Compliance with Bring Your Own Device security policies in organizations: A systematic literature review

R Palanisamy, AA Norman, MLM Kiah - Computers & Security, 2020 - Elsevier
Abstract The omnipresence of Bring Your Own Device (BYOD) in organizations and
employees' lives makes it a challenge to ensure adherence to security policy. In such …

Exploring the influence of direct and indirect factors on information security policy compliance: a systematic literature review

M Alassaf, A Alkhalifah - IEEE Access, 2021 - ieeexplore.ieee.org
Information systems security is considered one of the key issues concerning organizations'
management. Despite the massive investment that organizations make to safeguard their …

Information security policy compliance: leadership, trust, role values, and awareness

A Koohang, A Nowak, J Paliszkiewicz… - Journal of Computer …, 2020 - Taylor & Francis
The purpose of this study was to find out which one of the four selected predictor variables,
ie, leadership, trusting beliefs, role values, and information security policy awareness are …

An empirical investigation of trust in AI in a Chinese petrochemical enterprise based on institutional theory

J Li, Y Zhou, J Yao, X Liu - Scientific Reports, 2021 - nature.com
Despite its considerable potential in the manufacturing industry, the application of artificial
intelligence (AI) in the industry still faces the challenge of insufficient trust. Since AI is a black …

Building an awareness-centered information security policy compliance model

A Koohang, J Anderson, JH Nord… - … Management & Data …, 2020 - emerald.com
Purpose The purpose of this paper is to build an awareness-centered information security
policy (ISP) compliance model, asserting that awareness is the key to ISP compliance and …

Factors influencing employees' information security awareness in the telework environment

J Zhen, K Dong, Z Xie, L Chen - Electronics, 2022 - mdpi.com
This study aims to identify and examine factors influencing employees' information security
awareness (ISA) in the telework environment. Specifically, the authors identify and examine …

Exploring the critical success factors of information security management: a mixed-method approach

H Chen, Y Hai - Information & Computer Security, 2024 - emerald.com
Purpose Effective information security management (ISM) contributes to building a healthy
organizational digital ecology. However, few studies have built an analysis framework for …

[PDF][PDF] TIME WILL TELL: THE CASE FOR AN IDIOGRAPHIC APPROACH TO BEHAVIORAL CYBERSECURITY RESEARCH.

WA Cram, J D'Arcy, A Benlian - MIS Quarterly, 2024 - researchgate.net
Many of the theories used in behavioral cybersecurity research have been applied with a
nomothetic approach, which is characterized by cross-sectional data (eg, one-time surveys) …

Issues and trends in information security policy compliance

SH Bhaharin, U Asma'Mokhtar… - … on Research and …, 2019 - ieeexplore.ieee.org
In the era of Industry 4.0 (IR 4.0), information leakage has become a critical issue for
information security. The basic approach to addressing information leakage threats is to …

Reliability, validity, and strength of a unified model for information security policy compliance

A Koohang, JH Nord, ZV Sandoval… - Journal of Computer …, 2021 - Taylor & Francis
The purpose of this paper was to first examine the reliability, validity, and strength of a
unified model for information security policy compliance that includes eight constructs …