Institutional governance and protection motivation: Theoretical insights into shaping employees' security compliance behavior in higher education institutions in the …

S Hina, DDDP Selvam, PB Lowry - Computers & Security, 2019 - Elsevier
Higher education institutions (HEIs) are progressively computerized to deal with substantial
academic and operational information. With the increase in enriched information systems …

The behavioral roots of information systems security: Exploring key factors related to unethical IT use

S Chatterjee, S Sarker, JS Valacich - Journal of Management …, 2015 - Taylor & Francis
Unethical information technology (IT) use, related to activities such as hacking, software
piracy, phishing, and spoofing, has become a major security concern for individuals …

Where are the higher education institutions from knowledge protection: A systematic review

A Alghail, M Abbas, L Yao - VINE Journal of Information and …, 2023 - emerald.com
Purpose Knowledge protection (KP) is one of the main knowledge management (KM)
processes that aim to protect the organization's knowledge from any inside and outside force …

Taking risks with cybersecurity: Using knowledge and personal characteristics to predict self-reported cybersecurity behaviors

SM Kennison, E Chan-Tin - Frontiers in Psychology, 2020 - frontiersin.org
Individuals' use of insecure cybersecurity behaviors, including the use of weak passwords, is
a leading contributor to cybersecurity breaches. While training individuals on best practices …

Taking stock of organisations' protection of privacy: Categorising and assessing threats to personally identifiable information in the USA

C Posey, U Raja, RE Crossler… - European Journal of …, 2017 - Taylor & Francis
Many organisations create, store, or purchase information that links individuals' identities to
other data. Termed personally identifiable information (PII), this information has become the …

A dimension-based information security culture model and its relationship with employees' security behavior: A case study in Malaysian higher educational institutions

A Nasir, R Abdullah Arshah… - … Security Journal: A …, 2019 - Taylor & Francis
Despite strong recommendations by scholars to establish Information Security Culture (ISC),
the lack of ISC guidelines persists, particularly in aspects that could effectively improve …

Understanding data breach: A visualization aspect

L Liu, M Han, Y Wang, Y Zhou - … , WASA 2018, Tianjin, China, June 20-22 …, 2018 - Springer
Data breaches happen daily, in too many places, result in data loss including personal,
health, financial information that are crucial, sensitive, and private. The cost of the data …

Threat and coping appraisals on information security awareness training effectiveness: A quasi-experimental study

ST Hammond - 2019 - search.proquest.com
Abstract Information security awareness training plays a crucial role for organizations in the
protection of assets. Implementing adequate training entails communicating both the …

Security culture and security awareness as the basic factors for security effectiveness in health information systems

AB Shahri, Z Ismail, NZA Rahim - Sains Humanika, 2013 - sainshumanika.utm.my
The use of Information and Communications Technology (ICT) in healthcare domains
contributes to an increased complexity of the problems related to the security of Health …

[PDF][PDF] Development of a diagnostic instrument and privacy model for student personal information privacy perceptions at a Zimbabwean university

K Maguraushe - 2021 - core.ac.uk
Orientation: The safety of any natural being with respect to the processing of their personal
information is an essential human right as specified in the Zimbabwe Data Protection Act …