[HTML][HTML] A systematic analysis of failures in protecting personal health data: a scoping review

J Pool, S Akhlaghpour, F Fatehi… - International Journal of …, 2024 - Elsevier
Personal health data breaches pose significant challenges to healthcare providers and
clients. This study systematically analyzes 5470 records and reviews 120 articles on this …

Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

Digital health innovation: exploring adoption of COVID-19 digital contact tracing apps

S Sharma, G Singh, R Sharma, P Jones… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
With the outbreak of COVID-19, contact tracing is becoming a used intervention to control
the spread of this highly infectious disease. This article explores an individual's intention to …

[HTML][HTML] Seeing the forest and the trees: a meta-analysis of the antecedents to information security policy compliance

WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - dl.acm.org
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …

Does government social media promote users' information security behavior towards COVID-19 scams? Cultivation effects and protective motivations

Z Tang, AS Miller, Z Zhou, M Warkentin - Government Information Quarterly, 2021 - Elsevier
Cybercriminals are taking advantage of the COVID-19 outbreak and offering COVID-19-
related scams to unsuspecting people. Currently, there is a lack of studies that focus on …

Understanding employee responses to stressful information security requirements: A coping perspective

J D'Arcy, T Herath, MK Shoss - Journal of management information …, 2014 - Taylor & Francis
We use coping theory to explore an underlying relationship between employee stress
caused by burdensome, complex, and ambiguous information security requirements …

An enhanced fear appeal rhetorical framework

AC Johnston, M Warkentin, M Siponen - MIS quarterly, 2015 - JSTOR
Fear appeals, which are used widely in information security campaigns, have become
common tools in motivating individual compliance with information security policies and …

Future directions for behavioral information security research

RE Crossler, AC Johnston, PB Lowry, Q Hu… - computers & …, 2013 - Elsevier
Information Security (InfoSec) research is far reaching and includes many approaches to
deal with protecting and mitigating threats to the information assets and technical resources …

When do IT security investments matter? Accounting for the influence of institutional factors in the context of healthcare data breaches

CM Angst, ES Block, J D'Arcy, K Kelley - MIS quarterly, 2017 - JSTOR
In this study, we argue that institutional factors determine the extent to which hospitals are
symbolic or substantive adopters of information technology (IT) specific organizational …

Information security awareness and behavior: a theory-based literature review

B Lebek, J Uffen, M Neumann, B Hohler… - Management …, 2014 - emerald.com
Purpose–This paper aims to provide an overview of theories used in the field of employees'
information systems (IS) security behavior over the past decade. Research gaps and …