Information security behavior and information security policy compliance: A systematic literature review for identifying the transformation process from noncompliance …

RF Ali, PDD Dominic, SEA Ali, M Rehman, A Sohail - Applied Sciences, 2021 - mdpi.com
A grave concern to an organization's information security is employees' behavior when they
do not value information security policy compliance (ISPC). Most ISPC studies evaluate …

A systematic literature review of cybersecurity scales assessing information security awareness

R Rohan, D Pal, J Hautamäki, S Funilkul… - Heliyon, 2023 - cell.com
Abstract Information Security Awareness (ISA) is a significant concept that got considerable
attention recently and can assist in minimizing the risks associated with information security …

Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model

NF Khan, N Ikram, H Murtaza, M Javed - Computers & Security, 2023 - Elsevier
Context Cybersecurity behavioral literature has a significant number of studies on training
and awareness. However, there is lack of theoretical underpinnings in developing …

Data security crisis in universities: identification of key factors affecting data breach incidents

J Li, W Xiao, C Zhang - Humanities and Social Sciences …, 2023 - nature.com
The extremely complex and dynamic digital environments of universities make them highly
vulnerable to the risk of data breaches. This study empirically investigated the factors …

Enterprise risk management and information technology security in the financial sector

KO Kwateng, C Amanor, FK Tetteh - Information & Computer Security, 2022 - emerald.com
Enterprise risk management and information technology security in the financial sector |
Emerald Insight Books and journals Case studies Expert Briefings Open Access Publish with us …

BYOD policy compliance: Risks and strategies in organizations

R Palanisamy, AA Norman… - Journal of Computer …, 2022 - Taylor & Francis
The proliferation of mobile devices has brought the Bring Your Own Device (BYOD) trend in
organizations, along with significant challenges when employees fail to comply with security …

The cybersecurity behavioral research: A tertiary study

NF Khan, A Yaqoob, MS Khan, N Ikram - Computers & Security, 2022 - Elsevier
Context Cybersecurity has seen a rise in behavioral investigation during the past decades.
This includes studies being carried out at the primary as well as secondary levels. There are …

Exploring the influence of direct and indirect factors on information security policy compliance: a systematic literature review

M Alassaf, A Alkhalifah - IEEE Access, 2021 - ieeexplore.ieee.org
Information systems security is considered one of the key issues concerning organizations'
management. Despite the massive investment that organizations make to safeguard their …

Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia

I Almomani, M Ahmed, L Maglaras - PeerJ Computer Science, 2021 - peerj.com
Abstract The Saudi Arabia government has proposed different frameworks such as the
CITC's Cybersecurity Regulatory Framework (CRF) and the NCA's Essential Cybersecurity …

[HTML][HTML] Software compliance requirements, factors, and policies: A systematic literature review

M Mubarkoot, J Altmann, M Rasti-Barzoki, B Egger… - Computers & …, 2023 - Elsevier
Background Recent statistics reveal that 56% of software attacks are caused by insider
negligence and 26% are caused by malicious insiders. They also show that 67% of …