Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

State of the art in information security policy development

H Paananen, M Lapke, M Siponen - Computers & Security, 2020 - Elsevier
Despite the prevalence of research that exists under the label of “information security
policies”(ISPs), there is no consensus on what an ISP means or how ISPs should be …

A cyber-security culture framework for assessing organization readiness

A Georgiadou, S Mouzakitis, K Bounas… - Journal of Computer …, 2022 - Taylor & Francis
This paper presents a cyber-security culture framework for assessing and evaluating the
current security readiness of an organization's workforce. Having conducted a thorough …

User participation in information systems security risk management

JL Spears, H Barki - MIS quarterly, 2010 - JSTOR
This paper examines user participation in information systems security risk management
and its influence in the context of regulatory compliance via a multi-method study at the …

Exploring the adoption of the international information security management system standard ISO/IEC 27001: a web mining-based analysis

M Mirtsch, J Kinne, K Blind - IEEE Transactions on Engineering …, 2020 - ieeexplore.ieee.org
In the light of digitalization and recent EU policy initiatives, information is an important asset
that organizations of all sizes and from all sectors should secure. However, in order to …

Aligning the information security policy with the strategic information systems plan

NF Doherty, H Fulford - Computers & security, 2006 - Elsevier
Two of the most important documents for ensuring the effective deployment of information
systems and technologies within the modern business enterprise are the strategic …

The information security policy unpacked: A critical study of the content of university policies

NF Doherty, L Anastasakis, H Fulford - International journal of information …, 2009 - Elsevier
Ensuring the security of corporate information, that is increasingly stored, processed and
disseminated using information and communications technologies [ICTs], has become an …

Review of IS security policy compliance: Toward the building blocks of an IS security theory

P Balozian, D Leidner - ACM SIGMIS Database: The DATABASE for …, 2017 - dl.acm.org
An understanding of insider threats in information systems (IS) is important to help address
one of the dangers lurking within organizations. This article provides a review of the …

A cybersecurity culture survey targeting healthcare critical infrastructures

F Gioulekas, E Stamatiadis, A Tzikas, K Gounaris… - Healthcare, 2022 - mdpi.com
Recent studies report that cybersecurity breaches noticed in hospitals are associated with
low levels of personnel's cybersecurity awareness. This work aims to assess the …

Metrics for characterizing the form of security policies

S Goel, ISN Chengalur-Smith - The Journal of Strategic Information …, 2010 - Elsevier
Security policies are widely used tools for the implementation of organizational security,
however neither do we have metrics for measuring their effectiveness, nor are there …