A systematic mapping study on gamification within information security awareness programs
O Pahlavanpour, S Gao - Heliyon, 2024 - cell.com
Abstract Information security awareness (ISA) has become a vital issue for organizations, as
security breaches are usually attributed to human errors. ISP programs are effective ways to …
security breaches are usually attributed to human errors. ISP programs are effective ways to …
[HTML][HTML] Information security policies compliance in a global setting: An employee's perspective
Abstract Information security threats have a severe negative impact on enterprises.
Organizations rely on employee compliance with information security policies to eliminate or …
Organizations rely on employee compliance with information security policies to eliminate or …
Explanations of Insider Deviant Behavior in Information Security: A Systematic Literature Review
E Anti, T Vartiainen - 2024 - osuva.uwasa.fi
Insider deviant behavior (IDB) in information security (IS) poses significant threats to public
and private organizations. To enhance our understanding of IDB, we conducted a systematic …
and private organizations. To enhance our understanding of IDB, we conducted a systematic …
How different rewards tend to influence employee non-compliance with information security policies
Purpose To help reduce the increasing number of information security breaches that are
caused by insiders, past research has examined employee non-compliance with information …
caused by insiders, past research has examined employee non-compliance with information …
Psychological Capital and Information Security Policy Compliance
J Zhao, Y Hong, W Chen, C Chen - Journal of Computer …, 2024 - Taylor & Francis
Combining cognitive and affective influences, as well as considering role-breadth constructs
is critical to the study of employees' information security policy (ISP) compliance. This paper …
is critical to the study of employees' information security policy (ISP) compliance. This paper …
Keeping the gates closed: the effect of conflict management styles, anxiety, and technical skills on security noncompliance intention among smartphone users
Using personal mobile phones for work-related purposes is an increasingly common trend
in organisations yet adding to cyber security concerns. It is vital to identify employees' …
in organisations yet adding to cyber security concerns. It is vital to identify employees' …
The role of organizational and social factors for information security in a nuclear power industry
K Gyllensten, M Torner - Organizational Cybersecurity Journal …, 2022 - emerald.com
Purpose The aim of this study was to explore the organizational and social prerequisites for
employees' participative and rule-compliant information security behaviour in Swedish …
employees' participative and rule-compliant information security behaviour in Swedish …
A Framework for Matching Distinct Personality Types with Information Security Awareness Methods
V Jashari, S Björn, E Kolkowska, S Gao - International Symposium on …, 2024 - Springer
The objective of this study is to develop a framework to associate learning styles and social
influencing vulnerabilities with different personality types in the context of tailoring …
influencing vulnerabilities with different personality types in the context of tailoring …
Exploring the Antecedents of Shadow Information Security Practices
Employees are both the first line of defence in organisations as well as a significant source
of vulnerability. Behavioural research in information security (InfoSec) has studied …
of vulnerability. Behavioural research in information security (InfoSec) has studied …
Educación, Formación, Conciencia, Conocimiento, y el Cumplimiento de la Política de Seguridad de la Información
S Bayona-Oré, N Fong - … Ibérica de Sistemas e Tecnologias de …, 2023 - search.proquest.com
Due to information security's (IS) importance in protecting organizations' data, international
standards, norms, and best practices have been proposed for managing IS. Organizations …
standards, norms, and best practices have been proposed for managing IS. Organizations …