Information security governance challenges and critical success factors: Systematic review
Abstract Information security is a critical aspect and plays a significant role in protecting an
organization's business. Organizations are required to safeguard their information and …
organization's business. Organizations are required to safeguard their information and …
Security education, training, and awareness programs: Literature review
Security education, training, and awareness (SETA) is one of the most common and
prominent strategies for organizational security governance. However, only a small portion …
prominent strategies for organizational security governance. However, only a small portion …
The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities
This paper investigates the role of general cybersecurity and cybersecurity policy awareness
in enhancing supply chain cyber resilience reactive capabilities. Theorizing from the …
in enhancing supply chain cyber resilience reactive capabilities. Theorizing from the …
Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model
Context Cybersecurity behavioral literature has a significant number of studies on training
and awareness. However, there is lack of theoretical underpinnings in develo** …
and awareness. However, there is lack of theoretical underpinnings in develo** …
A test of protection motivation theory in the information security literature: A meta-analytic structural equation modeling approach
Abstract Information security is one of the important domains of information systems
research today, with protection motivation theory (PMT) one of its most influential theoretical …
research today, with protection motivation theory (PMT) one of its most influential theoretical …
[HTML][HTML] Organizational and team culture as antecedents of protection motivation among IT employees
S Sharma, E Aparicio - Computers & Security, 2022 - Elsevier
The rapid development of technology and information systems has led to higher information
security-related issues in an organization. The age of remote working (ie, telecommuting) …
security-related issues in an organization. The age of remote working (ie, telecommuting) …
The effectiveness of abstract versus concrete fear appeals in information security
Information security (ISec) is a pervasive concern of individuals, organizations, and
governments. To encourage individuals to engage in and learn about secure behaviors …
governments. To encourage individuals to engage in and learn about secure behaviors …
[HTML][HTML] Cybersecurity behavior among government employees: the role of protection motivation theory and responsibility in mitigating cyberattacks
This study examines the factors influencing government employees' cybersecurity behavior
in Malaysia. The country is considered the most vulnerable in Southeast Asia. Applying the …
in Malaysia. The country is considered the most vulnerable in Southeast Asia. Applying the …
Towards a wearable education: Understanding the determinants affecting students' adoption of wearable technologies using machine learning algorithms
The emergence of wearable technologies, including smartwatches, has received a
considerable attention from scholars across several sectors. However, there is a scarcity of …
considerable attention from scholars across several sectors. However, there is a scarcity of …
[PDF][PDF] Time Will Tell: The Case for an Idiographic Approach to Behavioral Cybersecurity Research.
Many of the theories used in behavioral cybersecurity research have been applied with a
nomothetic approach, which is characterized by cross-sectional data (eg, one-time surveys) …
nomothetic approach, which is characterized by cross-sectional data (eg, one-time surveys) …