The cybersecurity behavioral research: A tertiary study

NF Khan, A Yaqoob, MS Khan, N Ikram - Computers & Security, 2022 - Elsevier
Context Cybersecurity has seen a rise in behavioral investigation during the past decades.
This includes studies being carried out at the primary as well as secondary levels. There are …

Exploring the influence of direct and indirect factors on information security policy compliance: a systematic literature review

M Alassaf, A Alkhalifah - IEEE Access, 2021 - ieeexplore.ieee.org
Information systems security is considered one of the key issues concerning organizations'
management. Despite the massive investment that organizations make to safeguard their …

What are the trend and core knowledge of information security? A citation and co-citation analysis

WL Shiau, X Wang, F Zheng - Information & Management, 2023 - Elsevier
Abstract Information technology brings business success opportunities, but also causes
potential safety hazards to organizations. In response to the increasing academia and …

[HTML][HTML] Information security policies compliance in a global setting: An employee's perspective

MN Alraja, UJ Butt, M Abbod - Computers & Security, 2023 - Elsevier
Abstract Information security threats have a severe negative impact on enterprises.
Organizations rely on employee compliance with information security policies to eliminate or …

[PDF][PDF] A model of an information security management system based on NTC-ISO/IEC 27001 standard

OA Fonseca-Herrera, AE Rojas… - IAENG Int. J. Comput …, 2021 - researchgate.net
In an era of globalization, in which technology has allowed the development of companies to
be promoted, data and information become essential assets in organizations, which are …

Cyber security maturity assessment framework for technology startups: A systematic literature review

MNY Marican, S Abd Razak, A Selamat… - Ieee …, 2022 - ieeexplore.ieee.org
Cybersecurity has gained increasing importance among firms of different sizes and
industries due to the significant rise of cyber-attacks over time. Technology startups are …

Understanding How Intelligent Process Automation Impacts Business Continuity: Mapping IEEE/2755: 2020 and ISO/22301: 2019

JC Brás, RF Pereira, S Moro, IS Bianchi… - IEEE Access, 2023 - ieeexplore.ieee.org
Organizations have been responding to possible disruptions in the organization and, at the
same time, trying to increase customer satisfaction through digitising their processes. Thus …

The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors

E Amankwa, M Loock, E Kritzinger - Information & Computer Security, 2022 - emerald.com
Purpose This paper aims to examine the individual and combined effects of organisational
and behavioural factors on employees' attitudes and intentions to establish an information …

Modelo de red segura en un entorno distribuido para la transferencia de datos con mecanismos básicos de seguridad

CO Sánchez Guzmán - 2021 - dspace.ups.edu.ec
Empresas a nivel mundial y especialmente en Latinoamérica, continuamente tienen
dificultades por una implementación deficiente en sus modelos de red bajo entornos …

Factors impacting cybersecurity transformation: An Industry 5.0 perspective

A Chaudhuri, RK Behera, PK Bala - Computers & Security, 2024 - Elsevier
The gamut of emerging technologies from Industry 4.0 provided businesses with potential
opportunities to create new models of products and services. However, the cybersecurity …