Information security behavior and information security policy compliance: A systematic literature review for identifying the transformation process from noncompliance …

RF Ali, PDD Dominic, SEA Ali, M Rehman, A Sohail - Applied Sciences, 2021 - mdpi.com
A grave concern to an organization's information security is employees' behavior when they
do not value information security policy compliance (ISPC). Most ISPC studies evaluate …

Information security awareness and behavior: a theory-based literature review

B Lebek, J Uffen, M Neumann, B Hohler… - Management …, 2014 - emerald.com
Purpose–This paper aims to provide an overview of theories used in the field of employees'
information systems (IS) security behavior over the past decade. Research gaps and …

Cultivating security culture for information security success: A mixed-methods study based on anthropological perspective

GPS Tejay, ZA Mohammed - Information & Management, 2023 - Elsevier
The continuous information security failures in organizations have led focus toward
organizational culture. It is argued that the development of culture of information security …

Information security culture–state-of-the-art review between 2000 and 2013

F Karlsson, J Åström, M Karlsson - Information & Computer Security, 2015 - emerald.com
Purpose–The aim of this paper is to survey existing information security culture research to
scrutinise the kind of knowledge that has been developed and the way in which this …

Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale

K Hedström, F Karlsson, E Kolkowska - Information Management & …, 2013 - emerald.com
Purpose–Employees' compliance with information security policies is considered an
essential component of information security management. The research aims to illustrate the …

Investigating the influence of security, privacy, and legal concerns on employees' intention to use BYOD mobile devices

B Lebek, K Degirmenci, M Breitner - Proceedings of the …, 2013 - eprints.qut.edu.au
The concept of Bring-Your-Own-Device (BYOD) describes the trend of employees using
their private mobile devices to manage corporate data from anywhere at any time. BYOD …

[HTML][HTML] Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis

F Karlsson, E Kolkowska, J Petersson - Computers & Security, 2022 - Elsevier
When end users have to prioritize between different rationalities in organisations there is a
risk of non-compliance with information security policies. Thus, in order for information …

Regulating Information and Network Security: Review and Challenges

T Bouraffa, KL Hui - ACM Computing Surveys, 2025 - dl.acm.org
The rapid expansion of internet activities in daily life has elevated cyberattacks to a
significant global threat. As a result, protecting the networks and systems of industries …

An empirical study of security culture in open source software communities

SF Wen, M Kianpour, S Kowalski - Proceedings of the 2019 IEEE/ACM …, 2019 - dl.acm.org
Open source software (OSS) is a core part of virtually all software applications today. Due to
the rapidly growing impact of OSS on society and the economy, the security aspect has …

Exploring the relationship between student mobile information security awareness and behavioural intent

B Ngoqo, SV Flowerday - Information & Computer Security, 2015 - emerald.com
Purpose–The purpose of this paper was to analyse existing theories from the social
sciences to gain a better understanding of factors which contribute to student mobile phone …