Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

[HTML][HTML] Information security behavior and information security policy compliance: A systematic literature review for identifying the transformation process from …

RF Ali, PDD Dominic, SEA Ali, M Rehman, A Sohail - Applied Sciences, 2021 - mdpi.com
A grave concern to an organization's information security is employees' behavior when they
do not value information security policy compliance (ISPC). Most ISPC studies evaluate …

The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities

LW Wong, VH Lee, GWH Tan, KB Ooi… - International Journal of …, 2022 - Elsevier
This paper investigates the role of general cybersecurity and cybersecurity policy awareness
in enhancing supply chain cyber resilience reactive capabilities. Theorizing from the …

Toward a unified model of information security policy compliance

GD Moody, M Siponen, S Pahnila - MIS quarterly, 2018 - JSTOR
Information systems security (ISS) behavioral research has produced different models to
explain security policy compliance. This paper (1) reviews 11 theories that have served the …

[HTML][HTML] Seeing the forest and the trees: a meta-analysis of the antecedents to information security policy compliance

WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - dl.acm.org
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …

Does government social media promote users' information security behavior towards COVID-19 scams? Cultivation effects and protective motivations

Z Tang, AS Miller, Z Zhou, M Warkentin - Government Information Quarterly, 2021 - Elsevier
Cybercriminals are taking advantage of the COVID-19 outbreak and offering COVID-19-
related scams to unsuspecting people. Currently, there is a lack of studies that focus on …

Health information privacy concerns, antecedents, and information disclosure intention in online health communities

X Zhang, S Liu, X Chen, L Wang, B Gao… - Information & Management, 2018 - Elsevier
This study explores the antecedents and consequences of health information privacy
concerns in online health communities by integrating the dual calculus and protection …

Using design-science based gamification to improve organizational security training and compliance

M Silic, PB Lowry - Journal of management information systems, 2020 - Taylor & Francis
We conducted a design-science research project to improve an organization's compound
problems of (1) unsuccessful employee phishing prevention and (2) poorly received internal …

User motivations in protecting information security: Protection motivation theory versus self-determination theory

P Menard, GJ Bott, RE Crossler - Journal of Management …, 2017 - Taylor & Francis
Managers desiring to protect information systems must understand how to most effectively
motivate users to engage in secure behaviors. Information security researchers have …

What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors

SR Boss, DF Galletta, PB Lowry, GD Moody, P Polak - MIS quarterly, 2015 - JSTOR
Because violations of information security (ISec) and privacy have become ubiquitous in
both personal and work environments, academic attention to ISec and privacy has taken on …