Exploring the influence of direct and indirect factors on information security policy compliance: a systematic literature review
Information systems security is considered one of the key issues concerning organizations'
management. Despite the massive investment that organizations make to safeguard their …
management. Despite the massive investment that organizations make to safeguard their …
Information security policy compliance: Systematic literature review
RA Alias - Procedia Computer Science, 2019 - Elsevier
The growth of research in information technology security has enlarged in recent years.
Investigations in Information security besides discussing technical problems but also …
Investigations in Information security besides discussing technical problems but also …
Incorrect compliance and correct noncompliance with information security policies: A framework of rule-related information security behaviour
M Niemimaa - Computers & Security, 2024 - Elsevier
Abstract Information security policy (ISP) compliance is recognized as a key measure for
dealing with human errors when protecting information. A considerable and growing body of …
dealing with human errors when protecting information. A considerable and growing body of …
Stakeholder perceptions of information security policy: Analyzing personal constructs
Organizational stakeholders, such as employees and security managers, may understand
security rules and policies differently. Extant literature suggests that stakeholder perceptions …
security rules and policies differently. Extant literature suggests that stakeholder perceptions …
[HTML][HTML] Requirements for computerized tools to design information security policies
Abstract Information security is a hot topic nowadays, and while top-class technology exists
to safeguard information assets, organizations cannot rely on technical controls alone …
to safeguard information assets, organizations cannot rely on technical controls alone …
Policy components–a conceptual model for modularizing and tailoring of information security policies
Policy components – a conceptual model for modularizing and tailoring of information security
policies | Emerald Insight Books and journals Case studies Expert Briefings Open Access …
policies | Emerald Insight Books and journals Case studies Expert Briefings Open Access …
Key success factors of information systems security
Sažetak The issue of information systems security, and thus information as key resource in
today's information society, is something that all organizations in all sectors face in one way …
today's information society, is something that all organizations in all sectors face in one way …
Problematizing the Adoption of Formal Methods in the 4IR–5IR Transition
JA van der Poll - Applied System Innovation, 2022 - mdpi.com
The adoption of formal methods (FMs) as a software development methodology remains
low. Advocates of FMs point to the advantages to be gained by producing highly …
low. Advocates of FMs point to the advantages to be gained by producing highly …
Policy ambiguity: a problem, a tool, or an inherent part of policymaking?
It has been acknowledged that the Information Systems (IS) discipline needs to pay attention
to policymaking. However, the IS field has not yet sufficiently acknowledged complexities of …
to policymaking. However, the IS field has not yet sufficiently acknowledged complexities of …
The hunt for computerized support in information security policy management: a literature review
Purpose The purpose of this paper is to survey existing information security policy (ISP)
management research to scrutinise the extent to which manual and computerised support …
management research to scrutinise the extent to which manual and computerised support …