• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4624956)   Today's Articles (168)   Subscriber (49456)
For: Nasir A, Arshah RA, Hamid MRA, Fahmy S. An analysis on the dimensions of information security culture concept: A review. Journal of Information Security and Applications 2019. [DOI: 10.1016/j.jisa.2018.11.003] [Citation(s) in RCA: 12] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
Number Cited by Other Article(s)
1
Lee I. Analyzing Web Descriptions of Cybersecurity Breaches in the Healthcare Provider Sector: A Content Analytics Research Method. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103185] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/22/2023]
2
Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach. COMPUTERS IN HUMAN BEHAVIOR 2023. [DOI: 10.1016/j.chb.2023.107702] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/25/2023]
3
Information Security Behavior in Health Information Systems: A Review of Research Trends and Antecedent Factors. Healthcare (Basel) 2022;10:healthcare10122531. [PMID: 36554055 PMCID: PMC9777837 DOI: 10.3390/healthcare10122531] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/18/2022] [Revised: 12/09/2022] [Accepted: 12/12/2022] [Indexed: 12/23/2022]  Open
4
Khan NF, Yaqoob A, Khan MS, Ikram N. The Cybersecurity Behavioral Research: A Tertiary Study. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102826] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
5
Karlsson M, Karlsson F, Åström J, Denk T. The effect of perceived organizational culture on employees’ information security compliance. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-06-2021-0073] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
6
Owusu Kwateng K, Amanor C, Tetteh FK. Enterprise risk management and information technology security in the financial sector. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-11-2020-0185] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
7
Leite L, dos Santos DR, Almeida F. The impact of general data protection regulation on software engineering practices. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-03-2020-0043] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
8
Developing a Risk Analysis Strategy Framework for Impact Assessment in Information Security Management Systems: A Case Study in IT Consulting Industry. SUSTAINABILITY 2022. [DOI: 10.3390/su14031269] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/04/2022]
9
Uchendu B, Nurse JR, Bada M, Furnell S. Developing a cyber security culture: Current practices and future needs. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102387] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
10
Arbanas K, Spremic M, Zajdela Hrustek N. Holistic framework for evaluating and improving information security culture. ASLIB J INFORM MANAG 2021. [DOI: 10.1108/ajim-02-2021-0037] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
11
Astakhova LV, Medvedev IA. An Information Tool for Increasing the Resistance of Employees of an Organization to Social Engineering Attacks. SCIENTIFIC AND TECHNICAL INFORMATION PROCESSING 2021. [DOI: 10.3103/s0147688221010020] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
12
The Effect of Organizational Information Security Climate on Information Security Policy Compliance: The Mediating Effect of Social Bonding towards Healthcare Nurses. SUSTAINABILITY 2021. [DOI: 10.3390/su13052800] [Citation(s) in RCA: 16] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/10/2023]
13
Astakhova LV. Issues of the Culture of Information Security under the Conditions of the Digital Economy. SCIENTIFIC AND TECHNICAL INFORMATION PROCESSING 2020. [DOI: 10.3103/s0147688220010062] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA