Information security management needs more holistic approach: A literature review

ZA Soomro, MH Shah, J Ahmed - International journal of information …, 2016 - Elsevier
Abstract Information technology has dramatically increased online business opportunities;
however these opportunities have also created serious risks in relation to information …

Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

Seeing the forest and the trees

WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - JSTOR
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …

Toward a unified model of information security policy compliance

GD Moody, M Siponen, S Pahnila - MIS quarterly, 2018 - JSTOR
Information systems security (ISS) behavioral research has produced different models to
explain security policy compliance. This paper (1) reviews 11 theories that have served the …

Information security behavior and information security policy compliance: A systematic literature review for identifying the transformation process from noncompliance …

RF Ali, PDD Dominic, SEA Ali, M Rehman, A Sohail - Applied Sciences, 2021 - mdpi.com
A grave concern to an organization's information security is employees' behavior when they
do not value information security policy compliance (ISPC). Most ISPC studies evaluate …

Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness

B Bulgurcu, H Cavusoglu, I Benbasat - MIS quarterly, 2010 - JSTOR
Many organizations recognize that their employees, who are often considered the weakest
link in information security, can also be great assets in the effort to reduce risk related to …

Managing employee compliance with information security policies: The critical role of top management and organizational culture

Q Hu, T Dinev, P Hart, D Cooke - Decision Sciences, 2012 - Wiley Online Library
We develop an individual behavioral model that integrates the role of top management and
organizational culture into the theory of planned behavior in an attempt to better understand …

Information security awareness and behavior: a theory-based literature review

B Lebek, J Uffen, M Neumann, B Hohler… - Management …, 2014 - emerald.com
Purpose–This paper aims to provide an overview of theories used in the field of employees'
information systems (IS) security behavior over the past decade. Research gaps and …

Beyond deterrence: An expanded view of employee computer abuse

R Willison, M Warkentin - MIS quarterly, 2013 - JSTOR
Recent academic investigations of computer security policy violations have largely focused
on non-malicious noncompliance due to poor training, low employee motivation, weak …

Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions

CL Anderson, R Agarwal - MIS quarterly, 2010 - JSTOR
Although firms are expending substantial resources to develop technology and processes
that can help safeguard the security of their computing assets, increased attention is being …