Developing a cyber security culture: Current practices and future needs

B Uchendu, JRC Nurse, M Bada, S Furnell - Computers & Security, 2021 - Elsevier
While the creation of a strong security culture has been researched and discussed for
decades, it continues to elude many businesses. Part of the challenge faced is distilling …

Addressing human factors in cybersecurity leadership

WJ Triplett - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
This article identifies human factors in workplaces that contribute to the challenges faced by
cybersecurity leadership within organizations and discusses strategic communication …

[HTML][HTML] Towards a cybersecurity culture-behaviour framework: A rapid evidence review

A Sutton, L Tompson - Computers & Security, 2024 - Elsevier
A strong organisational cybersecurity culture (CSC) is critical to the success of any
cybersecurity effort, and understanding and measuring CSC is essential if it is to succeed …

Employees' intentions toward complying with information security controls in Saudi Arabia's public organisations

S AlGhamdi, KT Win, E Vlahu-Gjorgievska - Government Information …, 2022 - Elsevier
Ensuring employees' compliance with information security controls is a major challenge
experienced by the management of information security in organisations. While the …

ICT security tools and techniques among higher education institutions: A critical review

M Nuñez, XL Palmer, L Potter… - … Journal of Emerging …, 2023 - digitalcommons.odu.edu
Higher education institutions (HEIs) are increasingly relying on digital technologies for
classroom and organizational management, but this puts them at higher risk for information …

[HTML][HTML] Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees

S Mikuletič, S Vrhovec, B Skela-Savič, B Žvanut - Computers & Security, 2024 - Elsevier
Protecting sensitive healthcare data is particularly challenging. Nursing employees are
critical in protecting healthcare data since they make up a large portion of the healthcare …

[HTML][HTML] Evaluating the Role of Protection Motivation Theory in Information Security Policy Compliance: Insights from the Banking Sector Using PLS-SEM Approach

EM Alrawhani, A Romli, MA Al-Sharafi - Journal of Open Innovation …, 2024 - Elsevier
This research investigated the behavior related to compliance with information security
policy in the Yemeni banking sector by using the protection motivation theory (PMT). While …

[HTML][HTML] Addressing Cybersecurity Challenges in Times of Crisis: Extending the Sociotechnical Systems Perspective

S Mahmood, M Chadhar, S Firmin - Applied Sciences, 2024 - mdpi.com
Recent crises have significantly amplified cybersecurity challenges. Numerous studies have
identified these challenges during major crises; however, empirical investigations using a …

Predictors of success in information security policy compliance

J Nord, CS Sargent, A Koohang… - Journal of Computer …, 2022 - Taylor & Francis
The purpose of this study is to build on the ISP compliance literature by creating a prediction
model that includes four predictor variables, namely, leadership, supportive organizational …

Bring Your Own Device Information Security Policy Compliance Framework: A Systematic Literature Review and Bibliometric Analysis (2017–2022)

OAAS AL-Azazi, AA Norman… - … Conference on Cyber …, 2022 - ieeexplore.ieee.org
The latest trend of using personal devices for work productivity is Bring Your Own Device
(BYOD). This rapid growth trend has excellent benefits for employees and organizations, but …