State of the art in information security policy development

H Paananen, M Lapke, M Siponen - Computers & Security, 2020 - Elsevier
Despite the prevalence of research that exists under the label of “information security
policies”(ISPs), there is no consensus on what an ISP means or how ISPs should be …

What are the trend and core knowledge of information security? A citation and co-citation analysis

WL Shiau, X Wang, F Zheng - Information & Management, 2023 - Elsevier
Abstract Information technology brings business success opportunities, but also causes
potential safety hazards to organizations. In response to the increasing academia and …

[HTML][HTML] Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in …

S Bauer, EWN Bernroider, K Chudzikowski - computers & security, 2017 - Elsevier
In organizations, users' compliance with information security policies (ISP) is crucial for
minimizing information security (IS) incidents. To improve users' compliance, IS managers …

[HTML][HTML] A comprehensive model of information security factors for decision-makers

R Diesch, M Pfaff, H Krcmar - Computers & Security, 2020 - Elsevier
Decision-making in the context of organizational information security is highly dependent on
various information. For information security managers, not only relevant information has to …

[HTML][HTML] Metaverse platform attributes and customer experience measurement

SM Rahman, NH Chowdhury, JLH Bowden… - Journal of Retailing and …, 2025 - Elsevier
The metaverse has enormous potential to provide customers with novel experiences and
support brand capabilities. Therefore, ensuring a high-quality customer experience in the …

Security behaviors of smartphone users

A Das, HU Khan - Information & Computer Security, 2016 - emerald.com
Purpose–This paper aims to report on the information security behaviors of smartphone
users in an affluent economy of the Middle East. Design/methodology/approach–A model …

Employees' intentions toward complying with information security controls in Saudi Arabia's public organisations

S AlGhamdi, KT Win, E Vlahu-Gjorgievska - Government Information …, 2022 - Elsevier
Ensuring employees' compliance with information security controls is a major challenge
experienced by the management of information security in organisations. While the …

Classification of normal and malicious traffic based on an ensemble of machine learning for a vehicle can-network

E Alalwany, I Mahgoub - Sensors, 2022 - mdpi.com
Connectivity and automation have expanded with the development of autonomous vehicle
technology. One of several automotive serial protocols that can be used in a wide range of …

Do employees in a “good” company comply better with information security policy? A corporate social responsibility perspective

HL Kim, J Han - Information Technology & People, 2019 - emerald.com
Purpose The purpose of this paper is to investigate the impact of corporate social
responsibility (CSR) on employees' compliance behavior concerning information security …

Evaluating compliance for organizational information security and business continuity: three strata of ventriloqual agency

M Niemimaa - Information Technology & People, 2023 - emerald.com
Purpose The purpose of this research is to study how compliance evaluation becomes
performed in practice. Compliance evaluation is a common practice among organizations …