Understanding cybersecurity frameworks and information security standards—a review and comprehensive overview

H Taherdoost - Electronics, 2022 - mdpi.com
Businesses are reliant on data to survive in the competitive market, and data is constantly in
danger of loss or theft. Loss of valuable data leads to negative consequences for both …

Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures

I Homoliak, F Toffalini, J Guarnizo, Y Elovici… - ACM Computing …, 2019 - dl.acm.org
Insider threats are one of today's most challenging cybersecurity issues that are not well
addressed by commonly employed security solutions. In this work, we propose structural …

Seeing the forest and the trees

WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - JSTOR
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …

Toward a unified model of information security policy compliance

GD Moody, M Siponen, S Pahnila - MIS quarterly, 2018 - JSTOR
Information systems security (ISS) behavioral research has produced different models to
explain security policy compliance. This paper (1) reviews 11 theories that have served the …

An insider data leakage detection using one-hot encoding, synthetic minority oversampling and machine learning techniques

T Al-Shehari, RA Alsowail - Entropy, 2021 - mdpi.com
Insider threats are malicious acts that can be carried out by an authorized employee within
an organization. Insider threats represent a major cybersecurity challenge for private and …

A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments

AS Sohal, R Sandhu, SK Sood, V Chang - Computers & Security, 2018 - Elsevier
Device security is one of the major challenges for successful implementation of Internet of
Things and fog computing environment in current IT space. Researchers and Information …

Future directions for behavioral information security research

RE Crossler, AC Johnston, PB Lowry, Q Hu… - computers & …, 2013 - Elsevier
Information Security (InfoSec) research is far reaching and includes many approaches to
deal with protecting and mitigating threats to the information assets and technical resources …

User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach

J D'Arcy, A Hovav, D Galletta - Information systems research, 2009 - pubsonline.informs.org
Intentional insider misuse of information systems resources (ie, IS misuse) represents a
significant threat to organizations. For example, industry statistics suggest that between 50 …

Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness

T Herath, HR Rao - Decision support systems, 2009 - Elsevier
Secure management of information systems is crucially important in information intensive
organizations. Although most organizations have long been using security technologies, it is …

A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings

J D'arcy, T Herath - European journal of information systems, 2011 - Taylor & Francis
Deterrence theory is one of the most widely applied theories in information systems (IS)
security research, particularly within behavioral IS security studies. Based on the rational …