State of the art in information security policy development
Despite the prevalence of research that exists under the label of “information security
policies”(ISPs), there is no consensus on what an ISP means or how ISPs should be …
policies”(ISPs), there is no consensus on what an ISP means or how ISPs should be …
What are the trend and core knowledge of information security? A citation and co-citation analysis
Abstract Information technology brings business success opportunities, but also causes
potential safety hazards to organizations. In response to the increasing academia and …
potential safety hazards to organizations. In response to the increasing academia and …
[HTML][HTML] Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in …
In organizations, users' compliance with information security policies (ISP) is crucial for
minimizing information security (IS) incidents. To improve users' compliance, IS managers …
minimizing information security (IS) incidents. To improve users' compliance, IS managers …
[HTML][HTML] A comprehensive model of information security factors for decision-makers
Decision-making in the context of organizational information security is highly dependent on
various information. For information security managers, not only relevant information has to …
various information. For information security managers, not only relevant information has to …
[HTML][HTML] Metaverse platform attributes and customer experience measurement
The metaverse has enormous potential to provide customers with novel experiences and
support brand capabilities. Therefore, ensuring a high-quality customer experience in the …
support brand capabilities. Therefore, ensuring a high-quality customer experience in the …
Security behaviors of smartphone users
Purpose–This paper aims to report on the information security behaviors of smartphone
users in an affluent economy of the Middle East. Design/methodology/approach–A model …
users in an affluent economy of the Middle East. Design/methodology/approach–A model …
Employees' intentions toward complying with information security controls in Saudi Arabia's public organisations
Ensuring employees' compliance with information security controls is a major challenge
experienced by the management of information security in organisations. While the …
experienced by the management of information security in organisations. While the …
Classification of normal and malicious traffic based on an ensemble of machine learning for a vehicle can-network
Connectivity and automation have expanded with the development of autonomous vehicle
technology. One of several automotive serial protocols that can be used in a wide range of …
technology. One of several automotive serial protocols that can be used in a wide range of …
Do employees in a “good” company comply better with information security policy? A corporate social responsibility perspective
Purpose The purpose of this paper is to investigate the impact of corporate social
responsibility (CSR) on employees' compliance behavior concerning information security …
responsibility (CSR) on employees' compliance behavior concerning information security …
Evaluating compliance for organizational information security and business continuity: three strata of ventriloqual agency
M Niemimaa - Information Technology & People, 2023 - emerald.com
Purpose The purpose of this research is to study how compliance evaluation becomes
performed in practice. Compliance evaluation is a common practice among organizations …
performed in practice. Compliance evaluation is a common practice among organizations …