Conceptual Inconsistencies in Variable Definitions and Measurement Items within ISP Non-/compliance Research: A systematic literature review

M Gerdin, Å Grönlund, E Kolkowska - Computers & Security, 2025 - Elsevier
The rich stream of research focusing on employee non-/compliance with information security
policies (ISPs) suffers from inconsistent results. Attempts to explain such inconsistencies …

[HTML][HTML] Sha** extra-role security behaviors through employee-agent relations: A dual-channel motivational perspective

JM Davis, D Agrawal, O Ogbanufe - International Journal of Information …, 2025 - Elsevier
Organizational information security performance increasingly depends on employees' extra-
role security behaviors (ERBs), which go beyond the scope of formal organizational …

The valued coexistence of protection motivation and stewardship in information security behaviors

O Ogbanufe, RE Crossler, D Biros - Computers & Security, 2023 - Elsevier
Organizations need to consider different managerial approaches to motivate security
compliance behavior as more employees work outside of the office. This study examines two …

Predictors of success in information security policy compliance

J Nord, CS Sargent, A Koohang… - Journal of Computer …, 2022 - Taylor & Francis
The purpose of this study is to build on the ISP compliance literature by creating a prediction
model that includes four predictor variables, namely, leadership, supportive organizational …

Exploring personal and environmental factors that can reduce nonmalicious information security violations

P Ifinedo - Information Systems Management, 2023 - Taylor & Francis
Employee engagement in nonmalicious information security violations (NISVs) is a threat to
organizations. The Social Cognitive Theory was used to investigate the effects of personal …

Kee** the gates closed: the effect of conflict management styles, anxiety, and technical skills on security noncompliance intention among smartphone users

D Rahmani, H Jafarzadeh, AC Hess - Behaviour & Information …, 2024 - Taylor & Francis
Using personal mobile phones for work-related purposes is an increasingly common trend
in organisations yet adding to cyber security concerns. It is vital to identify employees' …

Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack

J Navajas-Adán, E Badia-Gelabert… - International Journal of …, 2024 - Springer
Abstract Information and Communication Technologies and Internet networks are present in
all aspects of social reality and are essential elements in research, development and …

Employees' BYOD security policy compliance in the public sector

R Palanisamy, AA Norman… - Journal of Computer …, 2024 - Taylor & Francis
The proliferation of the Bring Your Own Device (BYOD) policy has instigated a widespread
change across organizations. However, employees' compliance toward BYOD security …

[PDF][PDF] Six Board Roles for Information Security Governance

S Nodehi, T Huygh, L Bollen - International Conference on …, 2024 - scitepress.org
As cyber threats evolve, board engagement is becoming increasingly essential to ensure
Information Security (InfoSec) is integrated into an organization's strategic fabric, ensuring …

[PDF][PDF] Navegando por los desafíos de la ciberseguridad: Un estudio sobre la concientización de los empleados en organizaciones privadas

FJG Arellano, TEV Chávez, S Olivares-Bautista… - 2024 - tecnotrend.lasallebajio.edu.mx
En el contexto actual, la relevancia de concientizar a los empleados en temas de
ciberseguridad se torna fundamental, y los resultados de este estudio subrayan la urgencia …