The constant increase in cyber security breaches (CSB) has raised concerns globally mainly due to deviant behaviour of employees. Previous studies have claimed that a lack of security technologies and capabilities have contributed to these breaches. Despite increasing cyber security investment, organisations continue to experience security breaches. In light of the non-excludability of cyber security as a public good, this study seeks to examine factors that stimulate cooperation to comply with security requirements to prevent security breaches. However, little work has examined the relationship between non-excludability of cyber security and cooperative behaviour to achieve cyber security compliance (CSC) in organisations. Hence, t...
The cybersecurity of organizations is a subject of perennial concern as they are subject to mounting...
Critical infrastructures are based on complex systems that provide vital services to the nation. The...
Despite continuous effort to reduce ICT abuse, ICT security problems still persist such that ICT sec...
Drawing on public goods and institutional theory, this study examines the mediation effect of cooper...
Background - Information systems nowadays are cornerstones of any company. Beside the speedy advanc...
YesThe increase in cybersecurity threats and the challenges for organisations to protect their infor...
Cyber and information security (CIS) is an issue of national and international interest. Despite sop...
Cyber and information security (CIS) is an issue of national and international interest. Despite sop...
This study examines the factors influencing government employees’ cybersecurity behavior in Malaysia...
Although behavioural security constructs have received extensive scholarly attention, the unpredicta...
Organizations that rely heavily on ICT face bigger challenges to safeguard their information assets....
In a networked global economy, cyber security threats have accelerated at an enormous rate. The secu...
The number of successful attacks on vital infrastructure has increased, as has the sophistication of...
Cyber assurance, which is the ability to operate under the onslaught of cyber attacks and other unex...
The value of cyber security awareness among employees plays an important role for organizations in t...
The cybersecurity of organizations is a subject of perennial concern as they are subject to mounting...
Critical infrastructures are based on complex systems that provide vital services to the nation. The...
Despite continuous effort to reduce ICT abuse, ICT security problems still persist such that ICT sec...
Drawing on public goods and institutional theory, this study examines the mediation effect of cooper...
Background - Information systems nowadays are cornerstones of any company. Beside the speedy advanc...
YesThe increase in cybersecurity threats and the challenges for organisations to protect their infor...
Cyber and information security (CIS) is an issue of national and international interest. Despite sop...
Cyber and information security (CIS) is an issue of national and international interest. Despite sop...
This study examines the factors influencing government employees’ cybersecurity behavior in Malaysia...
Although behavioural security constructs have received extensive scholarly attention, the unpredicta...
Organizations that rely heavily on ICT face bigger challenges to safeguard their information assets....
In a networked global economy, cyber security threats have accelerated at an enormous rate. The secu...
The number of successful attacks on vital infrastructure has increased, as has the sophistication of...
Cyber assurance, which is the ability to operate under the onslaught of cyber attacks and other unex...
The value of cyber security awareness among employees plays an important role for organizations in t...
The cybersecurity of organizations is a subject of perennial concern as they are subject to mounting...
Critical infrastructures are based on complex systems that provide vital services to the nation. The...
Despite continuous effort to reduce ICT abuse, ICT security problems still persist such that ICT sec...