Security education, training, and awareness programs: Literature review

S Hu, C Hsu, Z Zhou - Journal of Computer Information Systems, 2022 - Taylor & Francis
Security education, training, and awareness (SETA) is one of the most common and
prominent strategies for organizational security governance. However, only a small portion …

Cyber-security and risky behaviors in a developing country context: A Pakistani perspective

NF Khan, N Ikram, S Saleem, S Zafar - Security Journal, 2023 - Springer
Cyber-security behavior research is scant with even scarce studies carried out in developing
countries. We examine the cyber-security and risky Internet behaviors of undergraduate …

[HTML][HTML] Психологические аспекты информационной безопасности организации в контексте социоинженерных атак

ТВ Тулупьева - Управленческое консультирование, 2022 - cyberleninka.ru
Целью данной обзорной статьи является определение подходов к решению
имеющихся проблем в учете психологических аспектов информационной безопасности …

Identifying information security opinion leaders in organizations: Insights from the theory of social power bases and social network analysis

D Dang-Pham, K Kautz, AP Hoang… - Computers & Security, 2022 - Elsevier
Organizations are increasingly prioritizing the management of information security (InfoSec)
to facilitate their data-driven business. There are densely connected organizational networks …

A Novel Administration Model for Managing and Organising the Heterogeneous Information Security Policy Field

FM Alotaibi, A Al-Dhaqm, WMS Yafooz, YD Al-Otaibi - Applied Sciences, 2023 - mdpi.com
Information security policy (ISP) plays a crucial role in maintaining the availability,
confidentiality, and integrity of sensitive data. However, it is of high complexity and …

Reliability, validity, and strength of a unified model for information security policy compliance

A Koohang, JH Nord, ZV Sandoval… - Journal of Computer …, 2021 - Taylor & Francis
The purpose of this paper was to first examine the reliability, validity, and strength of a
unified model for information security policy compliance that includes eight constructs …

Effects of socioeconomic and digital inequalities on cybersecurity in a developing country

NF Khan, N Ikram, S Saleem - Security Journal, 2023 - Springer
In developing countries, increased reliance on cyberspace for carrying out educational
activities has implications for cybersecurity threats. In the light of stratification model of …

Understanding employees' perceptions of SETA events: the role of pedagogical and communication approaches

S Hu, C Hsu, Z Zhou - Internet Research, 2024 - emerald.com
Purpose Security education, training and awareness (SETA) programs are the key to
addressing “people problems” in information systems (IS) security. Contrary to studies using …

Protecting intellectual property from insider threats: A management information security intelligence perspective

HL Kim, A Hovav, J Han - Journal of Intellectual Capital, 2020 - emerald.com
Purpose The purpose of this paper is to propose a theory of information security intelligence
and examine the effects of managers' information security intelligence (MISI) on employees' …

Hospital Staff's Adherence to Information Security Policy: A Quest for the Antecedents of Deterrence Variables

KM Kuo, PC Talley, DYM Lin - INQUIRY: The Journal of …, 2021 - journals.sagepub.com
Information security has come to the forefront as an organizational priority since information
systems are considered as some of the most important assets for achieving competitive …