[HTML][HTML] Insider threat mitigation: Systematic literature review
The increasing prevalence of cybercrime necessitates the implementation of robust security
measures. The majority of these attacks are initiated by authorized users who possess …
measures. The majority of these attacks are initiated by authorized users who possess …
Blockchain-driven decentralized identity management: An interdisciplinary review and research agenda
The rise of blockchain technology has sparked interest in decentralized identity
management (DIdM). However, DIdM's interdisciplinary nature has led to a fragmented …
management (DIdM). However, DIdM's interdisciplinary nature has led to a fragmented …
Guest Editorial: Big data-driven theory building: Philosophies, guiding principles, and common traps
While data availability and access used to be a major challenge for information systems
research, the growth and ease of access to large datasets and data analysis tools has …
research, the growth and ease of access to large datasets and data analysis tools has …
Why do people use mobile payment technologies and why would they continue? An examination and implications from India
Mobile payment technology continues to spread across the globe, but its diffusion has not
been uniform. Its low usage in develo** economies is of particular concern to …
been uniform. Its low usage in develo** economies is of particular concern to …
The roles of IT strategies and security investments in reducing organizational security breaches
This research examines the joint effects of information technology (IT) strategies and security
investments on organizational security breaches. We focus on two forms of IT strategies …
investments on organizational security breaches. We focus on two forms of IT strategies …
A neo-institutional perspective on the establishment of information security knowledge sharing practices
Abstract Information security knowledge sharing (ISKS) among an organization's employees
is vital to the organization's ability to protect itself from any number of prevalent threats, yet …
is vital to the organization's ability to protect itself from any number of prevalent threats, yet …
Exploring the factors influencing information security policy compliance and violations: A systematic literature review
Despite advancements in security technology, the prevalence of insider threats has been on
the rise in recent years. Organizations implement Information Security Policies (ISPs) that …
the rise in recent years. Organizations implement Information Security Policies (ISPs) that …
Situational contingencies in susceptibility of social media to phishing: a temptation and restraint model
User susceptibility to phishing messages on social media is a growing information security
concern. Contingency factors that can influence this susceptibility and the theoretical …
concern. Contingency factors that can influence this susceptibility and the theoretical …
Impact of digital nudging on information security behavior: an experimental study on framing and priming in cybersecurity
Purpose Phishing attacks are the most common cyber threats targeted at users. Digital
nudging in the form of framing and priming may reduce user susceptibility to phishing. This …
nudging in the form of framing and priming may reduce user susceptibility to phishing. This …
The organizational cybersecurity success factors: an exhaustive literature review
To identify gaps in cybersecurity research, the authors reviewed the secondary literatures of
organizational cybersecurity posture, focusing on five factors: technology design …
organizational cybersecurity posture, focusing on five factors: technology design …