Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security education, training, and awareness programs: Literature review
Security education, training, and awareness (SETA) is one of the most common and
prominent strategies for organizational security governance. However, only a small portion …
prominent strategies for organizational security governance. However, only a small portion …
[HTML][HTML] Software compliance requirements, factors, and policies: A systematic literature review
Background Recent statistics reveal that 56% of software attacks are caused by insider
negligence and 26% are caused by malicious insiders. They also show that 67% of …
negligence and 26% are caused by malicious insiders. They also show that 67% of …
Seeing the forest and the trees
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …
(and noncompliance) with information security policies. However, the number of competing …
Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model
Context Cybersecurity behavioral literature has a significant number of studies on training
and awareness. However, there is lack of theoretical underpinnings in develo** …
and awareness. However, there is lack of theoretical underpinnings in develo** …
Organizational science and cybersecurity: abundant opportunities for research at the interface
Cybersecurity is an ever-present problem for organizations, but organizational science has
barely begun to enter the arena of cybersecurity research. As a result, the “human factor” in …
barely begun to enter the arena of cybersecurity research. As a result, the “human factor” in …
Fostering information security compliance as organizational citizenship behavior
Abstract Information security is heightened when employees develop a strong sense of
information stewardship for information assets, a form of organizational citizenship behavior …
information stewardship for information assets, a form of organizational citizenship behavior …
[PDF][PDF] Time Will Tell: The Case for an Idiographic Approach to Behavioral Cybersecurity Research.
Many of the theories used in behavioral cybersecurity research have been applied with a
nomothetic approach, which is characterized by cross-sectional data (eg, one-time surveys) …
nomothetic approach, which is characterized by cross-sectional data (eg, one-time surveys) …
What motivates users to adopt cybersecurity practices? A survey experiment assessing protection motivation theory
Abstract Research Summary A 2× 2× 3 fully crossed factorial experiment is used to examine
the linkages between key dimensions of protection motivation theory (PMT; perceived …
the linkages between key dimensions of protection motivation theory (PMT; perceived …
“Get a red-hot poker and open up my eyes, it's so boring” 1: Employee perceptions of cybersecurity training
Organisations and security professionals design Security Education, Training, and
Awareness (SETA) programs to improve cybersecurity behaviour, but they are often poorly …
Awareness (SETA) programs to improve cybersecurity behaviour, but they are often poorly …
Going beyond deterrence: A middle-range theory of motives and controls for insider computer abuse
Despite widespread agreement among practitioners and academicians that organizational
insiders are a significant threat to organizational information systems security, insider …
insiders are a significant threat to organizational information systems security, insider …