Exploring the frontiers of cybersecurity behavior: a systematic review of studies and theories

A Almansoori, M Al-Emran, K Shaalan - Applied Sciences, 2023 - mdpi.com
Cybersecurity procedures and policies are prevalent countermeasures for protecting
organizations from cybercrimes and security incidents. Without considering human …

Knowledge sharing and theory of planned behavior: a bibliometric analysis

MA Fauzi, M Nguyen, A Malik - Journal of Knowledge Management, 2023 - emerald.com
Knowledge sharing and theory of planned behavior: a bibliometric analysis | Emerald Insight
Books and journals Case studies Expert Briefings Open Access Publish with us Advanced …

Systematic literature review: Theory perspective in lean manufacturing performance

NM Aripin, G Nawanir, F Mahmud, MA Fauzi… - … Systems in Production …, 2023 - sciendo.com
This review examines the trend of applying theories in LM performance and offers the latest
recapitulation of related theories in LM performance. The methodology is based on …

Social media influencer marketing: science mapping of the present and future trends

MA Fauzi, Z Ali, Z Satari, PAM Ramli… - International Journal of …, 2024 - emerald.com
Purpose This study aims to reveal the knowledge structure of social media influencer
marketing literature by performing science mapping analysis through a state-of-the-art …

Digital supply chain transformation: The role of smart technologies on operational performance in manufacturing industry

KL Lee, CX Teong, HM Alzoubi… - International …, 2024 - journals.sagepub.com
This study aims to investigate the impact of digital supply chains and smart technology on
the operational performance of the manufacturing industry. Due to the lack of knowledge …

ESASCF: expertise extraction, generalization and reply framework for optimized automation of network security compliance

MC Ghanem, TM Chen, MA Ferrag… - IEEE Access, 2023 - ieeexplore.ieee.org
Organizations constantly exposed to cyber threats are compelled to comply with cyber
security standards and policies for protecting their digital assets. Vulnerability assessment …

Pro-environmental behavior and the theory of planned behavior: a state of the art science mapping

L Zulkepeli, MA Fauzi, NM Suki, MH Ahmad… - Management of …, 2024 - emerald.com
Pro-environmental behavior and the theory of planned behavior: a state of the art science
mapping | Emerald Insight Books and journals Case studies Expert Briefings Open Access …

Reducing Fraud in Organizations through Information Security Policy Compliance: An Information Security Controls Perspective

D Brown, G Batra, H Zafar, K Saeed - Computers & Security, 2024 - Elsevier
As more business processes and information assets are digitized, computer resources are
increasingly being misused to perpetrate fraudulent activities. Research shows that fraud …

Green human resources in higher education institutions: a systematic literature review

ZA Saad, MA Fauzi, L Zulkepeli… - Journal of Applied …, 2024 - emerald.com
Purpose The purpose of this study is to conduct a comprehensive examination of the
concept of green human resources management (GHRM) within the context of higher …

Information Security Awareness in Higher Education Institutes: A Work in Progress

R Rohan, S Funilkul, W Chutimaskul… - … on Knowledge and …, 2023 - ieeexplore.ieee.org
The demands for information security in Higher Education Institutions (HEIs) are expanding
as HEIs are vulnerable because of the involvement of human factors. Hence, maintaining …