• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4719491)   Today's Articles (1037)
For: Narain Singh A, Gupta M, Ojha A. Identifying factors of “organizational information security management”. Journal of Enterprise Information Management 2014. [DOI: 10.1108/jeim-07-2013-0052] [Citation(s) in RCA: 33] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Number Cited by Other Article(s)
1
Yeoh W, Wang S, Popovič A, Chowdhury NH. A systematic synthesis of critical success factors for cybersecurity. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102724] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
2
Malatji M, Marnewick AL, Von Solms S. Cybersecurity capabilities for critical infrastructure resilience. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-06-2021-0091] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
3
The Effective Factors on Continuity of Corporate Information Security Management: Based on TOE Framework. INFORMATION 2021. [DOI: 10.3390/info12110446] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
4
The Impact of Organizational Practices on the Information Security Management Performance. INFORMATION 2021. [DOI: 10.3390/info12100398] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
5
Edu AS, Agoyi M, Agozie D. Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: FMEA and FTOPSIS analysis. PeerJ Comput Sci 2021;7:e658. [PMID: 34435101 PMCID: PMC8356653 DOI: 10.7717/peerj-cs.658] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/08/2021] [Accepted: 07/12/2021] [Indexed: 05/24/2023]
6
Orehek Š, Petrič G. A systematic review of scales for measuring information security culture. INFORMATION AND COMPUTER SECURITY 2021. [DOI: 10.1108/ics-12-2019-0140] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
7
Solomon G, Brown I. The influence of organisational culture and information security culture on employee compliance behaviour. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT 2020. [DOI: 10.1108/jeim-08-2019-0217] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
8
Tang J, Akram U, Shi W. Why people need privacy? The role of privacy fatigue in app users' intention to disclose privacy: based on personality traits. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT 2020. [DOI: 10.1108/jeim-03-2020-0088] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
9
Validation of a socio-technical management process for optimising cybersecurity practices. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.101846] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
10
Diesch R, Pfaff M, Krcmar H. A comprehensive model of information security factors for decision-makers. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.101747] [Citation(s) in RCA: 31] [Impact Index Per Article: 6.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
11
Smart City Development in Taiwan: From the Perspective of the Information Security Policy. SUSTAINABILITY 2020. [DOI: 10.3390/su12072916] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
12
Pérez-González D, Preciado ST, Solana-Gonzalez P. Organizational practices as antecedents of the information security management performance. INFORMATION TECHNOLOGY & PEOPLE 2019. [DOI: 10.1108/itp-06-2018-0261] [Citation(s) in RCA: 15] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
13
A conceptual model and empirical assessment of HR security risk management. INFORMATION AND COMPUTER SECURITY 2019. [DOI: 10.1108/ics-05-2018-0057] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
14
Nel F, Drevin L. Key elements of an information security culture in organisations. INFORMATION AND COMPUTER SECURITY 2019. [DOI: 10.1108/ics-12-2016-0095] [Citation(s) in RCA: 12] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
15
Soomro ZA, Ahmed J, Shah MH, Khoumbati K. Investigating identity fraud management practices in e-tail sector: a systematic review. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT 2019. [DOI: 10.1108/jeim-06-2018-0110] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
16
Eslamkhah M, Hosseini Seno SA. Identifying and Ranking Knowledge Management Tools and Techniques Affecting Organizational Information Security Improvement. KNOWLEDGE MANAGEMENT RESEARCH & PRACTICE 2019. [DOI: 10.1080/14778238.2019.1599495] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/26/2022]
17
Tu CZ, Yuan Y, Archer N, Connelly CE. Strategic value alignment for information security management: a critical success factor analysis. INFORMATION AND COMPUTER SECURITY 2018. [DOI: 10.1108/ics-06-2017-0042] [Citation(s) in RCA: 13] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
18
Biswas B, Mukhopadhyay A. G-RAM framework for software risk assessment and mitigation strategies in organisations. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT 2018. [DOI: 10.1108/jeim-05-2017-0069] [Citation(s) in RCA: 16] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
19
Srivastava AK, Sushil . Modeling organizational and information systems for effective strategy execution. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT 2015. [DOI: 10.1108/jeim-09-2013-0071] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA