Understanding the state of criminological scholarship on cybercrimes

TJ Holt - Computers in Human Behavior, 2023 - Elsevier
Understanding the state of criminological scholarship on cybercrimes - ScienceDirect Skip to
main contentSkip to article Elsevier logo Journals & Books Search RegisterSign in View PDF …

[HTML][HTML] Cyber–information security compliance and violation behaviour in organisations: A systematic review

NS Sulaiman, MA Fauzi, W Wider, J Rajadurai… - Social Sciences, 2022 - mdpi.com
Cyber and information security (CIS) is an issue of national and international interest.
Despite sophisticated security systems and extensive physical countermeasures to combat …

What are the trend and core knowledge of information security? A citation and co-citation analysis

WL Shiau, X Wang, F Zheng - Information & Management, 2023 - Elsevier
Abstract Information technology brings business success opportunities, but also causes
potential safety hazards to organizations. In response to the increasing academia and …

Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment

C Liu, N Wang, H Liang - International Journal of Information Management, 2020 - Elsevier
Employees' non-compliance with organizational information security policy (ISP) when using
informational resources has become the main reason for continuous security incidents …

Institutional governance and protection motivation: Theoretical insights into shaping employees' security compliance behavior in higher education institutions in the …

S Hina, DDDP Selvam, PB Lowry - Computers & Security, 2019 - Elsevier
Higher education institutions (HEIs) are progressively computerized to deal with substantial
academic and operational information. With the increase in enriched information systems …

Employees' behavioural intention to smartphone security: A gender-based, cross-national study

N Ameen, A Tarhini, MH Shah, NO Madichie - Computers in Human …, 2020 - Elsevier
Despite the benefits of bring your own device (BYOD) programmes, they are considered one
of the top security risks companies are facing. Furthermore, there is a gap in the literature in …

Do leadership styles influence employee information systems security intention? A study of the banking industry

MC Almeida, AC Yoshikuni, R Dwivedi… - Global Journal of Flexible …, 2022 - Springer
The banking industry is highly prone to Information Systems (IS) security breaches from
outside organizations and inside organizations. There are processes to monitor, detect …

Remote vigilance: The roles of cyber awareness and cybersecurity policies among remote workers

JK Nwankpa, PM Datta - Computers & Security, 2023 - Elsevier
The convergence of increased remote working and rising cybersecurity threats have created
a severe challenge for organizations. As firms continue to embrace remote working, the …

Peers matter: The moderating role of social influence on information security policy compliance

A Yazdanmehr, J Wang, Z Yang - Information Systems Journal, 2020 - Wiley Online Library
Abstract Information security in an organization largely depends on employee compliance
with information security policy (ISP). Previous studies have mainly explored the effects of …

BYOD policy compliance: Risks and strategies in organizations

R Palanisamy, AA Norman… - Journal of Computer …, 2022 - Taylor & Francis
The proliferation of mobile devices has brought the Bring Your Own Device (BYOD) trend in
organizations, along with significant challenges when employees fail to comply with security …