4.5 Review

Enhancing employees information security awareness in private and public organisations: A systematic literature review

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

More than the individual: Examining the relationship between culture and Information Security Awareness

Ashleigh Wiley et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Information Systems

Exploring the role of work identity and work locus of control in information security awareness

Lee Hadlington et al.

COMPUTERS & SECURITY (2019)

Article Regional & Urban Planning

Raising Information Security Awareness in the Field of Urban and Regional Planning

Margit Christa Scholl

INTERNATIONAL JOURNAL OF E-PLANNING RESEARCH (2019)

Article Information Science & Library Science

Impact of employees' demographic characteristics on the awareness and compliance of information security policy in organizations

Hui Na Chua et al.

TELEMATICS AND INFORMATICS (2018)

Article Computer Science, Information Systems

User Participation in Information Systems Security Risk Management

Spears et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations

Siponen et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study

Puhakainen et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Persona-centred information security awareness

Duncan Ki-Aries et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Information Systems

Shaping intention to resist social engineering through transformational leadership, information security culture and awareness

Waldo Rocha Flores et al.

COMPUTERS & SECURITY (2016)

Review Environmental Sciences

Guidance on assessing the methodological and reporting quality of toxicologically relevant studies: A scoping review

Gbeminiyi O. Samuel et al.

ENVIRONMENT INTERNATIONAL (2016)

Article Computer Science, Information Systems

Dispositional and situational factors: influences on information security policy violations

Allen C. Johnston et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2016)

Article Information Science & Library Science

User awareness and tolerance of privacy abuse on mobile Internet: An exploratory study

Cormac Callanan et al.

TELEMATICS AND INFORMATICS (2016)

Article Computer Science, Information Systems

Assessing information security attitudes: a comparison of two studies

Malcolm Pattinson et al.

INFORMATION AND COMPUTER SECURITY (2016)

Article Computer Science, Information Systems

Managing the introduction of information security awareness programmes in organisations

Aggeliki Tsohou et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2015)

Article Computer Science, Information Systems

A study on strengthening security awareness programs based on an RFID access control system for inside information leakage prevention

Kyong-Ho Choi et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2015)

Proceedings Paper Computer Science, Information Systems

Information Security Awareness at the Knowledge-Based Institution: Its Antecedents and Measures

Abdul Rahman Ahlan et al.

THIRD INFORMATION SYSTEMS INTERNATIONAL CONFERENCE 2015 (2015)

Article Computer Science, Cybernetics

User preference of cyber security awareness delivery methods

Jemal Abawajy

BEHAVIOUR & INFORMATION TECHNOLOGY (2014)

Article Computer Science, Cybernetics

Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users

James Imgraben et al.

BEHAVIOUR & INFORMATION TECHNOLOGY (2014)

Article Computer Science, Information Systems

An exploratory investigation of message-person congruence in information security awareness campaigns

Mitchell Kajzer et al.

COMPUTERS & SECURITY (2014)

Article Computer Science, Information Systems

Smartphone information security awareness: A victim of operational pressures

Sean Allam et al.

COMPUTERS & SECURITY (2014)

Article Computer Science, Information Systems

Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)

Kathryn Parsons et al.

COMPUTERS & SECURITY (2014)

Article Computer Science, Information Systems

Engaging Remote Employees: The Moderating Role of Remote Status in Determining Employee Information Security Policy Awareness

Allen C. Johnston et al.

JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING (2013)

Article Engineering, Electrical & Electronic

IGNORANCE TO AWARENESS: TOWARDS AN INFORMATION SECURITY AWARENESS PROCESS

T. Gundu et al.

SAIEE AFRICA RESEARCH JOURNAL (2013)

Article Information Science & Library Science

Analyzing trajectories of information security awareness

Aggeliki Tsohou et al.

INFORMATION TECHNOLOGY & PEOPLE (2012)

Article Management

Equity-Based Incentives and Supply Chain Buy-Back Contracts

Tinglong Dai et al.

DECISION SCIENCES (2012)

Article Information Science & Library Science

Information security policies in the UK healthcare sector: a critical evaluation

Bernd Carsten Stahl et al.

INFORMATION SYSTEMS JOURNAL (2012)

Article Computer Science, Information Systems

Information security culture: A management perspective

J. F. Van Niekerk et al.

COMPUTERS & SECURITY (2010)

Article Psychology, Multidisciplinary

The I's Have It: A Framework for Serious Educational Game Design

Leonard A. Annetta

REVIEW OF GENERAL PSYCHOLOGY (2010)

Article Computer Science, Hardware & Architecture

Are Employees Putting Your Company At Risk By Not Following Information Security Policies?

Mikko Siponen et al.

COMMUNICATIONS OF THE ACM (2009)

Article Computer Science, Interdisciplinary Applications

The impact of information richness on information security awareness training effectiveness

R. S. Shaw et al.

COMPUTERS & EDUCATION (2009)

Article Computer Science, Artificial Intelligence

Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness

Tejaswini Herath et al.

DECISION SUPPORT SYSTEMS (2009)

Article Computer Science, Information Systems

What levels of moral reasoning and values explain adherence to information security rules? An empirical study

Liisa Myyry et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)

Article Information Science & Library Science

User behaviour towards protective information technologies: the role of national cultural differences

Tamara Dinev et al.

INFORMATION SYSTEMS JOURNAL (2009)

Review Information Science & Library Science

User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach

John D'Arcy et al.

INFORMATION SYSTEMS RESEARCH (2009)

Article Biochemistry & Molecular Biology

Comparison of PubMed, Scopus, Web of Science, and Google Scholar: strengths and weaknesses

Matthew E. Falagas et al.

FASEB JOURNAL (2008)

Article Computer Science, Information Systems

A video game for cyber security training and awareness

Benjamin D. Cone et al.

COMPUTERS & SECURITY (2007)

Article Computer Science, Information Systems

Violation of safeguards by trusted personnel and understanding related information security concerns

G Dhillon

COMPUTERS & SECURITY (2001)