[HTML][HTML] Insider threat mitigation: Systematic literature review

U Inayat, M Farzan, S Mahmood, MF Zia… - Ain Shams Engineering …, 2024 - Elsevier
The increasing prevalence of cybercrime necessitates the implementation of robust security
measures. The majority of these attacks are initiated by authorized users who possess …

Blockchain-driven decentralized identity management: An interdisciplinary review and research agenda

Z Yan, X Zhao, Y Liu, XR Luo - Information & Management, 2024 - Elsevier
The rise of blockchain technology has sparked interest in decentralized identity
management (DIdM). However, DIdM's interdisciplinary nature has led to a fragmented …

Guest Editorial: Big data-driven theory building: Philosophies, guiding principles, and common traps

AK Kar, S Angelopoulos, HR Rao - International Journal of Information …, 2023 - Elsevier
While data availability and access used to be a major challenge for information systems
research, the growth and ease of access to large datasets and data analysis tools has …

Why do people use mobile payment technologies and why would they continue? An examination and implications from India

A Pal, T Herath, HR Rao - Research Policy, 2021 - Elsevier
Mobile payment technology continues to spread across the globe, but its diffusion has not
been uniform. Its low usage in develo** economies is of particular concern to …

The roles of IT strategies and security investments in reducing organizational security breaches

H Li, S Yoo, WJ Kettinger - Journal of Management Information …, 2021 - Taylor & Francis
This research examines the joint effects of information technology (IT) strategies and security
investments on organizational security breaches. We focus on two forms of IT strategies …

A neo-institutional perspective on the establishment of information security knowledge sharing practices

F Hassandoust, M Subasinghage… - Information & …, 2022 - Elsevier
Abstract Information security knowledge sharing (ISKS) among an organization's employees
is vital to the organization's ability to protect itself from any number of prevalent threats, yet …

Exploring the factors influencing information security policy compliance and violations: A systematic literature review

N Balagopal, SK Mathew - Computers & Security, 2024 - Elsevier
Despite advancements in security technology, the prevalence of insider threats has been on
the rise in recent years. Organizations implement Information Security Policies (ISPs) that …

Situational contingencies in susceptibility of social media to phishing: a temptation and restraint model

H Qahri-Saremi, O Turel - Journal of Management Information …, 2023 - Taylor & Francis
User susceptibility to phishing messages on social media is a growing information security
concern. Contingency factors that can influence this susceptibility and the theoretical …

Impact of digital nudging on information security behavior: an experimental study on framing and priming in cybersecurity

K Sharma, X Zhan, FFH Nah, K Siau… - … : Practice, Process and …, 2021 - emerald.com
Purpose Phishing attacks are the most common cyber threats targeted at users. Digital
nudging in the form of framing and priming may reduce user susceptibility to phishing. This …

The organizational cybersecurity success factors: an exhaustive literature review

N Poehlmann, KM Caramancion, I Tatar, Y Li… - Advances in Security …, 2021 - Springer
To identify gaps in cybersecurity research, the authors reviewed the secondary literatures of
organizational cybersecurity posture, focusing on five factors: technology design …