B Lebek, J Uffen, M Neumann, B Hohler… - Management …, 2014 - emerald.com
Purpose–This paper aims to provide an overview of theories used in the field of employees' information systems (IS) security behavior over the past decade. Research gaps and …
The continuous information security failures in organizations have led focus toward organizational culture. It is argued that the development of culture of information security …
Purpose–The aim of this paper is to survey existing information security culture research to scrutinise the kind of knowledge that has been developed and the way in which this …
Purpose–Employees' compliance with information security policies is considered an essential component of information security management. The research aims to illustrate the …
The concept of Bring-Your-Own-Device (BYOD) describes the trend of employees using their private mobile devices to manage corporate data from anywhere at any time. BYOD …
F Karlsson, E Kolkowska, J Petersson - Computers & Security, 2022 - Elsevier
When end users have to prioritize between different rationalities in organisations there is a risk of non-compliance with information security policies. Thus, in order for information …
The rapid expansion of internet activities in daily life has elevated cyberattacks to a significant global threat. As a result, protecting the networks and systems of industries …
Open source software (OSS) is a core part of virtually all software applications today. Due to the rapidly growing impact of OSS on society and the economy, the security aspect has …
Purpose–The purpose of this paper was to analyse existing theories from the social sciences to gain a better understanding of factors which contribute to student mobile phone …