The ISO/IEC 27001 information security management standard: literature review and theory-based research agenda

G Culot, G Nassimbeni, M Podrecca, M Sartor - The TQM Journal, 2021 - emerald.com
Purpose After 15 years of research, this paper aims to present a review of the academic
literature on the ISO/IEC 27001, the most renowned standard for information security and the …

An information security performance measurement tool for senior managers: Balanced scorecard integration for security governance and control frameworks

TC Herath, HSB Herath, D Cullum - Information Systems Frontiers, 2023 - Springer
As organizations have become increasingly reliant on information systems, senior managers
are keen in assessing the progress of implemented information security strategies. Although …

Identity authentication security management in mobile payment systems

F Wang, GB Shan, Y Chen, X Zheng… - Journal of Global …, 2020 - igi-global.com
Mobile payment is a new payment method offering users mobility, reachability, compatibility,
and convenience. But mobile payment involves great uncertainty and risk given its electronic …

DeTER framework: A novel paradigm for addressing cybersecurity concerns in mobile healthcare

DK Wyant, P Bingi, JR Knight… - Research Anthology on …, 2022 - igi-global.com
The use of health apps on mobile devices by healthcare providers and receivers (patients) is
proliferating. This has elevated cybersecurity concerns owing to the transmittal of personal …

Investigating and mitigating the role of neutralisation techniques on information security policies violation in healthcare organisations

S Altamimi - 2022 - theses.gla.ac.uk
Healthcare organisations today rely heavily on Electronic Medical Records systems (EMRs),
which have become highly crucial IT assets that require significant security efforts to …

Misuse of 'Break-the-Glass' Policies in Hospitals: Detecting Unauthorized Access to Sensitive Patient Health Data

B Stark, H Gewald, H Lautenbacher… - International Journal of …, 2018 - igi-global.com
This article describes how the information about an individual's personal health is among
ones most sensitive and important intangible belongings. When health information is …

Deter framework: A novel paradigm for addressing cybersecurity concerns in mobile healthcare

DK Wyant, P Bingi, JR Knight… - International Journal of …, 2021 - igi-global.com
The use of health apps on mobile devices by healthcare providers and receivers (patients) is
proliferating. This has elevated cybersecurity concerns owing to the transmittal of personal …

Exploring information security awareness training to reduce unauthorized disclosure of information in public schools

A Fleming - 2017 - search.proquest.com
Advances in technological uses within public schools provide increased methods to collect
and store non-public personal information (NPI) or personally identifiable information (PII) …

ISO/IEC 27001: An empirical multi-method research

M Podrecca - 2023 - air.uniud.it
The adoption of digital technologies, the emergence of platform-based business models,
and the switch to smart working practices are increasing the number of potential entry points …

Flashlight in a dark room: A grounded theory study on information security management at small healthcare provider organizations

G Auger - 2019 - scholar.dsu.edu
Healthcare providers have a responsibility to protect patient's privacy and a business
motivation to properly secure their assets. These providers encounter barriers to achieving …