[HTML][HTML] A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises

S Chaudhary, V Gkioulos, S Katsikas - Computer Science Review, 2023 - Elsevier
The proliferation of information and communication technologies in enterprises enables
them to develop new business models and enhance their operational and commercial …

Eyes wide open: The role of situational information security awareness for security‐related behaviour

L Jaeger, A Eckhardt - Information Systems Journal, 2021 - Wiley Online Library
Most contemporary studies on information security focus on largely static phenomena in
examining security‐related behaviours. We take a more dynamic, situational and …

Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach

B AlGhanboosi, S Ali, A Tarhini - Computers in Human Behavior, 2023 - Elsevier
Individuals and organizations rely on social media to share files and knowledge. On the
other hand, criminals find social media applications a rich place to attack through techniques …

A test of protection motivation theory in the information security literature: A meta-analytic structural equation modeling approach

J Mou, JF Cohen, A Bhattacherjee… - Journal of the Association …, 2022 - aisel.aisnet.org
Abstract Information security is one of the important domains of information systems
research today, with protection motivation theory (PMT) one of its most influential theoretical …

Security awareness: The first step in information security compliance behavior

I Hwang, R Wakefield, S Kim, T Kim - Journal of Computer …, 2021 - Taylor & Francis
In this study, we use the attentional phase of social learning theory to link workplace security-
related experiences and observations to employees' security awareness. The responses of …

Conceptual Inconsistencies in Variable Definitions and Measurement Items within ISP Non-/compliance Research: A systematic literature review

M Gerdin, Å Grönlund, E Kolkowska - Computers & Security, 2025 - Elsevier
The rich stream of research focusing on employee non-/compliance with information security
policies (ISPs) suffers from inconsistent results. Attempts to explain such inconsistencies …

Reconceptualizing cybersecurity awareness capability in the data-driven digital economy

S Akter, MR Uddin, S Sajib, WJT Lee, K Michael… - Annals of operations …, 2022 - Springer
Data breaches have become a formidable challenge for business operations in the twenty-
first century. The emergence of big data in the ever-growing digital economy has created the …

Information security awareness in a developing country context: insights from the government sector in Saudi Arabia

R AlMindeel, JT Martins - Information Technology & People, 2021 - emerald.com
Purpose The purpose of this paper is to increase understanding of employee information
security awareness in a government sector setting and illuminate the problems that public …

“I never thought about securing my machine learning systems”: A study of security and privacy awareness of machine learning practitioners

F Boenisch, V Battis, N Buchmann… - Proceedings of Mensch …, 2021 - dl.acm.org
Machine learning (ML) models have become increasingly important components of many
software systems. Therefore, ensuring their privacy and security is a crucial task. Current …

Information security ignorance: An exploration of the concept and its antecedents

AY Wu, B Hanus, B Xue, RV Mahto - Information & Management, 2023 - Elsevier
In this study, we propose and examine the concept of information security ignorance, which
is an individual's chosen state of remaining underinformed about information security …