A systematic mapping study on gamification within information security awareness programs

O Pahlavanpour, S Gao - Heliyon, 2024 - cell.com
Abstract Information security awareness (ISA) has become a vital issue for organizations, as
security breaches are usually attributed to human errors. ISP programs are effective ways to …

[HTML][HTML] Information security policies compliance in a global setting: An employee's perspective

MN Alraja, UJ Butt, M Abbod - Computers & Security, 2023 - Elsevier
Abstract Information security threats have a severe negative impact on enterprises.
Organizations rely on employee compliance with information security policies to eliminate or …

Explanations of Insider Deviant Behavior in Information Security: A Systematic Literature Review

E Anti, T Vartiainen - 2024 - osuva.uwasa.fi
Insider deviant behavior (IDB) in information security (IS) poses significant threats to public
and private organizations. To enhance our understanding of IDB, we conducted a systematic …

How different rewards tend to influence employee non-compliance with information security policies

R Khatib, H Barki - Information & Computer Security, 2022 - emerald.com
Purpose To help reduce the increasing number of information security breaches that are
caused by insiders, past research has examined employee non-compliance with information …

Psychological Capital and Information Security Policy Compliance

J Zhao, Y Hong, W Chen, C Chen - Journal of Computer …, 2024 - Taylor & Francis
Combining cognitive and affective influences, as well as considering role-breadth constructs
is critical to the study of employees' information security policy (ISP) compliance. This paper …

Keeping the gates closed: the effect of conflict management styles, anxiety, and technical skills on security noncompliance intention among smartphone users

D Rahmani, H Jafarzadeh, AC Hess - Behaviour & Information …, 2024 - Taylor & Francis
Using personal mobile phones for work-related purposes is an increasingly common trend
in organisations yet adding to cyber security concerns. It is vital to identify employees' …

The role of organizational and social factors for information security in a nuclear power industry

K Gyllensten, M Torner - Organizational Cybersecurity Journal …, 2022 - emerald.com
Purpose The aim of this study was to explore the organizational and social prerequisites for
employees' participative and rule-compliant information security behaviour in Swedish …

A Framework for Matching Distinct Personality Types with Information Security Awareness Methods

V Jashari, S Björn, E Kolkowska, S Gao - International Symposium on …, 2024 - Springer
The objective of this study is to develop a framework to associate learning styles and social
influencing vulnerabilities with different personality types in the context of tailoring …

Exploring the Antecedents of Shadow Information Security Practices

D Dang-Pham, N Thompson, A Ahmad, S Maynard - 2023 - aisel.aisnet.org
Employees are both the first line of defence in organisations as well as a significant source
of vulnerability. Behavioural research in information security (InfoSec) has studied …

Educación, Formación, Conciencia, Conocimiento, y el Cumplimiento de la Política de Seguridad de la Información

S Bayona-Oré, N Fong - … Ibérica de Sistemas e Tecnologias de …, 2023 - search.proquest.com
Due to information security's (IS) importance in protecting organizations' data, international
standards, norms, and best practices have been proposed for managing IS. Organizations …