Abstract: The increasing threat to information security has created institutional pressures on organizations to comply with information security policies and standards. This paper presents an empirical study to investigate the impact of institutional pressures (coercive, normative, and mimetic) on information security compliance in organizations. The results show that coercive pressures that are manifested by regulatory agencies, normative pressures that are exerted through social pressures, and mimetic pressures that are manifested by security benefits positively influence information security compliance in public organizations. Furthermore, the results reveal that regulation and security benefits generate pressures on management to streng...
This research examines how organizational cybersecurity responses become isomorphic over time. Drawi...
Employees are regarded as the weakest link in organizations’ information security management, and th...
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2016.The aim of th...
The increasing threat to information security has created institutional pressures on organizations t...
The increasing threat to information security has created institutional pressures on organizations t...
Rapid development of e-government has exposed critical public information to the possibility of cybe...
The increase reliance on information systems has created unprecedented challenges for organizations ...
Rapid development of e-government has exposed critical public information to the possibility of cybe...
Protection of data and information security are crucial to business processes and include technical,...
Information Security Risk Management has found itself rising on the priority of organizations after ...
The Internet and information technology have influenced human life significantly. However, informati...
The focus of information security has traditionally been on technological issues, and organizations ...
Information is the critical resource of modern organization that needs to be protected from both int...
Aspects of information security is not sufficient to ensure a high level of information security pol...
There are several Information Security measures recommended by international standards and literatur...
This research examines how organizational cybersecurity responses become isomorphic over time. Drawi...
Employees are regarded as the weakest link in organizations’ information security management, and th...
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2016.The aim of th...
The increasing threat to information security has created institutional pressures on organizations t...
The increasing threat to information security has created institutional pressures on organizations t...
Rapid development of e-government has exposed critical public information to the possibility of cybe...
The increase reliance on information systems has created unprecedented challenges for organizations ...
Rapid development of e-government has exposed critical public information to the possibility of cybe...
Protection of data and information security are crucial to business processes and include technical,...
Information Security Risk Management has found itself rising on the priority of organizations after ...
The Internet and information technology have influenced human life significantly. However, informati...
The focus of information security has traditionally been on technological issues, and organizations ...
Information is the critical resource of modern organization that needs to be protected from both int...
Aspects of information security is not sufficient to ensure a high level of information security pol...
There are several Information Security measures recommended by international standards and literatur...
This research examines how organizational cybersecurity responses become isomorphic over time. Drawi...
Employees are regarded as the weakest link in organizations’ information security management, and th...
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2016.The aim of th...