Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings

J D'arcy, T Herath - European journal of information systems, 2011 - Taylor & Francis
Deterrence theory is one of the most widely applied theories in information systems (IS)
security research, particularly within behavioral IS security studies. Based on the rational …

Forty years of the International Journal of Information Management: A bibliometric analysis

N Donthu, S Kumar, N Pandey, P Gupta - International Journal of …, 2021 - Elsevier
Abstract In 2019, the International Journal of Information Management (IJIM) celebrated its
40th year of publication. This study commemorates this event by presenting a retrospect of …

What are the trend and core knowledge of information security? A citation and co-citation analysis

WL Shiau, X Wang, F Zheng - Information & Management, 2023 - Elsevier
Abstract Information technology brings business success opportunities, but also causes
potential safety hazards to organizations. In response to the increasing academia and …

Evaluating the cyber security readiness of organizations and its influence on performance

S Hasan, M Ali, S Kurnia, R Thurasamy - Journal of Information Security …, 2021 - Elsevier
The acceleration of cyber-attacks in recent years has negatively impacted the overall
performance of organizations around the world. Organizations face the challenge of …

An enhanced fear appeal rhetorical framework

AC Johnston, M Warkentin, M Siponen - MIS quarterly, 2015 - JSTOR
Fear appeals, which are used widely in information security campaigns, have become
common tools in motivating individual compliance with information security policies and …

The effects of convenience and speed in m-payment

AC Teo, GWH Tan, KB Ooi, TS Hew… - Industrial management & …, 2015 - emerald.com
The effects of convenience and speed in m-payment | Emerald Insight Books and journals Case
studies Expert Briefings Open Access Publish with us Advanced search The effects of …

When do IT security investments matter? Accounting for the influence of institutional factors in the context of healthcare data breaches

CM Angst, ES Block, J D'Arcy, K Kelley - MIS quarterly, 2017 - JSTOR
In this study, we argue that institutional factors determine the extent to which hospitals are
symbolic or substantive adopters of information technology (IT) specific organizational …

Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study

J D'Arcy, PB Lowry - Information Systems Journal, 2019 - Wiley Online Library
We present a model of employee compliance with information security policy (ISP) that (1)
explicates stable, cognitive beliefs regarding the consequences of compliance and …

Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness

B Bulgurcu, H Cavusoglu, I Benbasat - MIS quarterly, 2010 - JSTOR
Many organizations recognize that their employees, who are often considered the weakest
link in information security, can also be great assets in the effort to reduce risk related to …