[PDF][PDF] Políticas de Seguridad de la Información: Revisión sistemática de las teorías que explican su cumplimiento

JRA Yupanqui, SB Oré - Revista Iberica de Sistemas e …, 2017 - pdfs.semanticscholar.org
Las políticas de seguridad de la información que implementan las organizaciones para
protección de su información, es quizás uno de los temas que podría generar polémicas …

Resistance to information security due to users' information safety behaviors: Empirical research on the emerging markets

S Apolinário, AC Yoshikuni, CLC Larieira - Computers in Human Behavior, 2023 - Elsevier
Practitioners and academics ask if and how punishment and moral norms affect the
resistance to information systems security in emerging markets. To address this question …

Institutional governance and protection motivation: Theoretical insights into shaping employees' security compliance behavior in higher education institutions in the …

S Hina, DDDP Selvam, PB Lowry - Computers & Security, 2019 - Elsevier
Higher education institutions (HEIs) are progressively computerized to deal with substantial
academic and operational information. With the increase in enriched information systems …

Finding the weakest links in the weakest link: How well do undergraduate students make cybersecurity judgment?

Z Yan, T Robertson, R Yan, SY Park, S Bordoff… - Computers in Human …, 2018 - Elsevier
It has been widely recognized in the psychology of cybersecurity literature that ordinary
users rather than technology systems are the weakest link in cybersecurity. The present …

{Anti-Privacy} and {Anti-Security} Advice on {TikTok}: Case Studies of {Technology-Enabled} Surveillance and Control in Intimate Partner and {Parent-Child} …

M Wei, E Zeng, T Kohno, F Roesner - Eighteenth Symposium on Usable …, 2022 - usenix.org
Modern technologies including smartphones, AirTags, and tracking apps enable
surveillance and control in interpersonal relationships. In this work, we study videos posted …

[HTML][HTML] Shaping extra-role security behaviors through employee-agent relations: A dual-channel motivational perspective

JM Davis, D Agrawal, O Ogbanufe - International Journal of Information …, 2025 - Elsevier
Organizational information security performance increasingly depends on employees' extra-
role security behaviors (ERBs), which go beyond the scope of formal organizational …

Moving beyond cyber security awareness and training to engendering security knowledge sharing

S Alahmari, K Renaud, I Omoronyia - Information Systems and e-Business …, 2023 - Springer
Employees play a critical role in improving workplace cyber security, which builds on
widespread security knowledge and expertise. To maximise knowledge levels …

Understanding the security and privacy advice given to black lives matter protesters

MJ Boyd, JL Sullivan Jr, M Chetty, B Ur - … of the 2021 CHI conference on …, 2021 - dl.acm.org
In 2020, there were widespread Black Lives Matter (BLM) protests in the US Because many
attendees were novice protesters, organizations distributed guides for staying safe at a …

An approach to estimating of criticality of social engineering attacks traces

A Khlobystova, M Abramov, A Tulupyev - International Conference on …, 2019 - Springer
In this article we propose to consider the trajectories of social engineering attacks, which are
the most critical from the point of view of the expected damage to the organization, and not …

Can peers help reduce violations of information security policies? The role of peer monitoring

A Yazdanmehr, J Wang - European Journal of Information Systems, 2023 - Taylor & Francis
Peers may help others avoid violating organisational information security policies (ISPs).
This study explores how peer monitoring reduces employee ISP violation intention. We …