Antecedents and consequences of data breaches: A systematic review
F Schlackl, N Link, H Hoehle - Information & Management, 2022 - Elsevier
Research on data breaches is scattered across disciplines and methodologies. To help
consolidate it, we review 43 articles on data breaches' antecedents and 83 on their …
consolidate it, we review 43 articles on data breaches' antecedents and 83 on their …
Exploring the factors influencing information security policy compliance and violations: A systematic literature review
N Balagopal, SK Mathew - Computers & Security, 2024 - Elsevier
Despite advancements in security technology, the prevalence of insider threats has been on
the rise in recent years. Organizations implement Information Security Policies (ISPs) that …
the rise in recent years. Organizations implement Information Security Policies (ISPs) that …
What are the trend and core knowledge of information security? A citation and co-citation analysis
Abstract Information technology brings business success opportunities, but also causes
potential safety hazards to organizations. In response to the increasing academia and …
potential safety hazards to organizations. In response to the increasing academia and …
Cultivating proactive information security behavior and individual creativity: The role of human relations culture and IT use governance
C Lin, JLS Wittmer, XR Luo - Information & Management, 2022 - Elsevier
This study developed the concept of proactive information security behavior and examined
its connections with individual creativity and two organizational context factors: human …
its connections with individual creativity and two organizational context factors: human …
Beyond adaptive security coping behaviors: Theory and empirical evidence
Extant research seldom focuses on maladaptive security coping behaviors. Applying the
extended parallel process model, this study has developed a research model to reveal the …
extended parallel process model, this study has developed a research model to reveal the …
Data security crisis in universities: identification of key factors affecting data breach incidents
J Li, W Xiao, C Zhang - Humanities and Social Sciences …, 2023 - nature.com
The extremely complex and dynamic digital environments of universities make them highly
vulnerable to the risk of data breaches. This study empirically investigated the factors …
vulnerable to the risk of data breaches. This study empirically investigated the factors …
Going beyond deterrence: A middle-range theory of motives and controls for insider computer abuse
Despite widespread agreement among practitioners and academicians that organizational
insiders are a significant threat to organizational information systems security, insider …
insiders are a significant threat to organizational information systems security, insider …
Rethinking Gamification Failure: A Model and Investigation of Gamified System Maladaptive Behaviors
Despite the increasing interest in gamified systems and excitement about their potential
positive impact on user engagement, a few studies have started to note gamification failures …
positive impact on user engagement, a few studies have started to note gamification failures …
The antecedents of employees' proactive information security behaviour: The perspective of proactive motivation
Organisational information security (ISec) protection is undergoing a turbulent shift in the
workplace environment. In an environment of ever‐increasing risks of insider threats and …
workplace environment. In an environment of ever‐increasing risks of insider threats and …
A privacy risk identification framework of open government data: A mixed-method study in China
Y Li, R Yang, Y Lu - Government Information Quarterly, 2024 - Elsevier
Open government data (OGD) has great potential to promote economic growth, stimulate
innovation, and improve service efficiency. However, as more and more private information …
innovation, and improve service efficiency. However, as more and more private information …