The cybersecurity behavioral research: A tertiary study
Context Cybersecurity has seen a rise in behavioral investigation during the past decades.
This includes studies being carried out at the primary as well as secondary levels. There are …
This includes studies being carried out at the primary as well as secondary levels. There are …
The Role of Information Security Culture in Zero Trust Adoption: Insights from UAE Organizations
B Zyoud, SL Lutfi - IEEE Access, 2024 - ieeexplore.ieee.org
This study examines the viability of Zero Trust (ZT) models, a burgeoning measure of
cybersecurity, in different cultural contexts. The ZT security model is based on the principle …
cybersecurity, in different cultural contexts. The ZT security model is based on the principle …
Human resource records management culture and privacy control in Ghana: the roles of employee experience and top management commitment
R Dei Mensah, S Tetteh, JM Annan… - Global Knowledge …, 2024 - emerald.com
Purpose The purpose of this study was to investigate the roles of employee experience and
top management commitment in the relationship between human resource (HR) records …
top management commitment in the relationship between human resource (HR) records …
[图书][B] An analysis of factors influencing national institute of standards and technology cybersecurity framework adoption in financial services: a correlational study
A Simonova - 2020 - search.proquest.com
The research topic for this study was cybersecurity. The study investigated to what extent
effort expectancy, social influence, and performance expectancy predicted the behavioral …
effort expectancy, social influence, and performance expectancy predicted the behavioral …
Information Security Risk Management (ISRM) Model for Saudi Arabian Organisations
NMN Alshareef - 2022 - espace.curtin.edu.au
This research aimed to investigate the factors influencing information security risk
management (ISRM) and develop an ISRM model for large Saudi Arabian organisations …
management (ISRM) and develop an ISRM model for large Saudi Arabian organisations …
[图书][B] The influence of organizational culture on cybersecurity governance in breached organizations
RJ Failla - 2020 - search.proquest.com
AbstractThe relationship between organizational culture and information security culture is
poorlyunderstood (Tang, Li, & Zhang, 2016). Until now, the extant research between …
poorlyunderstood (Tang, Li, & Zhang, 2016). Until now, the extant research between …
The Relationship Between the Frequency of Respective Cybersecurity Training Types and Information Security Awareness in the US Technology Industry
H Lee - 2022 - search.proquest.com
Many organizations are providing employee training to raise security awareness as data
breaches increase. Organizational digital transformation has accelerated, especially during …
breaches increase. Organizational digital transformation has accelerated, especially during …
Information security awareness techniques that reduce data breaches caused by social engineering attacks
LC Kostic - 2020 - search.proquest.com
The objective of this qualitative Delphi study was to examine the various information security
awareness techniques related to social engineering attacks that organizations employ. Data …
awareness techniques related to social engineering attacks that organizations employ. Data …
[PDF][PDF] Evaluating the Impact of Metric-based Security Tools on Company Performance and Decision-making
E David - 2023 - ericlynndavid.com
This quantitative causal-comparative study examined the differences between security
metrics and decision-making in companies. The importance of cyber security, particularly at …
metrics and decision-making in companies. The importance of cyber security, particularly at …
Exploration of Cybersecurity Managers' Experiences Protecting Users' Privacy
EA Segun - 2022 - search.proquest.com
The protection of individual privacy and personal data in cyberspace continues to be a
problem. The research problem was that cybersecurity managers must constantly navigate …
problem. The research problem was that cybersecurity managers must constantly navigate …