[HTML][HTML] A systematic analysis of failures in protecting personal health data: a scoping review

J Pool, S Akhlaghpour, F Fatehi… - International Journal of …, 2024 - Elsevier
Personal health data breaches pose significant challenges to healthcare providers and
clients. This study systematically analyzes 5470 records and reviews 120 articles on this …

Information security behavior and information security policy compliance: A systematic literature review for identifying the transformation process from noncompliance …

RF Ali, PDD Dominic, SEA Ali, M Rehman, A Sohail - Applied Sciences, 2021 - mdpi.com
A grave concern to an organization's information security is employees' behavior when they
do not value information security policy compliance (ISPC). Most ISPC studies evaluate …

[HTML][HTML] Seeing the forest and the trees: a meta-analysis of the antecedents to information security policy compliance

WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - dl.acm.org
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …

The acceptance of chatbots in an enterprise context–A survey study

F Brachten, T Kissmer, S Stieglitz - International Journal of Information …, 2021 - Elsevier
While Interactive systems such as Chatbots, are well known in personal environments with
technologies like “Apple's Siri” or the “Google's Assistant”, the acceptance of said …

Evaluating the cyber security readiness of organizations and its influence on performance

S Hasan, M Ali, S Kurnia, R Thurasamy - Journal of Information Security …, 2021 - Elsevier
The acceleration of cyber-attacks in recent years has negatively impacted the overall
performance of organizations around the world. Organizations face the challenge of …

[PDF][PDF] Blockchain for the IoT: privacy-preserving protection of sensor data

M Chanson, A Bogner, D Bilgeri… - Journal of the …, 2019 - research-collection.ethz.ch
A constantly growing pool of smart, connected Internet of Things (IoT) devices poses
completely new challenges for business regarding security and privacy. In fact, the …

Information systems security research agenda: Exploring the gap between research and practice

G Dhillon, K Smith, I Dissanayaka - The Journal of Strategic Information …, 2021 - Elsevier
This paper undertakes a systematic review of the Information Systems Security literature.
The literature review consists of three parts: First, we perform topic modeling of major …

Keeping customers' data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce

N Ameen, A Tarhini, MH Shah, N Madichie… - Computers in Human …, 2021 - Elsevier
Employees are increasingly relying on mobile devices. In international organizations, more
employees are using their personal smartphones for work purposes. Meanwhile, the number …

Developing a cyber security culture: Current practices and future needs

B Uchendu, JRC Nurse, M Bada, S Furnell - Computers & Security, 2021 - Elsevier
While the creation of a strong security culture has been researched and discussed for
decades, it continues to elude many businesses. Part of the challenge faced is distilling …

There's No place like home: Understanding users' intentions toward securing internet-of-things (IoT) smart home networks

SJ Philip, TJ Luu, T Carte - Computers in Human Behavior, 2023 - Elsevier
Modern households are increasingly becoming digitized as they contain numerous Internet-
connected networked devices throughout the home. However, this growth in the adoption of …