[HTML][HTML] Enhancing employees information security awareness in private and public organisations: A systematic literature review
Preserving the confidentiality, integrity and availability (CIA) of an organisation's sensitive
information systems assets against attacks and threats is a challenge in this digital age …
information systems assets against attacks and threats is a challenge in this digital age …
The good, the bad and the missing: A Narrative review of cyber-security implications for australian small businesses
Abstract Small businesses (0–19 employees) are becoming attractive targets for cyber-
criminals, but struggle to implement cyber-security measures that large businesses routinely …
criminals, but struggle to implement cyber-security measures that large businesses routinely …
Seeing the forest and the trees
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …
(and noncompliance) with information security policies. However, the number of competing …
Leveraging human factors in cybersecurity: an integrated methodological approach
Abstract Computer and Information Security (CIS) is usually approached adopting a
technology-centric viewpoint, where the human components of sociotechnical systems are …
technology-centric viewpoint, where the human components of sociotechnical systems are …
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings
Deterrence theory is one of the most widely applied theories in information systems (IS)
security research, particularly within behavioral IS security studies. Based on the rational …
security research, particularly within behavioral IS security studies. Based on the rational …
Exploring the security of information sharing on social networking sites: The role of perceived control of information
Social networking sites (SNS) have challenged ethical issues about users' information
security and privacy. SNS users are concerned about their privacy and need to control the …
security and privacy. SNS users are concerned about their privacy and need to control the …
Information security awareness and behavior: a theory-based literature review
B Lebek, J Uffen, M Neumann, B Hohler… - Management …, 2014 - emerald.com
Purpose–This paper aims to provide an overview of theories used in the field of employees'
information systems (IS) security behavior over the past decade. Research gaps and …
information systems (IS) security behavior over the past decade. Research gaps and …
[HTML][HTML] The impact of electronic monitoring on employees' job satisfaction, stress, performance, and counterproductive work behavior: A meta-analysis
R Siegel, CJ König, V Lazar - Computers in Human Behavior Reports, 2022 - Elsevier
Organizations all around the world increasingly use electronic monitoring to collect
information on employees' working behavior. To investigate the effects of electronic …
information on employees' working behavior. To investigate the effects of electronic …
Increasing accountability through user-interface design artifacts
Access-policy violations are a growing problem with substantial costs for organizations.
Although training programs and sanctions have been suggested as a means of reducing …
Although training programs and sanctions have been suggested as a means of reducing …
Eyes wide open: The role of situational information security awareness for security‐related behaviour
L Jaeger, A Eckhardt - Information Systems Journal, 2021 - Wiley Online Library
Most contemporary studies on information security focus on largely static phenomena in
examining security‐related behaviours. We take a more dynamic, situational and …
examining security‐related behaviours. We take a more dynamic, situational and …