A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions

Ö Aslan, SS Aktuğ, M Ozkan-Okay, AA Yilmaz, E Akin - Electronics, 2023 - mdpi.com
Internet usage has grown exponentially, with individuals and companies performing multiple
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …

Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

Cyber security awareness, knowledge and behavior: A comparative study

M Zwilling, G Klien, D Lesjak, Ł Wiechetek… - Journal of Computer …, 2022 - Taylor & Francis
Cyber-attacks represent a potential threat to information security. As rates of data usage and
internet consumption continue to increase, cyber awareness turned to be increasingly …

Applying the UTAUT model to explain the students' acceptance of mobile learning system in higher education

MA Almaiah, MM Alamri, W Al-Rahmi - Ieee Access, 2019 - ieeexplore.ieee.org
Mobile learning applications have been growing in demand and popularity and have
become a common phenomenon in modern educational systems, especially with the …

Seeing the forest and the trees

WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - JSTOR
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …

Intentions to adopt the blockchain: investigation of the retail supply chain

S Mukherjee, MM Baral, BL Lavanya… - Management …, 2023 - emerald.com
Purpose Blockchain can track the material from the manufacturer to the end customers.
Therefore, it can ensure the product's authenticity, transparency and trust in the retail supply …

The human aspects of information security questionnaire (HAIS-Q): two further validation studies

K Parsons, D Calic, M Pattinson, M Butavicius… - Computers & …, 2017 - Elsevier
Abstract Information security awareness (ISA) is integral to protecting an organisation from
cyber threats. The aim of this paper is to further establish the validity of the Human Aspects …

Information security behavior and information security policy compliance: A systematic literature review for identifying the transformation process from noncompliance …

RF Ali, PDD Dominic, SEA Ali, M Rehman, A Sohail - Applied Sciences, 2021 - mdpi.com
A grave concern to an organization's information security is employees' behavior when they
do not value information security policy compliance (ISPC). Most ISPC studies evaluate …

The enjoyment of knowledge sharing: impact of altruism on tacit knowledge-sharing behavior

B Obrenovic, D Jianguo, D Tsoy, S Obrenovic… - Frontiers in …, 2020 - frontiersin.org
Knowledge sharing between individuals is a key process for knowledge-intensive
organizations to create value and gain a competitive edge. An individual is in the center of a …

An information security knowledge sharing model in organizations

NS Safa, R Von Solms - Computers in Human Behavior, 2016 - Elsevier
Abstract Knowledge sharing plays an important role in the domain of information security,
due to its positive effect on employees' information security awareness. It is acknowledged …