Organizational information security policies: a review and research framework
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …
of organizational policies that specify how users of information and technology resources …
State of the art in information security policy development
Despite the prevalence of research that exists under the label of “information security
policies”(ISPs), there is no consensus on what an ISP means or how ISPs should be …
policies”(ISPs), there is no consensus on what an ISP means or how ISPs should be …
A cyber-security culture framework for assessing organization readiness
A Georgiadou, S Mouzakitis, K Bounas… - Journal of Computer …, 2022 - Taylor & Francis
This paper presents a cyber-security culture framework for assessing and evaluating the
current security readiness of an organization's workforce. Having conducted a thorough …
current security readiness of an organization's workforce. Having conducted a thorough …
User participation in information systems security risk management
JL Spears, H Barki - MIS quarterly, 2010 - JSTOR
This paper examines user participation in information systems security risk management
and its influence in the context of regulatory compliance via a multi-method study at the …
and its influence in the context of regulatory compliance via a multi-method study at the …
Exploring the adoption of the international information security management system standard ISO/IEC 27001: a web mining-based analysis
In the light of digitalization and recent EU policy initiatives, information is an important asset
that organizations of all sizes and from all sectors should secure. However, in order to …
that organizations of all sizes and from all sectors should secure. However, in order to …
Aligning the information security policy with the strategic information systems plan
NF Doherty, H Fulford - Computers & security, 2006 - Elsevier
Two of the most important documents for ensuring the effective deployment of information
systems and technologies within the modern business enterprise are the strategic …
systems and technologies within the modern business enterprise are the strategic …
The information security policy unpacked: A critical study of the content of university policies
Ensuring the security of corporate information, that is increasingly stored, processed and
disseminated using information and communications technologies [ICTs], has become an …
disseminated using information and communications technologies [ICTs], has become an …
Review of IS security policy compliance: Toward the building blocks of an IS security theory
An understanding of insider threats in information systems (IS) is important to help address
one of the dangers lurking within organizations. This article provides a review of the …
one of the dangers lurking within organizations. This article provides a review of the …
A cybersecurity culture survey targeting healthcare critical infrastructures
F Gioulekas, E Stamatiadis, A Tzikas, K Gounaris… - Healthcare, 2022 - mdpi.com
Recent studies report that cybersecurity breaches noticed in hospitals are associated with
low levels of personnel's cybersecurity awareness. This work aims to assess the …
low levels of personnel's cybersecurity awareness. This work aims to assess the …
Metrics for characterizing the form of security policies
Security policies are widely used tools for the implementation of organizational security,
however neither do we have metrics for measuring their effectiveness, nor are there …
however neither do we have metrics for measuring their effectiveness, nor are there …