Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Organizational information security policies: a review and research framework
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …
of organizational policies that specify how users of information and technology resources …
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings
Deterrence theory is one of the most widely applied theories in information systems (IS)
security research, particularly within behavioral IS security studies. Based on the rational …
security research, particularly within behavioral IS security studies. Based on the rational …
Forty years of the International Journal of Information Management: A bibliometric analysis
Abstract In 2019, the International Journal of Information Management (IJIM) celebrated its
40th year of publication. This study commemorates this event by presenting a retrospect of …
40th year of publication. This study commemorates this event by presenting a retrospect of …
What are the trend and core knowledge of information security? A citation and co-citation analysis
Abstract Information technology brings business success opportunities, but also causes
potential safety hazards to organizations. In response to the increasing academia and …
potential safety hazards to organizations. In response to the increasing academia and …
Evaluating the cyber security readiness of organizations and its influence on performance
The acceleration of cyber-attacks in recent years has negatively impacted the overall
performance of organizations around the world. Organizations face the challenge of …
performance of organizations around the world. Organizations face the challenge of …
An enhanced fear appeal rhetorical framework
Fear appeals, which are used widely in information security campaigns, have become
common tools in motivating individual compliance with information security policies and …
common tools in motivating individual compliance with information security policies and …
The effects of convenience and speed in m-payment
The effects of convenience and speed in m-payment | Emerald Insight Books and journals Case
studies Expert Briefings Open Access Publish with us Advanced search The effects of …
studies Expert Briefings Open Access Publish with us Advanced search The effects of …
When do IT security investments matter? Accounting for the influence of institutional factors in the context of healthcare data breaches
In this study, we argue that institutional factors determine the extent to which hospitals are
symbolic or substantive adopters of information technology (IT) specific organizational …
symbolic or substantive adopters of information technology (IT) specific organizational …
Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study
We present a model of employee compliance with information security policy (ISP) that (1)
explicates stable, cognitive beliefs regarding the consequences of compliance and …
explicates stable, cognitive beliefs regarding the consequences of compliance and …
Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness
Many organizations recognize that their employees, who are often considered the weakest
link in information security, can also be great assets in the effort to reduce risk related to …
link in information security, can also be great assets in the effort to reduce risk related to …