• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4698324)   Today's Articles (326)
For: Hu Q, Dinev T, Hart P, Cooke D. Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*. Decision Sciences 2012. [DOI: 10.1111/j.1540-5915.2012.00361.x] [Citation(s) in RCA: 260] [Impact Index Per Article: 20.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
Number Cited by Other Article(s)
1
Kraushaar J, Bohnet-Joschko S. The Role of the Organization in Promoting Information Security-Related Behavior Among Resident Physicians in Hospitals in Germany: Cross-Sectional Questionnaire Study. J Med Internet Res 2025;27:e46257. [PMID: 39773548 PMCID: PMC11751644 DOI: 10.2196/46257] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/03/2023] [Revised: 03/30/2024] [Accepted: 10/11/2024] [Indexed: 01/11/2025]  Open
2
Chang T, Wu Y, Deng X, Wang X, Yan Y. The impact of environmental stimuli on the psychological and behavioral compliance of international construction employees. Front Psychol 2024;15:1395400. [PMID: 38919802 PMCID: PMC11196848 DOI: 10.3389/fpsyg.2024.1395400] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/07/2024] [Accepted: 05/29/2024] [Indexed: 06/27/2024]  Open
3
Palanisamy R, Norman AA, Mat Kiah ML. Employees’ BYOD Security Policy Compliance in the Public Sector. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2023. [DOI: 10.1080/08874417.2023.2178038] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 03/06/2023]
4
Bansal G, Thatcher J, Schuetz SW. Where Authorities Fail and Experts Excel: Influencing Internet Users’ Compliance Intentions. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103164] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/05/2023]
5
Alraja MN, Butt UJ, Abbod M. Information security policies compliance in a global setting: An employee's perspective. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103208] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/31/2023]
6
Arfiansyah MR, Ushuluddin A, Affan M, Riyant WF. Intention as a determinant of Islamic work culture in Indonesia based on the modified theory of planned behavior. SOUTH AFRICAN JOURNAL OF HUMAN RESOURCE MANAGEMENT 2023. [DOI: 10.4102/sajhrm.v21i0.2022] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/16/2023]  Open
7
What are the trend and core knowledge of information security? A citation and co-citation analysis. INFORMATION & MANAGEMENT 2023. [DOI: 10.1016/j.im.2023.103774] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/17/2023]
8
COVID-19 pandemic-induced organisational cultural shifts and employee information security compliance behaviour: a South African case study. INFORMATION AND COMPUTER SECURITY 2023. [DOI: 10.1108/ics-09-2022-0152] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/19/2023]
9
Chen X, Tyran CK. A Framework for Analyzing and Improving ISP Compliance. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2023. [DOI: 10.1080/08874417.2022.2161024] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/19/2023]
10
Kraushaar J, Bohnet-Joschko S. Smartphone Use and Security Challenges in Hospitals: A Survey among Resident Physicians in Germany. INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH 2022;19:16546. [PMID: 36554426 PMCID: PMC9779689 DOI: 10.3390/ijerph192416546] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 10/21/2022] [Revised: 11/30/2022] [Accepted: 12/05/2022] [Indexed: 06/17/2023]
11
Ifinedo P. Exploring Personal and Environmental Factors that Can Reduce Nonmalicious Information Security Violations. INFORMATION SYSTEMS MANAGEMENT 2022. [DOI: 10.1080/10580530.2022.2131944] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
12
Gale M, Bongiovanni I, Slapnicar S. Governing cybersecurity from the boardroom: Challenges, drivers, and ways ahead. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102840] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/03/2022]
13
Lin C, Wittmer JL, Luo X(R. Cultivating proactive information security behavior and individual creativity: The role of human relations culture and IT use governance. INFORMATION & MANAGEMENT 2022. [DOI: 10.1016/j.im.2022.103650] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
14
Organizational and team culture as antecedents of protection motivation among IT employees. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102774] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
15
Ghasemaghaei M, Turel O. Why Do Data Analysts Take IT-Mediated Shortcuts? An Ego-Depletion Perspective. J MANAGE INFORM SYST 2022. [DOI: 10.1080/07421222.2022.2063558] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
16
AlGhamdi S, Win KT, Vlahu-Gjorgievska E. Employees' intentions toward complying with information security controls in Saudi Arabia's public organisations. GOVERNMENT INFORMATION QUARTERLY 2022. [DOI: 10.1016/j.giq.2022.101721] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
17
Kisekka V, Goel S. An Investigation of the Factors that Influence Job Performance During Extreme Events: The Role of Information Security Policies. INFORMATION SYSTEMS FRONTIERS : A JOURNAL OF RESEARCH AND INNOVATION 2022;25:1-20. [PMID: 35669336 PMCID: PMC9156359 DOI: 10.1007/s10796-022-10281-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Accepted: 04/21/2022] [Indexed: 06/15/2023]
18
Karlsson M, Karlsson F, Åström J, Denk T. The effect of perceived organizational culture on employees’ information security compliance. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-06-2021-0073] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
19
Nord J, Sargent CS, Koohang A, Marotta A. Predictors of Success in Information Security Policy Compliance. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2022. [DOI: 10.1080/08874417.2022.2067795] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
20
Li L, Xu L, He W. The effects of antecedents and mediating factors on cybersecurity protection behavior. COMPUTERS IN HUMAN BEHAVIOR REPORTS 2022. [DOI: 10.1016/j.chbr.2021.100165] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]  Open
21
Chen Y, Xia W, Cousins K. Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence. Comput Secur 2022. [DOI: 10.1016/j.cose.2021.102568] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
22
Hassandoust F, Subasinghage M, Johnston AC. A neo-institutional perspective on the establishment of information security knowledge sharing practices. INFORMATION & MANAGEMENT 2022. [DOI: 10.1016/j.im.2021.103574] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
23
Sela A, Rozenboim N, Ben-Gal HC. Smartphone use behavior and quality of life: What is the role of awareness? PLoS One 2022;17:e0260637. [PMID: 35275929 PMCID: PMC8916658 DOI: 10.1371/journal.pone.0260637] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/13/2021] [Accepted: 11/13/2021] [Indexed: 11/18/2022]  Open
24
Walser R, Cram WA, Bernroider EW, Wiener M. Control choices and enactments in IS development projects: Implications for legitimacy perceptions and compliance intentions. INFORMATION & MANAGEMENT 2021. [DOI: 10.1016/j.im.2021.103522] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
25
Ge Y, Lu L, Cui X, Chen Z, Qu W. How personal characteristics impact phishing susceptibility: The mediating role of mail processing. APPLIED ERGONOMICS 2021;97:103526. [PMID: 34246073 DOI: 10.1016/j.apergo.2021.103526] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/21/2021] [Revised: 06/29/2021] [Accepted: 06/30/2021] [Indexed: 06/13/2023]
26
Hwang I, Kim S, Rebman C. Impact of regulatory focus on security technostress and organizational outcomes: the moderating effect of security technostress inhibitors. INFORMATION TECHNOLOGY & PEOPLE 2021. [DOI: 10.1108/itp-05-2019-0239] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
27
Saban KA, Rau S, Wood CA. “SME executives’ perceptions and the information security preparedness model”. INFORMATION AND COMPUTER SECURITY 2021. [DOI: 10.1108/ics-01-2020-0014] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
28
Raddatz N, Coyne J, Menard P, Crossler RE. Becoming a blockchain user: understanding consumers’ benefits realisation to use blockchain-based applications. EUR J INFORM SYST 2021. [DOI: 10.1080/0960085x.2021.1944823] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
29
Khando K, Gao S, Islam SM, Salman A. Enhancing employees information security awareness in private and public organisations: A systematic literature review. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102267] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
30
Xu F, Hsu C, Luo X(R, Warkentin M. Reactions to Abusive Supervision: Neutralization and IS Misuse. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2021. [DOI: 10.1080/08874417.2021.1887776] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
31
Haislip J, Lim JH, Pinsker R. The Impact of Executives’ IT Expertise on Reported Data Security Breaches. INFORMATION SYSTEMS RESEARCH 2021. [DOI: 10.1287/isre.2020.0986] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/22/2022]
32
Onumo A, Ullah-Awan I, Cullen A. Assessing the Moderating Effect of Security Technologies on Employees Compliance with Cybersecurity Control Procedures. ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS 2021. [DOI: 10.1145/3424282] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
33
Davis J, Agrawal D, Guo X. Enhancing users’ security engagement through cultivating commitment: the role of psychological needs fulfilment. EUR J INFORM SYST 2021. [DOI: 10.1080/0960085x.2021.1927866] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
34
Dewies M, Schop-Etman A, Rohde KIM, Denktaş S. Nudging is Ineffective When Attitudes Are Unsupportive: An Example from a Natural Field Experiment. BASIC AND APPLIED SOCIAL PSYCHOLOGY 2021. [DOI: 10.1080/01973533.2021.1917412] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
35
Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance. APPLIED SCIENCES-BASEL 2021. [DOI: 10.3390/app11083383] [Citation(s) in RCA: 21] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
36
Jaeger L, Eckhardt A, Kroenung J. The role of deterrability for the effect of multi-level sanctions on information security policy compliance: Results of a multigroup analysis. INFORMATION & MANAGEMENT 2021. [DOI: 10.1016/j.im.2020.103318] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
37
Deep Prakash C, Majumdar A. Analyzing the role of national culture on content creation and user engagement on Twitter: The case of Indian Premier League cricket franchises. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2021. [DOI: 10.1016/j.ijinfomgt.2020.102268] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
38
Hughes-Lartey K, Li M, Botchey FE, Qin Z. Human factor, a critical weak point in the information security of an organization's Internet of things. Heliyon 2021;7:e06522. [PMID: 33768182 PMCID: PMC7980069 DOI: 10.1016/j.heliyon.2021.e06522] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/26/2020] [Revised: 08/09/2020] [Accepted: 03/11/2021] [Indexed: 11/26/2022]  Open
39
Liu C, Liang H, Wang N, Xue Y. Ensuring employees' information security policy compliance by carrot and stick: the moderating roles of organizational commitment and gender. INFORMATION TECHNOLOGY & PEOPLE 2021. [DOI: 10.1108/itp-09-2019-0452] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
40
Impact of organizational inertia on organizational agility: the role of IT ambidexterity. INFORMATION TECHNOLOGY & MANAGEMENT 2021. [DOI: 10.1007/s10799-021-00324-w] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
41
Understanding cybersecurity behavioral habits: Insights from situational support. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2021. [DOI: 10.1016/j.jisa.2020.102710] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
42
Lin C, Luo X(R. Toward a Unified View of Dynamic Information Security Behaviors. DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS 2021. [DOI: 10.1145/3447934.3447940] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
43
Ameen N, Tarhini A, Shah MH, Madichie N, Paul J, Choudrie J. Keeping customers' data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce. COMPUTERS IN HUMAN BEHAVIOR 2021. [DOI: 10.1016/j.chb.2020.106531] [Citation(s) in RCA: 25] [Impact Index Per Article: 6.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
44
Van Slyke C, Belanger F. Explaining the interactions of humans and artifacts in insider security behaviors: The mangle of practice perspective. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.102064] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
45
Georgiadou A, Mouzakitis S, Bounas K, Askounis D. A Cyber-Security Culture Framework for Assessing Organization Readiness. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2020. [DOI: 10.1080/08874417.2020.1845583] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
46
Palanisamy R, Norman AA, Kiah MLM. Compliance with bring your own device security policies in organizations: A systematic literature review. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.101998] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
47
Kumar S, Biswas B, Bhatia MS, Dora M. Antecedents for enhanced level of cyber-security in organisations. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT 2020. [DOI: 10.1108/jeim-06-2020-0240] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
48
Solomon G, Brown I. The influence of organisational culture and information security culture on employee compliance behaviour. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT 2020. [DOI: 10.1108/jeim-08-2019-0217] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
49
The “Right” recipes for security culture: a competing values model perspective. INFORMATION TECHNOLOGY & PEOPLE 2020. [DOI: 10.1108/itp-08-2019-0438] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
50
Barlette Y, Jaouen A, Baillette P. Bring Your Own Device (BYOD) as reversed IT adoption: Insights into managers' coping strategies. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2020;56:102212. [PMID: 32934432 PMCID: PMC7484736 DOI: 10.1016/j.ijinfomgt.2020.102212] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/28/2020] [Revised: 08/04/2020] [Accepted: 08/04/2020] [Indexed: 11/01/2022]
PrevPage 1 of 3 123Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA