Information systems security research agenda: Exploring the gap between research and practice

G Dhillon, K Smith, I Dissanayaka - The Journal of Strategic Information …, 2021 - Elsevier
This paper undertakes a systematic review of the Information Systems Security literature.
The literature review consists of three parts: First, we perform topic modeling of major …

State of the art in information security policy development

H Paananen, M Lapke, M Siponen - Computers & Security, 2020 - Elsevier
Despite the prevalence of research that exists under the label of “information security
policies”(ISPs), there is no consensus on what an ISP means or how ISPs should be …

Managing compliance with privacy regulations through translation guardrails: A health information exchange case study

C Anderson, R Baskerville, M Kaul - Information and Organization, 2023 - Elsevier
Abstract Information privacy is increasingly important in our digitally connected world,
particularly in healthcare, and privacy regulations are ramping up to promote appropriate …

It is not my job: exploring the disconnect between corporate security policies and actual security practices in SMEs

M Sadok, S Alter, P Bednar - Information & Computer Security, 2020 - emerald.com
Purpose This paper aims to present empirical results exemplifying challenges related to
information security faced by small and medium enterprises (SMEs). It uses guidelines …

[PDF][PDF] The concept of cybersecurity culture

K Reegård, C Blackett, V Katta - 29th European Safety and …, 2019 - researchgate.net
Due to a growing understanding that cybersecurity needs to be addressed also through
organizational measures and not by technical measures alone, cybersecurity culture is …

[HTML][HTML] Software compliance requirements, factors, and policies: A systematic literature review

M Mubarkoot, J Altmann, M Rasti-Barzoki, B Egger… - Computers & …, 2023 - Elsevier
Background Recent statistics reveal that 56% of software attacks are caused by insider
negligence and 26% are caused by malicious insiders. They also show that 67% of …

IT Risk Management: Towards a System for Enhancing Objectivity in Asset Valuation that Engenders a Security Culture

B Metin, S Duran, E Telli, M Mutlutürk, M Wynn - Information, 2024 - mdpi.com
In today's technology-centric business environment, where organizations encounter
numerous cyber threats, effective IT risk management is crucial. An objective risk …

[HTML][HTML] Requirements for computerized tools to design information security policies

E Rostami, F Karlsson, S Gao - computers & security, 2020 - Elsevier
Abstract Information security is a hot topic nowadays, and while top-class technology exists
to safeguard information assets, organizations cannot rely on technical controls alone …

Policy components–a conceptual model for modularizing and tailoring of information security policies

E Rostami, F Karlsson, S Gao - Information & Computer Security, 2023 - emerald.com
Policy components – a conceptual model for modularizing and tailoring of information security
policies | Emerald Insight Books and journals Case studies Expert Briefings Open Access …

Financial information security behavior in online banking

J Iqbal, SH Soroya, K Mahmood - Information Development, 2023 - journals.sagepub.com
The ubiquitous use of information technology in modern life leads to many problems of
financial information security. Such security issues could be due to users' insecure …