The good, the bad and the missing: A Narrative review of cyber-security implications for australian small businesses

T Tam, A Rao, J Hall - Computers & Security, 2021 - Elsevier
Abstract Small businesses (0–19 employees) are becoming attractive targets for cyber-
criminals, but struggle to implement cyber-security measures that large businesses routinely …

Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

Defining organisational information security culture—Perspectives from academia and industry

A Da Veiga, LV Astakhova, A Botha, M Herselman - Computers & Security, 2020 - Elsevier
The ideal or strong information security culture can aid in minimising the threat of humans to
information protection and thereby aid in reducing data breaches or incidents in …

Information security policy compliance model in organizations

NS Safa, R Von Solms, S Furnell - computers & security, 2016 - Elsevier
The Internet and information technology have influenced human life significantly. However,
information security is still an important concern for both users and organizations …

Individual differences and information security awareness

A McCormac, T Zwaans, K Parsons, D Calic… - Computers in Human …, 2017 - Elsevier
The main purpose of this study was to examine the relationship between individuals'
Information Security Awareness (ISA) and individual difference variables, namely age …

An enhanced fear appeal rhetorical framework

AC Johnston, M Warkentin, M Siponen - MIS quarterly, 2015 - JSTOR
Fear appeals, which are used widely in information security campaigns, have become
common tools in motivating individual compliance with information security policies and …

Future directions for behavioral information security research

RE Crossler, AC Johnston, PB Lowry, Q Hu… - computers & …, 2013 - Elsevier
Information Security (InfoSec) research is far reaching and includes many approaches to
deal with protecting and mitigating threats to the information assets and technical resources …

An information security knowledge sharing model in organizations

NS Safa, R Von Solms - Computers in Human Behavior, 2016 - Elsevier
Abstract Knowledge sharing plays an important role in the domain of information security,
due to its positive effect on employees' information security awareness. It is acknowledged …

Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory

P Ifinedo - Computers & Security, 2012 - Elsevier
This research investigated information systems security policy (ISSP) compliance by
drawing upon two relevant theories ie the theory of planned behavior (TPB) and the …

Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition

P Ifinedo - Information & Management, 2014 - Elsevier
This study investigated employees' information systems security policy (ISSP) compliance
behavioural intentions in organisations from the theoretical lenses of social bonding, social …