JR Schoenherr - IEEE Transactions on Technology and …, 2022 - ieeexplore.ieee.org
The present study extends a cybersecurity questionnaire (CSEC) by including items that differentiate cyber hygiene behavior, self-disclosure vulnerability, intrusion vulnerability, and …
X Chen, CK Tyran - Journal of Computer Information Systems, 2023 - Taylor & Francis
Even though abundant research has been done on the factors that may impact employee information security policy (ISP) compliance intention, the results are mixed. To more fully …
M Gerdin - Information & Computer Security, 2024 - emerald.com
Purpose The purpose of this study is to further validate and extend the unified model of information security policy compliance (UMISPC) developed by. Design/methodology …
This study is looking at “the changed” world for employees that were lucky and could continue their work from places other than office since the Covid-19 pandemic outbreak …
Abstract The BLITT (Blended Learning International Train the Trainer) Project is focused on developing a training programme to equip teachers to become proficient in championing the …
As long as users are on the other end of the computer, threat actors will continue to try and trick them into disclosing sensitive information. Phishing is a continual threat to the security …
Employee noncompliance with information security policy makes a company vulnerable to attack by malicious actors. This quantitative non-experimental study is significant to …
S Kokolakis, A Tsohou - The Routledge Handbook of Privacy and Social … - taylorfrancis.com
Cybersecurity attack techniques are continuously evolving, creating a dynamic landscape of threats that organizations and individuals face when using online information systems and …
SAMMANFATTNING (MAX. 200 ORD): Previous research in information security research has pointed out the importance of aware employees, while practitioners have focused on …