Compliance with Bring Your Own Device security policies in organizations: A systematic literature review

R Palanisamy, AA Norman, MLM Kiah - Computers & Security, 2020 - Elsevier
Abstract The omnipresence of Bring Your Own Device (BYOD) in organizations and
employees' lives makes it a challenge to ensure adherence to security policy. In such …

Contemplating social engineering studies and attack scenarios: A review study

A Yasin, R Fatima, L Liu, A Yasin… - Security and …, 2019 - Wiley Online Library
The previous year has seen an enormous increase in the studies related to social
engineering. This increase is partly due to increasing number of social engineering attacks …

Research on influencing factors and governance of disinformation dissemination on science and technology topics: an empirical study on the topic of “metaverse”

X Wang, X Feng, J Zhao - Internet Research, 2023 - emerald.com
Purpose The online Question and Answer community is full of a large number of science
and technology topics, the discussion and dissemination of which play an important role in …

Why employees share information security advice? Exploring the contributing factors and structural patterns of security advice sharing in the workplace

D Dang-Pham, S Pittayachawan, V Bruno - Computers in Human Behavior, 2017 - Elsevier
As modern organisations are dealing with a growing amount of data and strategic
information systems, the need to protect these vital assets becomes paramount. An …

Applying network analysis to investigate interpersonal influence of information security behaviours in the workplace

D Dang-Pham, S Pittayachawan, V Bruno - Information & Management, 2017 - Elsevier
As organisations are developing people-centric security workplaces, where proactive
security behaviours are fostered, it is important to understand more about the sources of …

Measuring Cyber Security Awareness: A Comparison between Computer Science and Media Science Students.

L Huraj, T Lengyelfalusy, A Hurajová, D Lajčin - TEM Journal, 2023 - ceeol.com
Internet users who behave carelessly or badly increase the possibility of a security attack on
the information systems they use. Although the technical security of devices is constantly …

Investigation into the formation of information security influence: Network analysis of an emerging organisation

D Dang-Pham, S Pittayachawan, V Bruno - Computers & Security, 2017 - Elsevier
While prior research has been examining information security behaviours in mature
environments with formal policies and practices, there is less attention paid to new or …

An Empirical Examination of Employee Information Security Advice Sharing

S Farshadkhah, M Maasberg, TS Ellis… - Journal of Computer …, 2024 - Taylor & Francis
In today's business world, information security is a top strategic issue. The security issues
faced by organizations are complex and addressing them can be expensive. Key findings …

Effects of team collaboration on sharing information security advice: insights from network analysis

D Dang-Pham, M Nkhoma - Information Resources Management …, 2017 - igi-global.com
Active sharing of information security advice among the employees has undeniable
implications for developing a sustainable security environment. This research examines this …

[图书][B] An Analysis of Employee Information Security Policy Compliance Behavior: A Generic Qualitative Inquiry

DJ Roberts - 2021 - search.proquest.com
Abstract Information is essential for every organization. Organizations have identified people
as a significant liability to information security governance. The purpose of this generic …