[HTML][HTML] Enhancing employees information security awareness in private and public organisations: A systematic literature review

K Khando, S Gao, SM Islam, A Salman - Computers & security, 2021 - Elsevier
Preserving the confidentiality, integrity and availability (CIA) of an organisation's sensitive
information systems assets against attacks and threats is a challenge in this digital age …

The good, the bad and the missing: A Narrative review of cyber-security implications for australian small businesses

T Tam, A Rao, J Hall - Computers & Security, 2021 - Elsevier
Abstract Small businesses (0–19 employees) are becoming attractive targets for cyber-
criminals, but struggle to implement cyber-security measures that large businesses routinely …

Seeing the forest and the trees

WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - JSTOR
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …

Leveraging human factors in cybersecurity: an integrated methodological approach

A Pollini, TC Callari, A Tedeschi, D Ruscio… - Cognition, Technology & …, 2022 - Springer
Abstract Computer and Information Security (CIS) is usually approached adopting a
technology-centric viewpoint, where the human components of sociotechnical systems are …

A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings

J D'arcy, T Herath - European journal of information systems, 2011 - Taylor & Francis
Deterrence theory is one of the most widely applied theories in information systems (IS)
security research, particularly within behavioral IS security studies. Based on the rational …

Exploring the security of information sharing on social networking sites: The role of perceived control of information

N Hajli, X Lin - Journal of Business Ethics, 2016 - Springer
Social networking sites (SNS) have challenged ethical issues about users' information
security and privacy. SNS users are concerned about their privacy and need to control the …

Information security awareness and behavior: a theory-based literature review

B Lebek, J Uffen, M Neumann, B Hohler… - Management …, 2014 - emerald.com
Purpose–This paper aims to provide an overview of theories used in the field of employees'
information systems (IS) security behavior over the past decade. Research gaps and …

[HTML][HTML] The impact of electronic monitoring on employees' job satisfaction, stress, performance, and counterproductive work behavior: A meta-analysis

R Siegel, CJ König, V Lazar - Computers in Human Behavior Reports, 2022 - Elsevier
Organizations all around the world increasingly use electronic monitoring to collect
information on employees' working behavior. To investigate the effects of electronic …

Increasing accountability through user-interface design artifacts

A Vance, PB Lowry, D Eggett - MIS quarterly, 2015 - JSTOR
Access-policy violations are a growing problem with substantial costs for organizations.
Although training programs and sanctions have been suggested as a means of reducing …

Eyes wide open: The role of situational information security awareness for security‐related behaviour

L Jaeger, A Eckhardt - Information Systems Journal, 2021 - Wiley Online Library
Most contemporary studies on information security focus on largely static phenomena in
examining security‐related behaviours. We take a more dynamic, situational and …