Using design-science based gamification to improve organizational security training and compliance

M Silic, PB Lowry - Journal of management information systems, 2020 - Taylor & Francis
We conducted a design-science research project to improve an organization's compound
problems of (1) unsuccessful employee phishing prevention and (2) poorly received internal …

Exploring the influence of direct and indirect factors on information security policy compliance: a systematic literature review

M Alassaf, A Alkhalifah - IEEE Access, 2021 - ieeexplore.ieee.org
Information systems security is considered one of the key issues concerning organizations'
management. Despite the massive investment that organizations make to safeguard their …

What are the trend and core knowledge of information security? A citation and co-citation analysis

WL Shiau, X Wang, F Zheng - Information & Management, 2023 - Elsevier
Abstract Information technology brings business success opportunities, but also causes
potential safety hazards to organizations. In response to the increasing academia and …

Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence

Y Chen, W Xia, K Cousins - Computers & Security, 2022 - Elsevier
Understanding employees' motivations and behaviors toward compliance with information
security policies (ISPs) remains a theoretical and practical challenge. Although previous …

A meta-analysis of deterrence theory in information security policy compliance research

S Trang, B Brendel - Information Systems Frontiers, 2019 - Springer
Enforcing information security policies is a key concern of information security managers. To
deter employees from deviant behavior, organizations often implement sanction …

Security awareness: The first step in information security compliance behavior

I Hwang, R Wakefield, S Kim, T Kim - Journal of Computer …, 2021 - Taylor & Francis
In this study, we use the attentional phase of social learning theory to link workplace security-
related experiences and observations to employees' security awareness. The responses of …

Employees' in-role and extra-role information security behaviors from the PE fit perspective

Y Yin, C Hsu, Z Zhou - Computers & Security, 2023 - Elsevier
Organizations are increasingly seeking ways to encourage employee in-role and extra-role
information security (InfoSec) behaviors for enhancing organizational InfoSec. One …

Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation

S Vrhovec, A Mihelič - Computers & Security, 2021 - Elsevier
Increasingly sophisticated cyberattacks often systematically target organizational insiders.
Their motivation for self-protection has therefore an important role in cybersecurity of …

Information security policy compliance: leadership, trust, role values, and awareness

A Koohang, A Nowak, J Paliszkiewicz… - Journal of Computer …, 2020 - Taylor & Francis
The purpose of this study was to find out which one of the four selected predictor variables,
ie, leadership, trusting beliefs, role values, and information security policy awareness are …

Building an awareness-centered information security policy compliance model

A Koohang, J Anderson, JH Nord… - … Management & Data …, 2020 - emerald.com
Purpose The purpose of this paper is to build an awareness-centered information security
policy (ISP) compliance model, asserting that awareness is the key to ISP compliance and …