Antecedents and consequences of data breaches: A systematic review

F Schlackl, N Link, H Hoehle - Information & Management, 2022 - Elsevier
Research on data breaches is scattered across disciplines and methodologies. To help
consolidate it, we review 43 articles on data breaches' antecedents and 83 on their …

Exploring the factors influencing information security policy compliance and violations: A systematic literature review

N Balagopal, SK Mathew - Computers & Security, 2024 - Elsevier
Despite advancements in security technology, the prevalence of insider threats has been on
the rise in recent years. Organizations implement Information Security Policies (ISPs) that …

What are the trend and core knowledge of information security? A citation and co-citation analysis

WL Shiau, X Wang, F Zheng - Information & Management, 2023 - Elsevier
Abstract Information technology brings business success opportunities, but also causes
potential safety hazards to organizations. In response to the increasing academia and …

Cultivating proactive information security behavior and individual creativity: The role of human relations culture and IT use governance

C Lin, JLS Wittmer, XR Luo - Information & Management, 2022 - Elsevier
This study developed the concept of proactive information security behavior and examined
its connections with individual creativity and two organizational context factors: human …

Beyond adaptive security coping behaviors: Theory and empirical evidence

Y Chen, XR Luo, H Li - Information & Management, 2022 - Elsevier
Extant research seldom focuses on maladaptive security coping behaviors. Applying the
extended parallel process model, this study has developed a research model to reveal the …

Data security crisis in universities: identification of key factors affecting data breach incidents

J Li, W Xiao, C Zhang - Humanities and Social Sciences …, 2023 - nature.com
The extremely complex and dynamic digital environments of universities make them highly
vulnerable to the risk of data breaches. This study empirically investigated the factors …

Going beyond deterrence: A middle-range theory of motives and controls for insider computer abuse

AJ Burns, TL Roberts, C Posey… - Information Systems …, 2023 - pubsonline.informs.org
Despite widespread agreement among practitioners and academicians that organizational
insiders are a significant threat to organizational information systems security, insider …

Rethinking Gamification Failure: A Model and Investigation of Gamified System Maladaptive Behaviors

SLA Tseng, H Sun, R Santhanam… - Information Systems …, 2023 - pubsonline.informs.org
Despite the increasing interest in gamified systems and excitement about their potential
positive impact on user engagement, a few studies have started to note gamification failures …

The antecedents of employees' proactive information security behaviour: The perspective of proactive motivation

F Xu, C Hsu, T Wang, PB Lowry - Information Systems Journal, 2024 - Wiley Online Library
Organisational information security (ISec) protection is undergoing a turbulent shift in the
workplace environment. In an environment of ever‐increasing risks of insider threats and …

A privacy risk identification framework of open government data: A mixed-method study in China

Y Li, R Yang, Y Lu - Government Information Quarterly, 2024 - Elsevier
Open government data (OGD) has great potential to promote economic growth, stimulate
innovation, and improve service efficiency. However, as more and more private information …