Conceptual Inconsistencies in Variable Definitions and Measurement Items within ISP Non-/compliance Research: A systematic literature review
The rich stream of research focusing on employee non-/compliance with information security
policies (ISPs) suffers from inconsistent results. Attempts to explain such inconsistencies …
policies (ISPs) suffers from inconsistent results. Attempts to explain such inconsistencies …
[HTML][HTML] Sha** extra-role security behaviors through employee-agent relations: A dual-channel motivational perspective
Organizational information security performance increasingly depends on employees' extra-
role security behaviors (ERBs), which go beyond the scope of formal organizational …
role security behaviors (ERBs), which go beyond the scope of formal organizational …
The valued coexistence of protection motivation and stewardship in information security behaviors
O Ogbanufe, RE Crossler, D Biros - Computers & Security, 2023 - Elsevier
Organizations need to consider different managerial approaches to motivate security
compliance behavior as more employees work outside of the office. This study examines two …
compliance behavior as more employees work outside of the office. This study examines two …
Predictors of success in information security policy compliance
J Nord, CS Sargent, A Koohang… - Journal of Computer …, 2022 - Taylor & Francis
The purpose of this study is to build on the ISP compliance literature by creating a prediction
model that includes four predictor variables, namely, leadership, supportive organizational …
model that includes four predictor variables, namely, leadership, supportive organizational …
Exploring personal and environmental factors that can reduce nonmalicious information security violations
P Ifinedo - Information Systems Management, 2023 - Taylor & Francis
Employee engagement in nonmalicious information security violations (NISVs) is a threat to
organizations. The Social Cognitive Theory was used to investigate the effects of personal …
organizations. The Social Cognitive Theory was used to investigate the effects of personal …
Kee** the gates closed: the effect of conflict management styles, anxiety, and technical skills on security noncompliance intention among smartphone users
Using personal mobile phones for work-related purposes is an increasingly common trend
in organisations yet adding to cyber security concerns. It is vital to identify employees' …
in organisations yet adding to cyber security concerns. It is vital to identify employees' …
Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack
J Navajas-Adán, E Badia-Gelabert… - International Journal of …, 2024 - Springer
Abstract Information and Communication Technologies and Internet networks are present in
all aspects of social reality and are essential elements in research, development and …
all aspects of social reality and are essential elements in research, development and …
Employees' BYOD security policy compliance in the public sector
R Palanisamy, AA Norman… - Journal of Computer …, 2024 - Taylor & Francis
The proliferation of the Bring Your Own Device (BYOD) policy has instigated a widespread
change across organizations. However, employees' compliance toward BYOD security …
change across organizations. However, employees' compliance toward BYOD security …
[PDF][PDF] Six Board Roles for Information Security Governance
As cyber threats evolve, board engagement is becoming increasingly essential to ensure
Information Security (InfoSec) is integrated into an organization's strategic fabric, ensuring …
Information Security (InfoSec) is integrated into an organization's strategic fabric, ensuring …
[PDF][PDF] Navegando por los desafíos de la ciberseguridad: Un estudio sobre la concientización de los empleados en organizaciones privadas
FJG Arellano, TEV Chávez, S Olivares-Bautista… - 2024 - tecnotrend.lasallebajio.edu.mx
En el contexto actual, la relevancia de concientizar a los empleados en temas de
ciberseguridad se torna fundamental, y los resultados de este estudio subrayan la urgencia …
ciberseguridad se torna fundamental, y los resultados de este estudio subrayan la urgencia …