoori - Current and Future Trends on Intelligent Technology …, 2024 - Springer
Contemporary organizations rely on information technologies to enhance productivity,
venture into new markets, promote innovation, and realize other benefits. However, these …

Educación, Formación, Conciencia, Conocimiento, y el Cumplimiento de la Política de Seguridad de la Información

S Bayona-Oré, N Fong - … Ibérica de Sistemas e Tecnologias de …, 2023 - search.proquest.com
Due to information security's (IS) importance in protecting organizations' data, international
standards, norms, and best practices have been proposed for managing IS. Organizations …

Effective Strategies University Information Technology Leaders Use to Prevent or Mitigate Cyberattacks' Costs

R Ekoteson - 2024 - search.proquest.com
Cyberattacks pose a significant threat to university institutions as universities increasingly
rely on computer networks to conduct day-to-day business activities. University information …

The Influence of Information Security Awareness Training on Information Security Policy Compliance Among Employees of the US Retail Industry

D Obadofin - 2023 - search.proquest.com
This study investigated the relationship between information security training and
awareness and employees' compliance with information security policy in the US retail …

State information security strategies in conditions of hybrid threats

A Khriapynskyi, I Khmyrov, I Svoboda, M Shevchuk… - 2023 - repositsc.nuczu.edu.ua
Hybrid information threats under the conditions of modern development of digital
technologies are currently becoming one of the major issues for a modern democracy. The …

Behavior Types from Cybersecurity Perspective: An Overview Check for updates

A Almansoori - Current and Future Trends on Intelligent Technology … - books.google.com
Contemporary organizations rely on information technologies to enhance productivity,
venture into new markets, promote innovation, and realize other benefits. However, these …