Understanding Shadow IT usage intention: a view of the dual-factor model
T Nguyen - Online Information Review, 2024 - emerald.com
Purpose Despite the growing concern about security breaches and risks emerging from
Shadow IT usage, a type of information security violation committed by organizational …
Shadow IT usage, a type of information security violation committed by organizational …
Cyberattack, cyber risk mitigation capabilities, and firm productivity in Kenya
GK Tetteh, C Otioma - Small Business Economics, 2024 - Springer
Most scholarly work has focused on the positive effects of digitalisation in Sub-Saharan
Africa without accounting for the associated risks and mitigation measures at the firm level …
Africa without accounting for the associated risks and mitigation measures at the firm level …
Technological-personal factors of university students' behavioral intention to continue using online services after the pandemic
We examine the role of technological-personal factors of university students' behavioural
intention (BI) to continue using online services provided by the Ministry of Education in …
intention (BI) to continue using online services provided by the Ministry of Education in …
Information System Approaches in Cybersecurity
Although there have been reviews of research in cybersecurity, there has yet to be an
identification of the information systems approach used. This study aims to identify the trends …
identification of the information systems approach used. This study aims to identify the trends …
Behavior Types from Cybersecurity Perspective: An Overview
A Almansoori - Current and Future Trends on Intelligent Technology …, 2024 - Springer
Contemporary organizations rely on information technologies to enhance productivity,
venture into new markets, promote innovation, and realize other benefits. However, these …
venture into new markets, promote innovation, and realize other benefits. However, these …
Educación, Formación, Conciencia, Conocimiento, y el Cumplimiento de la Política de Seguridad de la Información
S Bayona-Oré, N Fong - … Ibérica de Sistemas e Tecnologias de …, 2023 - search.proquest.com
Due to information security's (IS) importance in protecting organizations' data, international
standards, norms, and best practices have been proposed for managing IS. Organizations …
standards, norms, and best practices have been proposed for managing IS. Organizations …
Effective Strategies University Information Technology Leaders Use to Prevent or Mitigate Cyberattacks' Costs
R Ekoteson - 2024 - search.proquest.com
Cyberattacks pose a significant threat to university institutions as universities increasingly
rely on computer networks to conduct day-to-day business activities. University information …
rely on computer networks to conduct day-to-day business activities. University information …
The Influence of Information Security Awareness Training on Information Security Policy Compliance Among Employees of the US Retail Industry
D Obadofin - 2023 - search.proquest.com
This study investigated the relationship between information security training and
awareness and employees' compliance with information security policy in the US retail …
awareness and employees' compliance with information security policy in the US retail …
State information security strategies in conditions of hybrid threats
A Khriapynskyi, I Khmyrov, I Svoboda, M Shevchuk… - 2023 - repositsc.nuczu.edu.ua
Hybrid information threats under the conditions of modern development of digital
technologies are currently becoming one of the major issues for a modern democracy. The …
technologies are currently becoming one of the major issues for a modern democracy. The …
Behavior Types from Cybersecurity Perspective: An Overview Check for updates
A Almansoori - Current and Future Trends on Intelligent Technology … - books.google.com
Contemporary organizations rely on information technologies to enhance productivity,
venture into new markets, promote innovation, and realize other benefits. However, these …
venture into new markets, promote innovation, and realize other benefits. However, these …