Exploring the influence of direct and indirect factors on information security policy compliance: a systematic literature review

M Alassaf, A Alkhalifah - IEEE Access, 2021 - ieeexplore.ieee.org
Information systems security is considered one of the key issues concerning organizations'
management. Despite the massive investment that organizations make to safeguard their …

Information security policy compliance: Systematic literature review

RA Alias - Procedia Computer Science, 2019 - Elsevier
The growth of research in information technology security has enlarged in recent years.
Investigations in Information security besides discussing technical problems but also …

Incorrect compliance and correct noncompliance with information security policies: A framework of rule-related information security behaviour

M Niemimaa - Computers & Security, 2024 - Elsevier
Abstract Information security policy (ISP) compliance is recognized as a key measure for
dealing with human errors when protecting information. A considerable and growing body of …

Stakeholder perceptions of information security policy: Analyzing personal constructs

S Samonas, G Dhillon, A Almusharraf - International Journal of Information …, 2020 - Elsevier
Organizational stakeholders, such as employees and security managers, may understand
security rules and policies differently. Extant literature suggests that stakeholder perceptions …

[HTML][HTML] Requirements for computerized tools to design information security policies

E Rostami, F Karlsson, S Gao - computers & security, 2020 - Elsevier
Abstract Information security is a hot topic nowadays, and while top-class technology exists
to safeguard information assets, organizations cannot rely on technical controls alone …

Policy components–a conceptual model for modularizing and tailoring of information security policies

E Rostami, F Karlsson, S Gao - Information & Computer Security, 2023 - emerald.com
Policy components – a conceptual model for modularizing and tailoring of information security
policies | Emerald Insight Books and journals Case studies Expert Briefings Open Access …

Key success factors of information systems security

K Arbanas, N Žajdela Hrustek - Journal of information and …, 2019 - hrcak.srce.hr
Sažetak The issue of information systems security, and thus information as key resource in
today's information society, is something that all organizations in all sectors face in one way …

Problematizing the Adoption of Formal Methods in the 4IR–5IR Transition

JA van der Poll - Applied System Innovation, 2022 - mdpi.com
The adoption of formal methods (FMs) as a software development methodology remains
low. Advocates of FMs point to the advantages to be gained by producing highly …

Policy ambiguity: a problem, a tool, or an inherent part of policymaking?

K Väyrynen, A Lanamäki, S Laari-Salmela… - ICIS 2022 …, 2022 - oulurepo.oulu.fi
It has been acknowledged that the Information Systems (IS) discipline needs to pay attention
to policymaking. However, the IS field has not yet sufficiently acknowledged complexities of …

The hunt for computerized support in information security policy management: a literature review

E Rostami, F Karlsson, E Kolkowska - Information & Computer …, 2020 - emerald.com
Purpose The purpose of this paper is to survey existing information security policy (ISP)
management research to scrutinise the extent to which manual and computerised support …