• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4646951)   Today's Articles (3260)   Subscriber (50667)
For: Williams PA. In a ‘trusting’ environment, everyone is responsible for information security. ACTA ACUST UNITED AC 2008. [DOI: 10.1016/j.istr.2008.10.009] [Citation(s) in RCA: 17] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
Number Cited by Other Article(s)
1
Information Security Behavior in Health Information Systems: A Review of Research Trends and Antecedent Factors. Healthcare (Basel) 2022;10:healthcare10122531. [PMID: 36554055 PMCID: PMC9777837 DOI: 10.3390/healthcare10122531] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/18/2022] [Revised: 12/09/2022] [Accepted: 12/12/2022] [Indexed: 12/23/2022]  Open
2
Yazdanmehr A, Wang J. Can peers help reduce violations of information security policies? The role of peer monitoring. EUR J INFORM SYST 2021. [DOI: 10.1080/0960085x.2021.1980444] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
3
Yeng PK, Szekeres A, Yang B, Snekkenes EA. Mapping the Psychosocialcultural Aspects of Healthcare Professionals' Information Security Practices: Systematic Mapping Study. JMIR Hum Factors 2021;8:e17604. [PMID: 34106077 PMCID: PMC8235336 DOI: 10.2196/17604] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/24/2019] [Revised: 07/25/2020] [Accepted: 04/04/2021] [Indexed: 11/19/2022]  Open
4
Solomon G, Brown I. The influence of organisational culture and information security culture on employee compliance behaviour. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT 2020. [DOI: 10.1108/jeim-08-2019-0217] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
5
Loi M, Christen M, Kleine N, Weber K. Cybersecurity in health – disentangling value tensions. JOURNAL OF INFORMATION COMMUNICATION & ETHICS IN SOCIETY 2019. [DOI: 10.1108/jices-12-2018-0095] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
6
Towards a user-centric theory of value-driven information security compliance. INFORMATION TECHNOLOGY & PEOPLE 2018. [DOI: 10.1108/itp-08-2016-0194] [Citation(s) in RCA: 17] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
7
Dang-Pham D, Pittayachawan S, Bruno V. Applying network analysis to investigate interpersonal influence of information security behaviours in the workplace. INFORMATION & MANAGEMENT 2017. [DOI: 10.1016/j.im.2016.12.003] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
8
Humaidi N, Balakrishnan V. Indirect effect of management support on users' compliance behaviour towards information security policies. Health Inf Manag 2017;47:17-27. [PMID: 28537207 DOI: 10.1177/1833358317700255] [Citation(s) in RCA: 13] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
9
Karlsson F, Åström J, Karlsson M. Information security culture – state-of-the-art review between 2000 and 2013. INFORMATION AND COMPUTER SECURITY 2015. [DOI: 10.1108/ics-05-2014-0033] [Citation(s) in RCA: 43] [Impact Index Per Article: 4.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
10
Analysis of health professional security behaviors in a real clinical setting: an empirical study. Int J Med Inform 2015;84:454-67. [PMID: 25678101 DOI: 10.1016/j.ijmedinf.2015.01.010] [Citation(s) in RCA: 34] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/11/2014] [Revised: 01/13/2015] [Accepted: 01/14/2015] [Indexed: 11/24/2022]
11
Humaidi N, Balakrishnan V. Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness. ACTA ACUST UNITED AC 2015. [DOI: 10.7763/ijiet.2015.v5.522] [Citation(s) in RCA: 16] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/01/2022]
12
Information security awareness and behavior: a theory-based literature review. MANAGEMENT RESEARCH REVIEW 2014. [DOI: 10.1108/mrr-04-2013-0085] [Citation(s) in RCA: 100] [Impact Index Per Article: 10.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
13
Sánchez-Henarejos A, Fernández-Alemán JL, Toval A, Hernández-Hernández I, Sánchez-García AB, Carrillo de Gea JM. [A guide to good practice for information security in the handling of personal health data by health personnel in ambulatory care facilities]. Aten Primaria 2014;46:214-22. [PMID: 24582808 PMCID: PMC6985630 DOI: 10.1016/j.aprim.2013.10.008] [Citation(s) in RCA: 12] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/01/2013] [Revised: 09/04/2013] [Accepted: 10/19/2013] [Indexed: 11/21/2022]  Open
14
Jack C, Singh Y, Mars M. Pitfalls in computer housekeeping by doctors and nurses in KwaZulu-Natal: no malicious intent. BMC Med Ethics 2013;14 Suppl 1:S8. [PMID: 24565043 PMCID: PMC3878337 DOI: 10.1186/1472-6939-14-s1-s8] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/10/2022]  Open
15
Improving Information Security Behaviour in the Healthcare Context. ACTA ACUST UNITED AC 2013. [DOI: 10.1016/j.protcy.2013.12.122] [Citation(s) in RCA: 22] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
16
Cox J. Information systems user security: A structured model of the knowing–doing gap. COMPUTERS IN HUMAN BEHAVIOR 2012. [DOI: 10.1016/j.chb.2012.05.003] [Citation(s) in RCA: 76] [Impact Index Per Article: 6.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
17
Eminağaoğlu M, Uçar E, Eren Ş. The positive outcomes of information security awareness training in companies – A case study. ACTA ACUST UNITED AC 2009. [DOI: 10.1016/j.istr.2010.05.002] [Citation(s) in RCA: 53] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA