Developing a cyber security culture: Current practices and future needs
While the creation of a strong security culture has been researched and discussed for
decades, it continues to elude many businesses. Part of the challenge faced is distilling …
decades, it continues to elude many businesses. Part of the challenge faced is distilling …
Addressing human factors in cybersecurity leadership
WJ Triplett - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
This article identifies human factors in workplaces that contribute to the challenges faced by
cybersecurity leadership within organizations and discusses strategic communication …
cybersecurity leadership within organizations and discusses strategic communication …
[HTML][HTML] Towards a cybersecurity culture-behaviour framework: A rapid evidence review
A strong organisational cybersecurity culture (CSC) is critical to the success of any
cybersecurity effort, and understanding and measuring CSC is essential if it is to succeed …
cybersecurity effort, and understanding and measuring CSC is essential if it is to succeed …
Employees' intentions toward complying with information security controls in Saudi Arabia's public organisations
Ensuring employees' compliance with information security controls is a major challenge
experienced by the management of information security in organisations. While the …
experienced by the management of information security in organisations. While the …
ICT security tools and techniques among higher education institutions: A critical review
Higher education institutions (HEIs) are increasingly relying on digital technologies for
classroom and organizational management, but this puts them at higher risk for information …
classroom and organizational management, but this puts them at higher risk for information …
[HTML][HTML] Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees
Protecting sensitive healthcare data is particularly challenging. Nursing employees are
critical in protecting healthcare data since they make up a large portion of the healthcare …
critical in protecting healthcare data since they make up a large portion of the healthcare …
[HTML][HTML] Evaluating the Role of Protection Motivation Theory in Information Security Policy Compliance: Insights from the Banking Sector Using PLS-SEM Approach
EM Alrawhani, A Romli, MA Al-Sharafi - Journal of Open Innovation …, 2024 - Elsevier
This research investigated the behavior related to compliance with information security
policy in the Yemeni banking sector by using the protection motivation theory (PMT). While …
policy in the Yemeni banking sector by using the protection motivation theory (PMT). While …
[HTML][HTML] Addressing Cybersecurity Challenges in Times of Crisis: Extending the Sociotechnical Systems Perspective
Recent crises have significantly amplified cybersecurity challenges. Numerous studies have
identified these challenges during major crises; however, empirical investigations using a …
identified these challenges during major crises; however, empirical investigations using a …
Predictors of success in information security policy compliance
J Nord, CS Sargent, A Koohang… - Journal of Computer …, 2022 - Taylor & Francis
The purpose of this study is to build on the ISP compliance literature by creating a prediction
model that includes four predictor variables, namely, leadership, supportive organizational …
model that includes four predictor variables, namely, leadership, supportive organizational …
Bring Your Own Device Information Security Policy Compliance Framework: A Systematic Literature Review and Bibliometric Analysis (2017–2022)
OAAS AL-Azazi, AA Norman… - … Conference on Cyber …, 2022 - ieeexplore.ieee.org
The latest trend of using personal devices for work productivity is Bring Your Own Device
(BYOD). This rapid growth trend has excellent benefits for employees and organizations, but …
(BYOD). This rapid growth trend has excellent benefits for employees and organizations, but …