[HTML][HTML] Software compliance requirements, factors, and policies: A systematic literature review

M Mubarkoot, J Altmann, M Rasti-Barzoki, B Egger… - Computers & …, 2023 - Elsevier
Background Recent statistics reveal that 56% of software attacks are caused by insider
negligence and 26% are caused by malicious insiders. They also show that 67% of …

Examining the differential effectiveness of fear appeals in information security management using two-stage meta-analysis

PB Lowry, GD Moody, S Parameswaran… - Journal of …, 2023 - Taylor & Francis
Most of the information security management research involving fear appeals is guided by
either protection motivation theory or the extended parallel processing model. Over time …

The direct and indirect effect of organizational justice on employee intention to comply with information security policy: The case of Ethiopian banks

B Aebissa, G Dhillon, M Meshesha - Computers & Security, 2023 - Elsevier
Organizations today are greatly challenged by information security threats, which is often
due to employee non-compliance with the information security policies (ISPs). By drawing …

Fostering information security compliance as organizational citizenship behavior

A Vedadi, M Warkentin, DW Straub… - Information & …, 2024 - Elsevier
Abstract Information security is heightened when employees develop a strong sense of
information stewardship for information assets, a form of organizational citizenship behavior …

[PDF][PDF] TIME WILL TELL: THE CASE FOR AN IDIOGRAPHIC APPROACH TO BEHAVIORAL CYBERSECURITY RESEARCH.

WA Cram, J D'Arcy, A Benlian - MIS Quarterly, 2024 - researchgate.net
Many of the theories used in behavioral cybersecurity research have been applied with a
nomothetic approach, which is characterized by cross-sectional data (eg, one-time surveys) …

Understanding sustained participation in crowdsourcing platforms: the role of autonomy, temporal value, and hedonic value

W Wu, Q Yang, X Gong, RM Davison - Information Technology & …, 2023 - emerald.com
Purpose Crowdsourcing platforms have emerged as an innovative way to generate ideas
and solving problems. However, promoting sustained participation among crowdworkers is …

A hybrid attention and time series network for enterprise sales forecasting under digital management and edge computing

X Zhang, T Kim - Journal of Cloud Computing, 2023 - Springer
Enterprises have both new opportunities and new challenges as a result of the rapid
advancements in information technology that have accompanied the age of economic …

Examining the effects of cognitive load on information systems security policy compliance

D Ganye, K Smith - Internet Research, 2024 - emerald.com
Purpose Enforcing employee compliance with information systems security policies (ISSP) is
a herculean task for organizations as security breaches due to non-compliance continue to …

Barking up the wrong tree? Reconsidering policy compliance as a dependent variable within behavioral cybersecurity research

WA Cram, J D'Arcy - 2023 - scholarspace.manoa.hawaii.edu
A rich body of research examines the cybersecurity behavior of employees, with a particular
focus on explaining the reasons why employees comply with (or violate) organizational …

Understanding employee's emotional reactions to ISSP compliance: focus on frustration from security requirements

S Jeon, I Son, J Han - Behaviour & Information Technology, 2023 - Taylor & Francis
As the importance of information assets increases, employees are increasingly required to
comply with organisational policies for information security (InfoSec). Since security-related …