Emotional Cost of Cyber Crime and Cybersecurity Protection Motivation Behaviour: A Systematic Literature Review
The impact of a cyberattack on an organisation is multifaceted, at the employee level, cyber
threat is a sensitive issue which needs further understanding. Founded in psychology …
threat is a sensitive issue which needs further understanding. Founded in psychology …
Information systems security resilience as a dynamic capability
Purpose While the idea of the resilience of information systems security exists, there is a lack
of research that conceptualizes, defines and specifies a way to measure it as a dynamic …
of research that conceptualizes, defines and specifies a way to measure it as a dynamic …
Synthesizing Information Security Policy Compliance And Non-compliance: A Comprehensive Study And Unified Framework
A Aggarwal, SK Srivastava - Journal of Organizational Computing …, 2024 - Taylor & Francis
In today's organizational landscape, safeguarding information against both intentional and
unintentional insider threats has become a paramount concern. To address this challenge …
unintentional insider threats has become a paramount concern. To address this challenge …
Unpacking the optimistic mindset of business students towards entrepreneurship
Entrepreneurial ventures are established in large numbers in China. The success rate of
these entrepreneurial ventures is lower than that of new startups. Mismanagement and a …
these entrepreneurial ventures is lower than that of new startups. Mismanagement and a …
The influence of organizational values on employee attitude and information security behavior: the mediating role of psychological capital
CK Riemenschneider, LL Burney… - Information & Computer …, 2023 - emerald.com
Purpose With increased remote working, employers are concerned with employees'
commitment and compliance with security procedures. Through the lens of psychological …
commitment and compliance with security procedures. Through the lens of psychological …
Examining formation and alleviation of information security fatigue by using job demands–resources theory
JSC Hsu, YW Hung, PJ Hsieh… - Information Systems …, 2024 - Wiley Online Library
The implementation and reinforcement of information security policies (ISPs) can lead to
information security fatigue (hereafter security fatigue), which can drive employees to …
information security fatigue (hereafter security fatigue), which can drive employees to …
Not all information security-related stresses are equal: the effects of challenge and hindrance stresses on employees' compliance with information security policies
H Chen, Y Hai, L Tu, J Fan - Behaviour & Information Technology, 2024 - Taylor & Francis
Information security-related stresses (SRSs) are widely considered to play a negative role in
the workplace, motivating employees' violation of information security policies (ISPs) …
the workplace, motivating employees' violation of information security policies (ISPs) …
Expressing opinions about information security in an organization: the spiral of silence theory perspective
Purpose Expressing views on organizational information security (IS) by employees is vital
for improving security processes, policies and trainings, while non-communication may …
for improving security processes, policies and trainings, while non-communication may …
Psychological Capital and Information Security Policy Compliance
J Zhao, Y Hong, W Chen, C Chen - Journal of Computer …, 2024 - Taylor & Francis
Combining cognitive and affective influences, as well as considering role-breadth constructs
is critical to the study of employees' information security policy (ISP) compliance. This paper …
is critical to the study of employees' information security policy (ISP) compliance. This paper …
Enhancing information security compliance behavior through knowledge interventions: insights from EEG
Z Wang, H Deng, G Li - Information & Computer Security, 2025 - emerald.com
Purpose This study aims to explore the impact of information security knowledge on
information security compliance behavior using neuroscience science. Design/methodology …
information security compliance behavior using neuroscience science. Design/methodology …