State of the art in information security policy development

H Paananen, M Lapke, M Siponen - Computers & Security, 2020 - Elsevier
Despite the prevalence of research that exists under the label of “information security
policies”(ISPs), there is no consensus on what an ISP means or how ISPs should be …

[HTML][HTML] Countermeasures and their taxonomies for risk treatment in cybersecurity: A systematic mapping review

ID Sánchez-García, TSF Gilabert… - Computers & Security, 2023 - Elsevier
Cybersecurity continues to be one of the principal issues in the computing environment.
Organizations and researchers have made various efforts to mitigate the risks of cyberspace …

Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model

Y Chen, DF Galletta, PB Lowry, X Luo… - Information Systems …, 2021 - pubsonline.informs.org
Organizational information security (ISec) threats have exploded with advances in
globalization and technology. Thus, organizations are scrambling to find both technical and …

[HTML][HTML] The impact of artificial intelligence adoption for business-to-business marketing on shareholder reaction: A social actor perspective

Y Zhan, Y Xiong, R Han, HKS Lam, C Blome - International journal of …, 2024 - Elsevier
While AI applications are becoming ever more important in B2B marketing operations, there
is a lack of research to examine whether and how shareholders react to firms' AI-enabled …

The effect of organizational information security climate on information security policy compliance: The mediating effect of social bonding towards healthcare nurses

K Dong, RF Ali, PDD Dominic, SEA Ali - Sustainability, 2021 - mdpi.com
The advancement of information communication technology in healthcare institutions has
increased information security breaches. Scholars and industry practitioners have reported …

Security behaviors of smartphone users

A Das, HU Khan - Information & Computer Security, 2016 - emerald.com
Purpose–This paper aims to report on the information security behaviors of smartphone
users in an affluent economy of the Middle East. Design/methodology/approach–A model …

[HTML][HTML] Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method

E Kolkowska, F Karlsson, K Hedström - The Journal of Strategic Information …, 2017 - Elsevier
Employees' poor compliance with information security policies is a perennial problem.
Current information security analysis methods do not allow information security managers to …

Stakeholder perceptions of information security policy: Analyzing personal constructs

S Samonas, G Dhillon, A Almusharraf - International Journal of Information …, 2020 - Elsevier
Organizational stakeholders, such as employees and security managers, may understand
security rules and policies differently. Extant literature suggests that stakeholder perceptions …

Cyber-risk in healthcare: Exploring facilitators and barriers to secure behaviour

L Coventry, D Branley-Bell, E Sillence… - … conference on human …, 2020 - Springer
There are increasing concerns relating to cybersecurity of healthcare data and medical
devices. Cybersecurity in this sector is particularly important given the criticality of healthcare …

Protective measures and security policy non-compliance intention: It vision conflict as a moderator

KC Chang, YM Seow - Journal of Organizational and End User …, 2019 - igi-global.com
Internal vulnerabilities and insider threats top the list of information security (InfoSec)
incidents; prompting organizations to establish InfoSec policy (ISP). Yet, mitigating user's …