Information security management needs more holistic approach: A literature review

ZA Soomro, MH Shah, J Ahmed - International journal of information …, 2016 - Elsevier
Abstract Information technology has dramatically increased online business opportunities;
however these opportunities have also created serious risks in relation to information …

Information security behavior and information security policy compliance: A systematic literature review for identifying the transformation process from noncompliance …

RF Ali, PDD Dominic, SEA Ali, M Rehman, A Sohail - Applied Sciences, 2021 - mdpi.com
A grave concern to an organization's information security is employees' behavior when they
do not value information security policy compliance (ISPC). Most ISPC studies evaluate …

Data security and consumer trust in FinTech innovation in Germany

H Stewart, J Jürjens - Information & Computer Security, 2018 - emerald.com
Purpose The purpose of this study is to empirically analyse the key factors that influence the
adoption of financial technology innovation in the country Germany. The advancement of …

Cybersecurity enterprises policies: A comparative study

A Mishra, YI Alzoubi, AQ Gill, MJ Anwar - Sensors, 2022 - mdpi.com
Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but
also by national security. To safeguard an organization's cyberenvironments, information …

Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents

C Donalds, KM Osei-Bryson - International Journal of Information …, 2020 - Elsevier
Recent information and cybersecurity research have focused on improving individuals'
security compliance behavior. However, improved security performance remains a …

[HTML][HTML] A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises

S Chaudhary, V Gkioulos, S Katsikas - Computer Science Review, 2023 - Elsevier
The proliferation of information and communication technologies in enterprises enables
them to develop new business models and enhance their operational and commercial …

Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment

C Liu, N Wang, H Liang - International Journal of Information Management, 2020 - Elsevier
Employees' non-compliance with organizational information security policy (ISP) when using
informational resources has become the main reason for continuous security incidents …

Investigating the security divide between SME and large companies: How SME characteristics influence organizational IT security investments

M Heidt, JP Gerlach, P Buxmann - Information Systems Frontiers, 2019 - Springer
Lagging IT security investments in small and medium-sized enterprises (SME) point towards
a security divide between SME and large enterprises, yet our structured literature review …

A novel approach for DDoS attacks detection in COVID-19 scenario for small entrepreneurs

A Gaurav, BB Gupta, PK Panigrahi - Technological Forecasting and Social …, 2022 - Elsevier
The current COVID-19 issue has altered the way of doing business. Now that most
customers prefer to do business online, many companies are shifting their business models …

Information security management and the human aspect in organizations

H Stewart, J Jürjens - Information & Computer Security, 2017 - emerald.com
Purpose The aim of this study is to encourage management boards to recognize that
employees play a major role in the management of information security. Thus, these issues …