[HTML][HTML] Enhancing employees information security awareness in private and public organisations: A systematic literature review
Preserving the confidentiality, integrity and availability (CIA) of an organisation's sensitive
information systems assets against attacks and threats is a challenge in this digital age …
information systems assets against attacks and threats is a challenge in this digital age …
Educating and raising awareness on cyber security social engineering: A literature review
H Aldawood, G Skinner - 2018 IEEE international conference …, 2018 - ieeexplore.ieee.org
Social engineering, due in part to the increasing popularity and advancements in
information technology and ubiquity of devices, has emerged as one of the most challenging …
information technology and ubiquity of devices, has emerged as one of the most challenging …
[HTML][HTML] Exploring expert perceptions about the cyber security and privacy of Connected and Autonomous Vehicles: A thematic analysis approach
Abstract Connected and Autonomous Vehicles (CAVs) constitute an automotive
development carrying paradigm-shifting potential that may soon be embedded into a …
development carrying paradigm-shifting potential that may soon be embedded into a …
The human aspects of information security questionnaire (HAIS-Q): two further validation studies
K Parsons, D Calic, M Pattinson, M Butavicius… - Computers & …, 2017 - Elsevier
Abstract Information security awareness (ISA) is integral to protecting an organisation from
cyber threats. The aim of this paper is to further establish the validity of the Human Aspects …
cyber threats. The aim of this paper is to further establish the validity of the Human Aspects …
Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q)
K Parsons, A McCormac, M Butavicius, M Pattinson… - Computers & …, 2014 - Elsevier
It is increasingly acknowledged that many threats to an organisation's computer systems can
be attributed to the behaviour of computer users. To quantify these human-based …
be attributed to the behaviour of computer users. To quantify these human-based …
Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment
C Liu, N Wang, H Liang - International Journal of Information Management, 2020 - Elsevier
Employees' non-compliance with organizational information security policy (ISP) when using
informational resources has become the main reason for continuous security incidents …
informational resources has become the main reason for continuous security incidents …
The psychology of internet fraud victimisation: A systematic review
G Norris, A Brookes, D Dowell - Journal of Police and Criminal Psychology, 2019 - Springer
Existing theories of fraud provide some insight into how criminals target and exploit people
in the online environment; whilst reference to psychological explanations is common, the …
in the online environment; whilst reference to psychological explanations is common, the …
Information security policies' compliance: a perspective for higher education institutions
S Hina, PDD Dominic - Journal of Computer Information Systems, 2020 - Taylor & Francis
This paper provides a systematic literature review in the information security policies'
compliance (ISPC) field, with respect to information security culture, information security …
compliance (ISPC) field, with respect to information security culture, information security …
Assessment of the impact of information security awareness training methods on knowledge, attitude, and behavior
Technology is changing the way we work more than ever before. Therefore, it is critical to
understand the security threats associated with these advanced tools to protect systems and …
understand the security threats associated with these advanced tools to protect systems and …
The influence of organizational information security culture on information security decision making
KM Parsons, E Young, MA Butavicius… - Journal of Cognitive …, 2015 - journals.sagepub.com
In this study three aspects of information security decision making—namely, knowledge of
policies and procedures, attitude towards policies and procedures, and self-reported …
policies and procedures, attitude towards policies and procedures, and self-reported …