Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

Security-related behavior in using information systems in the workplace: A review and synthesis

KH Guo - Computers & Security, 2013 - Elsevier
Security-related behavior in the workplace has recently drawn much attention from scholars
in the information systems literature. Many studies, however, have reported inconsistent and …

[HTML][HTML] A comprehensive model of information security factors for decision-makers

R Diesch, M Pfaff, H Krcmar - Computers & Security, 2020 - Elsevier
Decision-making in the context of organizational information security is highly dependent on
various information. For information security managers, not only relevant information has to …

Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model

Y Chen, DF Galletta, PB Lowry, X Luo… - Information Systems …, 2021 - pubsonline.informs.org
Organizational information security (ISec) threats have exploded with advances in
globalization and technology. Thus, organizations are scrambling to find both technical and …

The impacts of organizational culture on information security culture: a case study

M Tang, M Li, T Zhang - Information Technology and Management, 2016 - Springer
Abstract Information security cannot rely solely on technology. More attention must be drawn
to the users' behavioral perspectives regarding information security. In this study, we …

Protecting organizational knowledge: a structured literature review

M Manhart, S Thalmann - Journal of Knowledge Management, 2015 - emerald.com
Purpose–The purpose of this paper is to investigate pertinent knowledge protection
literature. At the same time, however, knowledge protection is often a neglected or …

Informing cybersecurity strategic commitment through top management perceptions: The role of institutional pressures

O Ogbanufe, DJ Kim, MC Jones - Information & management, 2021 - Elsevier
Given the financial consequences of security breaches, security risk management has
gained more attention in board rooms and garnered more involvement from top …

Measuring user satisfaction with information security practices

GPZ Montesdioca, ACG Maçada - Computers & security, 2015 - Elsevier
Abstract Information security is a major concern of organizational management. Security
solutions based on technical aspects alone are insufficient to protect corporate data …

State of the art in information security policy development

H Paananen, M Lapke, M Siponen - Computers & Security, 2020 - Elsevier
Despite the prevalence of research that exists under the label of “information security
policies”(ISPs), there is no consensus on what an ISP means or how ISPs should be …

[HTML][HTML] Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method

E Kolkowska, F Karlsson, K Hedström - The Journal of Strategic Information …, 2017 - Elsevier
Employees' poor compliance with information security policies is a perennial problem.
Current information security analysis methods do not allow information security managers to …