Information security behavior and information security policy compliance: A systematic literature review for identifying the transformation process from noncompliance …
A grave concern to an organization's information security is employees' behavior when they
do not value information security policy compliance (ISPC). Most ISPC studies evaluate …
do not value information security policy compliance (ISPC). Most ISPC studies evaluate …
Encouraging employee engagement with cybersecurity: How to tackle cyber fatigue
Cybersecurity fatigue is a form of work disengagement specific to cybersecurity. It manifests
as a weariness or aversion to cybersecurity-related workplace behaviors or advice and …
as a weariness or aversion to cybersecurity-related workplace behaviors or advice and …
Kee** customers' data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce
Employees are increasingly relying on mobile devices. In international organizations, more
employees are using their personal smartphones for work purposes. Meanwhile, the number …
employees are using their personal smartphones for work purposes. Meanwhile, the number …
Towards a wearable education: Understanding the determinants affecting students' adoption of wearable technologies using machine learning algorithms
The emergence of wearable technologies, including smartwatches, has received a
considerable attention from scholars across several sectors. However, there is a scarcity of …
considerable attention from scholars across several sectors. However, there is a scarcity of …
Evaluating organizational phishing awareness training on an enterprise scale
Employees are often the victims of phishing attacks, posing a threat to both themselves and
their organizations. In response, organizations are dedicating resources, time, and …
their organizations. In response, organizations are dedicating resources, time, and …
A test of protection motivation theory in the information security literature: A meta-analytic structural equation modeling approach
Abstract Information security is one of the important domains of information systems
research today, with protection motivation theory (PMT) one of its most influential theoretical …
research today, with protection motivation theory (PMT) one of its most influential theoretical …
Exploring the frontiers of cybersecurity behavior: a systematic review of studies and theories
Cybersecurity procedures and policies are prevalent countermeasures for protecting
organizations from cybercrimes and security incidents. Without considering human …
organizations from cybercrimes and security incidents. Without considering human …
The effectiveness of abstract versus concrete fear appeals in information security
Information security (ISec) is a pervasive concern of individuals, organizations, and
governments. To encourage individuals to engage in and learn about secure behaviors …
governments. To encourage individuals to engage in and learn about secure behaviors …
Employees' behavioural intention to smartphone security: A gender-based, cross-national study
Despite the benefits of bring your own device (BYOD) programmes, they are considered one
of the top security risks companies are facing. Furthermore, there is a gap in the literature in …
of the top security risks companies are facing. Furthermore, there is a gap in the literature in …
Toward a cybercrime classification ontology: A knowledge-based approach
In recent years there has been an increase in cybercrimes and its negative impacts on the
lives of individuals, organizations, and governments. It has been argued that a better …
lives of individuals, organizations, and governments. It has been argued that a better …