• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4719626)   Today's Articles (1045)
For: Donalds C, Osei-bryson K. Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents. International Journal of Information Management 2020;51:102056. [DOI: 10.1016/j.ijinfomgt.2019.102056] [Citation(s) in RCA: 28] [Impact Index Per Article: 5.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
Number Cited by Other Article(s)
1
Almansoori A, Al-Emran M, Shaalan K. Exploring the Frontiers of Cybersecurity Behavior: A Systematic Review of Studies and Theories. APPLIED SCIENCES 2023;13:5700. [DOI: 10.3390/app13095700] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
2
Alsharida RA, Al-rimy BAS, Al-Emran M, Zainal A. A systematic review of multi perspectives on human cybersecurity behavior. TECHNOLOGY IN SOCIETY 2023;73:102258. [DOI: 10.1016/j.techsoc.2023.102258] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
3
Aebissa B, Dhillon G, Meshesha M. The Direct and Indirect effect of Organizational Justice on Employee Intention to Comply with Information Security Policy: The Case of Ethiopian banks. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103248] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 04/05/2023]
4
Yousuf H, Al-Emran M, Shaalan K. Evaluating Individuals’ Cybersecurity Behavior in Mobile Payment Contactless Technologies: Extending TPB with Cybersecurity Awareness. HCI FOR CYBERSECURITY, PRIVACY AND TRUST 2023:542-554. [DOI: 10.1007/978-3-031-35822-7_35] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
5
Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threats. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022. [DOI: 10.1016/j.jisa.2022.103378] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
6
Wong LW, Lee VH, Tan GWH, Ooi KB, Sohal A. The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2022. [DOI: 10.1016/j.ijinfomgt.2022.102520] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
7
McGowan A, Sittig S, Bourrie D, Benton R, Iyengar S. The Intersection of Persuasive System Design and Personalization in Mobile Health: Statistical Evaluation. JMIR Mhealth Uhealth 2022;10:e40576. [PMID: 36103226 PMCID: PMC9520383 DOI: 10.2196/40576] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/27/2022] [Revised: 08/04/2022] [Accepted: 08/10/2022] [Indexed: 11/13/2022]  Open
8
Yazdanmehr A, Li Y, Wang J. Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies. EUR J INFORM SYST 2022. [DOI: 10.1080/0960085x.2022.2099767] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/03/2022]
9
Lee CS, Kim D. Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2022. [DOI: 10.1080/08874417.2022.2031347] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
10
Protective behavior in ride-sharing through the lens of protection motivation theory and usage situation theory. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2021. [DOI: 10.1016/j.ijinfomgt.2021.102402] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
11
Karim NA, Kaur J, Khalib MN. Benefit vs Cost:Examining Factors of Intention to Comply Information Security Policy. 2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING (ICOCO) 2021. [DOI: 10.1109/icoco53166.2021.9673542] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
12
Daengsi T, Pornpongtechavanich P, Wuttidittachotti P. Cybersecurity Awareness Enhancement: A Study of the Effects of Age and Gender of Thai Employees Associated with Phishing Attacks. EDUCATION AND INFORMATION TECHNOLOGIES 2021;27:4729-4752. [PMID: 34803469 PMCID: PMC8591595 DOI: 10.1007/s10639-021-10806-7] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 02/19/2021] [Accepted: 11/08/2021] [Indexed: 06/13/2023]
13
Hu S, Hsu C, Zhou Z. The impact of SETA event attributes on employees’ security-related Intentions: An event system theory perspective. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102404] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
14
Nifakos S, Chandramouli K, Nikolaou CK, Papachristou P, Koch S, Panaousis E, Bonacina S. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. SENSORS 2021;21:s21155119. [PMID: 34372354 PMCID: PMC8348467 DOI: 10.3390/s21155119] [Citation(s) in RCA: 26] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/29/2021] [Revised: 07/15/2021] [Accepted: 07/16/2021] [Indexed: 01/05/2023]
15
Hu S, Hsu C, Zhou Z. Security Education, Training, and Awareness Programs: Literature Review. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2021. [DOI: 10.1080/08874417.2021.1913671] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
16
Liu C, Wang N, Liang H. Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2020. [DOI: 10.1016/j.ijinfomgt.2020.102152] [Citation(s) in RCA: 15] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
17
Barlette Y, Jaouen A, Baillette P. Bring Your Own Device (BYOD) as reversed IT adoption: Insights into managers' coping strategies. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2020;56:102212. [PMID: 32934432 PMCID: PMC7484736 DOI: 10.1016/j.ijinfomgt.2020.102212] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/28/2020] [Revised: 08/04/2020] [Accepted: 08/04/2020] [Indexed: 11/01/2022]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA