Respite for SMEs: A systematic review of socio-technical cybersecurity metrics

M Van Haastrecht, B Yigit Ozkan, M Brinkhuis… - Applied sciences, 2021 - mdpi.com
Featured Application The results of this work will be incorporated in an application for SMEs
in Europe, which aims to improve cybersecurity awareness and resilience, as part of the EU …

Replication Crisis or Replication Reassurance: Results of the IS Replication Project.

AR Dennis, SA Brown, TM Wells, A Rai - MIS Quarterly, 2020 - search.ebscohost.com
EDITOR’S COMMENTS Page 1 EDITOR’S COMMENTS Replication Crisis or Replication
Reassurance: Results of the IS Replication Project By: Alan R. Dennis Co-Editor, AIS …

From play to profession: a serious game to raise awareness on digital forensics

S Friedl, T Reittinger, G Pernul - IFIP Annual Conference on Data and …, 2024 - Springer
With the increasing digitization and interconnectivity of organizations, the frequency of
cyberattacks is rising. These attacks have serious consequences for data security and …

Why do people hide knowledge in the online knowledge community? An integrated framework of protection motivation, self-determination, and social exchange …

Q Yang, YC Lee - Sustainability, 2021 - mdpi.com
Suppressing knowledge hiding is a prerequisite for achieving positive knowledge
interactions among people. Most previous studies concentrate on knowledge hiding in …

Employee Motivation in Organizational Cybersecurity: Matching Theory and Reality

T Reittinger, M Glas, S Aminzada, G Pernul - International Symposium on …, 2024 - Springer
Cyberattacks pose a persistent threat to organizations worldwide. These attacks often target
employees as entry points to organizational systems through tactics like phishing and …

Cracking the Code: A Comprehensive Analysis of Information Security Strategies Among Professionals

A Almuqrin, I Mutambik, JZ Zhang… - … of Organizational and …, 2024 - igi-global.com
With the expanding reach of the Internet of Things, information security threats are
increasing, including from the very professionals tasked with defending against these …

Exploring Privacy Concern Effect on Organizational BYOD Policies and Security Measures Compliancy

ZA Johnston - 2022 - search.proquest.com
Over a decade ago, mobile devices became a standard for communication, especially
amongst the digital natives. Digital natives, known as millennials, grew up and are …

A Qualitative Study on Baby Boomer Perceptions and Experiences in Internet Data Privacy While Navigating Social Networking and Ecommerce Websites

TN Thomas - 2024 - search.proquest.com
This study investigates how baby boomers perceive and describe the risks and threats of
internet data privacy surrounding eCommerce and social networking in the United States …

Intrinsic Security Motivators in the Federal Workforce: A Correlation Study

WS Duliere - 2023 - search.proquest.com
Employee noncompliance with security policy aggravates information security incidents
within federal agencies. Information security research has examined behavioral theories …

Open data: a replication study of user motivation in protecting information security using protection motivation theory and self-determination theory

N Yang, T Singh, A Johnston - AIS Transactions on Replication …, 2020 - aisel.aisnet.org
This paper provides data used to analyze the methodological replication of Menard et
al.(2017) by Yang et al.(2020). The replication paper studied organizational users' intentions …