Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

Information security behavior and information security policy compliance: A systematic literature review for identifying the transformation process from noncompliance …

RF Ali, PDD Dominic, SEA Ali, M Rehman, A Sohail - Applied Sciences, 2021 - mdpi.com
A grave concern to an organization's information security is employees' behavior when they
do not value information security policy compliance (ISPC). Most ISPC studies evaluate …

Investigating the impact of cybersecurity policy awareness on employees' cybersecurity behavior

L Li, W He, L Xu, I Ash, M Anwar, X Yuan - International Journal of …, 2019 - Elsevier
As internet technology and mobile applications increase in volume and complexity,
malicious cyber-attacks are evolving, and as a result society is facing greater security risks in …

Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study

J D'Arcy, PB Lowry - Information Systems Journal, 2019 - Wiley Online Library
We present a model of employee compliance with information security policy (ISP) that (1)
explicates stable, cognitive beliefs regarding the consequences of compliance and …

The dark triad and knowledge hiding

W Pan, Q Zhang, TSH Teo, VKG Lim - International Journal of Information …, 2018 - Elsevier
By drawing on psychological contract theory, this study examined the effects of the dark triad
of personality traits (Machiavellianism, narcissism, and psychopathy) on knowledge hiding …

Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment

C Liu, N Wang, H Liang - International Journal of Information Management, 2020 - Elsevier
Employees' non-compliance with organizational information security policy (ISP) when using
informational resources has become the main reason for continuous security incidents …

Security education, training, and awareness programs: Literature review

S Hu, C Hsu, Z Zhou - Journal of Computer Information Systems, 2022 - Taylor & Francis
Security education, training, and awareness (SETA) is one of the most common and
prominent strategies for organizational security governance. However, only a small portion …

Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model

Y Chen, DF Galletta, PB Lowry, X Luo… - Information Systems …, 2021 - pubsonline.informs.org
Organizational information security (ISec) threats have exploded with advances in
globalization and technology. Thus, organizations are scrambling to find both technical and …

Employees' in-role and extra-role information security behaviors from the PE fit perspective

Y Yin, C Hsu, Z Zhou - Computers & Security, 2023 - Elsevier
Organizations are increasingly seeking ways to encourage employee in-role and extra-role
information security (InfoSec) behaviors for enhancing organizational InfoSec. One …

A conceptual model for cybersecurity governance

S Yusif, A Hafeez-Baig - Journal of applied security research, 2021 - Taylor & Francis
Cybersecurity is a growing problem associated with everything an individual or an
organization does that is facilitated by the Internet. It is a multi-facetted program that can be …