Information security policy compliance: Systematic literature review

RA Alias - Procedia Computer Science, 2019 - Elsevier
The growth of research in information technology security has enlarged in recent years.
Investigations in Information security besides discussing technical problems but also …

Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model

Y Chen, DF Galletta, PB Lowry, X Luo… - Information Systems …, 2021 - pubsonline.informs.org
Organizational information security (ISec) threats have exploded with advances in
globalization and technology. Thus, organizations are scrambling to find both technical and …

Bring Your Own Device Information Security Policy Compliance Framework: A Systematic Literature Review and Bibliometric Analysis (2017–2022)

OAAS AL-Azazi, AA Norman… - … Conference on Cyber …, 2022 - ieeexplore.ieee.org
The latest trend of using personal devices for work productivity is Bring Your Own Device
(BYOD). This rapid growth trend has excellent benefits for employees and organizations, but …

Escalation of commitment as an antecedent to noncompliance with information security policy

M Kajtazi, H Cavusoglu, I Benbasat… - Information & Computer …, 2018 - emerald.com
Purpose This study aims to identify antecedents to noncompliance behavior influenced by
decision contexts where investments in time, effort and resources are devoted to a task …

Too much information: Questioning security in a post-digital society

L Coles-Kemp, RB Jensen, CPR Heath - … of the 2020 CHI Conference on …, 2020 - dl.acm.org
Whilst user-and people-centered design are accepted routes for digital services, they are
less commonly used in the design of technologies that control access to data and the …

The influence of organizational values on employee attitude and information security behavior: the mediating role of psychological capital

CK Riemenschneider, LL Burney… - Information & Computer …, 2023 - emerald.com
Purpose With increased remote working, employers are concerned with employees'
commitment and compliance with security procedures. Through the lens of psychological …

[HTML][HTML] Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis

F Karlsson, E Kolkowska, J Petersson - Computers & Security, 2022 - Elsevier
When end users have to prioritize between different rationalities in organisations there is a
risk of non-compliance with information security policies. Thus, in order for information …

Perceptions of organizational culture and value conflicts in information security management

M Karlsson, T Denk, J Åström - Information & Computer Security, 2018 - emerald.com
Purpose The purpose of this paper is to investigate the occurrence of value conflicts
between information security and other organizational values among white-collar workers …

Smartphone use and security challenges in hospitals: a survey among resident physicians in Germany

J Kraushaar, S Bohnet-Joschko - International Journal of Environmental …, 2022 - mdpi.com
Although mobile devices support physicians in a variety of ways in everyday clinical
practice, the use of (personal) mobile devices poses potential risks for information security …

The boundedly rational employee: Security economics for behaviour intervention support in organizations

A Demjaha, S Parkin, D Pym - Journal of Computer Security, 2022 - content.iospress.com
Security policy-makers (influencers) in an organization set security policies that embody
intended behaviours for employees (as decision-makers) to follow. Decision-makers then …