• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4630704)   Today's Articles (2445)   Subscriber (49804)
For: Cram WA, Proudfoot JG, D’Arcy J. Organizational information security policies: a review and research framework. EUR J INFORM SYST 2018. [DOI: 10.1057/s41303-017-0059-9] [Citation(s) in RCA: 80] [Impact Index Per Article: 13.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
Number Cited by Other Article(s)
1
Palanisamy R, Norman AA, Mat Kiah ML. Employees’ BYOD Security Policy Compliance in the Public Sector. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2023. [DOI: 10.1080/08874417.2023.2178038] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 03/06/2023]
2
Anderson C, Baskerville R, Kaul M. Managing compliance with privacy regulations through translation guardrails: A health information exchange case study. INFORMATION AND ORGANIZATION 2023. [DOI: 10.1016/j.infoandorg.2023.100455] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/16/2023]
3
What are the trend and core knowledge of information security? A citation and co-citation analysis. INFORMATION & MANAGEMENT 2023. [DOI: 10.1016/j.im.2023.103774] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/17/2023]
4
COVID-19 pandemic-induced organisational cultural shifts and employee information security compliance behaviour: a South African case study. INFORMATION AND COMPUTER SECURITY 2023. [DOI: 10.1108/ics-09-2022-0152] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/19/2023]
5
Chen X, Tyran CK. A Framework for Analyzing and Improving ISP Compliance. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2023. [DOI: 10.1080/08874417.2022.2161024] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/19/2023]
6
Wu AY, Hanus B, Xue B, Mahto RV. Information Security Ignorance: An Exploration of the Concept and Its Antecedents. INFORMATION & MANAGEMENT 2023. [DOI: 10.1016/j.im.2023.103753] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/13/2023]
7
Huang R, Liang N. The influence of familiarity with Information Technology on the effects of deterrence. CURRENT PSYCHOLOGY 2022. [DOI: 10.1007/s12144-022-03857-7] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
8
Lin C, Wittmer JL, Luo X(R. Cultivating proactive information security behavior and individual creativity: The role of human relations culture and IT use governance. INFORMATION & MANAGEMENT 2022. [DOI: 10.1016/j.im.2022.103650] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
9
Ghahramani F, Yazdanmehr A, Chen D, Wang J. Continuous improvement of information security management: an organisational learning perspective. EUR J INFORM SYST 2022. [DOI: 10.1080/0960085x.2022.2096491] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/03/2022]
10
Khan NF, Yaqoob A, Khan MS, Ikram N. The Cybersecurity Behavioral Research: A Tertiary Study. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102826] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
11
The influence of inputs in the information security policy development: an institutional perspective. TRANSFORMING GOVERNMENT- PEOPLE PROCESS AND POLICY 2022. [DOI: 10.1108/tg-03-2022-0030] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
12
AlGhamdi S, Win KT, Vlahu-Gjorgievska E. Employees' intentions toward complying with information security controls in Saudi Arabia's public organisations. GOVERNMENT INFORMATION QUARTERLY 2022. [DOI: 10.1016/j.giq.2022.101721] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
13
Chen L, Xie Z, Zhen J, Dong K. The Impact of Challenge Information Security Stress on Information Security Policy Compliance: The Mediating Roles of Emotions. Psychol Res Behav Manag 2022;15:1177-1191. [PMID: 35586699 PMCID: PMC9109886 DOI: 10.2147/prbm.s359277] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/26/2022] [Accepted: 04/23/2022] [Indexed: 11/23/2022]  Open
14
Goel L, Zhang JZ, Williamson S. IT assimilation: construct, measurement, and implications in cybersecurity. ENTERP INF SYST-UK 2022. [DOI: 10.1080/17517575.2022.2052187] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
15
Karlsson F, Kolkowska E, Petersson J. Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis. Comput Secur 2022. [DOI: 10.1016/j.cose.2021.102578] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/03/2022]
16
Chen Y, Xia W, Cousins K. Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence. Comput Secur 2022. [DOI: 10.1016/j.cose.2021.102568] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
17
Walser R, Cram WA, Bernroider EW, Wiener M. Control choices and enactments in IS development projects: Implications for legitimacy perceptions and compliance intentions. INFORMATION & MANAGEMENT 2021. [DOI: 10.1016/j.im.2021.103522] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
18
Donalds C, Barclay C. Beyond technical measures: a value-focused thinking appraisal of strategic drivers in improving information security policy compliance. EUR J INFORM SYST 2021. [DOI: 10.1080/0960085x.2021.1978344] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
19
Chen Y, Galletta DF, Lowry PB, Luo X(R, Moody GD, Willison R. Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model. INFORMATION SYSTEMS RESEARCH 2021. [DOI: 10.1287/isre.2021.1014] [Citation(s) in RCA: 14] [Impact Index Per Article: 4.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
20
Ogbanufe O. Enhancing End-User Roles in Information Security: Exploring the Setting, Situation, and Identity. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102340] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
21
Nudging users towards online safety using gamified environments. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102270] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
22
Using alternate reality games to find a needle in a haystack: An approach for testing insider threat detection methods. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102314] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
23
Davis J, Agrawal D, Guo X. Enhancing users’ security engagement through cultivating commitment: the role of psychological needs fulfilment. EUR J INFORM SYST 2021. [DOI: 10.1080/0960085x.2021.1927866] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
24
Trang S, Nastjuk I. Examining the role of stress and information security policy design in information security compliance behaviour: An experimental study of in-task behaviour. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102222] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
25
Cyberbullying on social networking sites: A literature review and future research directions. INFORMATION & MANAGEMENT 2021. [DOI: 10.1016/j.im.2020.103411] [Citation(s) in RCA: 27] [Impact Index Per Article: 9.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
26
Ameen N, Tarhini A, Shah MH, Madichie N, Paul J, Choudrie J. Keeping customers' data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce. COMPUTERS IN HUMAN BEHAVIOR 2021. [DOI: 10.1016/j.chb.2020.106531] [Citation(s) in RCA: 25] [Impact Index Per Article: 8.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
27
Cram WA, Proudfoot JG, D'Arcy J. When enough is enough: Investigating the antecedents and consequences of information security fatigue. INFORMATION SYSTEMS JOURNAL 2020. [DOI: 10.1111/isj.12319] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
28
Posey C, Folger R. An exploratory examination of organizational insiders’ descriptive and normative perceptions of cyber-relevant rights and responsibilities. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.102038] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
29
Rostami E, Karlsson F, Gao S. Requirements for computerized tools to design information security policies. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.102063] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
30
Sarkar S, Vance A, Ramesh B, Demestihas M, Wu DT. The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context. INFORMATION SYSTEMS RESEARCH 2020. [DOI: 10.1287/isre.2020.0941] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
31
Palanisamy R, Norman AA, Kiah MLM. Compliance with bring your own device security policies in organizations: A systematic literature review. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.101998] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
32
Kumar S, Biswas B, Bhatia MS, Dora M. Antecedents for enhanced level of cyber-security in organisations. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT 2020. [DOI: 10.1108/jeim-06-2020-0240] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
33
Solomon G, Brown I. The influence of organisational culture and information security culture on employee compliance behaviour. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT 2020. [DOI: 10.1108/jeim-08-2019-0217] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
34
Liu C, Wang N, Liang H. Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2020. [DOI: 10.1016/j.ijinfomgt.2020.102152] [Citation(s) in RCA: 15] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
35
Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures. INFORMATION & MANAGEMENT 2020. [DOI: 10.1016/j.im.2019.103212] [Citation(s) in RCA: 21] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
36
Herath TC, Herath HSB, D'Arcy J. Organizational Adoption of Information Security Solutions. DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS 2020. [DOI: 10.1145/3400043.3400046] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
37
Moeini M, Simeonova B, Galliers RD, Wilson A. Theory borrowing in IT-rich contexts: Lessons from IS strategy research. JOURNAL OF INFORMATION TECHNOLOGY 2020. [DOI: 10.1177/0268396220912745] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
38
Smart City Development in Taiwan: From the Perspective of the Information Security Policy. SUSTAINABILITY 2020. [DOI: 10.3390/su12072916] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
39
Information system security policy noncompliance: the role of situation-specific ethical orientation. INFORMATION TECHNOLOGY & PEOPLE 2020. [DOI: 10.1108/itp-03-2019-0109] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
40
Yazdanmehr A, Wang J, Yang Z. Peers matter: The moderating role of social influence on information security policy compliance. INFORMATION SYSTEMS JOURNAL 2020. [DOI: 10.1111/isj.12271] [Citation(s) in RCA: 24] [Impact Index Per Article: 6.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
41
Stakeholder perceptions of information security policy: Analyzing personal constructs. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2020. [DOI: 10.1016/j.ijinfomgt.2019.04.011] [Citation(s) in RCA: 19] [Impact Index Per Article: 4.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
42
Schinagl S, Shahim A. What do we know about information security governance? INFORMATION AND COMPUTER SECURITY 2020. [DOI: 10.1108/ics-02-2019-0033] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
43
Paananen H, Lapke M, Siponen M. State of the art in information security policy development. Comput Secur 2020. [DOI: 10.1016/j.cose.2019.101608] [Citation(s) in RCA: 20] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
44
Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization. INFORMATION & MANAGEMENT 2019. [DOI: 10.1016/j.im.2019.02.006] [Citation(s) in RCA: 25] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
45
Pérez-González D, Preciado ST, Solana-Gonzalez P. Organizational practices as antecedents of the information security management performance. INFORMATION TECHNOLOGY & PEOPLE 2019. [DOI: 10.1108/itp-06-2018-0261] [Citation(s) in RCA: 15] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
46
Gwebu KL, Wang J, Hu MY. Information security policy noncompliance: An integrative social influence model. INFORMATION SYSTEMS JOURNAL 2019. [DOI: 10.1111/isj.12257] [Citation(s) in RCA: 15] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
47
Connolly LY, Lang M, Wall DS. Information Security Behavior: A Cross-Cultural Comparison of Irish and US Employees. INFORMATION SYSTEMS MANAGEMENT 2019. [DOI: 10.1080/10580530.2019.1651113] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/26/2022]
48
Niemimaa M, Niemimaa E. Abductive innovations in information security policy development: an ethnographic study. EUR J INFORM SYST 2019. [DOI: 10.1080/0960085x.2019.1624141] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/26/2022]
49
Kessler SR, Pindek S, Kleinman G, Andel SA, Spector PE. Information security climate and the assessment of information security risk among healthcare employees. Health Informatics J 2019;26:461-473. [PMID: 30866704 DOI: 10.1177/1460458219832048] [Citation(s) in RCA: 26] [Impact Index Per Article: 5.2] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
50
Sustainable Implementation of Access Control. SUSTAINABILITY 2018. [DOI: 10.3390/su10061808] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
PrevPage 1 of 2 12Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA