Examining the effects of cognitive load on information systems security policy compliance

D Ganye, K Smith - Internet Research, 2024 - emerald.com
Purpose Enforcing employee compliance with information systems security policies (ISSP) is
a herculean task for organizations as security breaches due to non-compliance continue to …

Characteristics and dynamics of cyberstalking victimization among juveniles and young adults

WA Walsh, D Finkelhor, H Turner - Violence against women, 2024 - journals.sagepub.com
Using the nationally representative Ipsos online KnowledgePanel, the sample included
three hundred thirty-six 18-to 28-year-olds who retrospectively reported first cyberstalking …

A multilevel meta-analysis of cyberstalking: Domains (and subdomains) of contributing factors

B Kim - Journal of criminal justice, 2023 - Elsevier
Purpose The prevalence of cyberstalking, with its substantial harm to victims, highlights the
importance of identifying the factors contributing to its occurrence. This study assesses …

CYBER TERRORISM: A CRITICAL ASSESSMENT OF THE THREAT LANDSCAPE AND COUNTERMEASURES.

O Rabie - Journal of Information Systems Security, 2022 - search.ebscohost.com
This paper examines the impact of the internet on dissemination of harmful content, with a
specific focus on the issue of cyberterrorism. We define the term cyber" terrorist" within the …

[PDF][PDF] When The Spying Stop: Recent Criminalisation Of Cyberstalking In Malaysia

Z Hamin, S Kamaruddin, AR Abd Rani… - E-BOOK OF …, 2022 - researchgate.net
The ubiquity of the ICT and the Internet has made them integral to our daily lives in the past
two decades, bringing numerous benefits and the risks of victimisation from various …