Cyber and information security (CIS) is an issue of national and international interest. Despite sophisticated security systems and extensive physical countermeasures to combat cyber-attacks, organisations are vulnerable due to the involvement of the human factor. Humans are regarded as the weakest link in cybersecurity systems as development in digital technology advances. The area of cybersecurity is an extension of the previously studied fields of information and internet security. The need to understand the underlying human behavioural factors associated with CIS policy warrants further study, mainly from theoretical perspectives. Based on these underlying theoretical perspectives, this study reviews literature focusing on CIS complianc...
Information security has for long time been a field of study in computer science, software engineeri...
Evidence suggests that, regardless of the number of technical controls in place, organizations will ...
Information security is among the top organizational priorities. Theoretically, information security...
Cyber and information security (CIS) is an issue of national and international interest. Despite sop...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
The paper aims to identify behavioural theories that influence information security policies complia...
The body of research that focuses on employees’ information Security Policy compliance is problemati...
The Internet and information technology have influenced human life significantly. However, informati...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
As technology and digital applications increase in volume and complexity, organization is facing gre...
Cybersecurity intelligence sharing (CIS) has gained significance as an organizational function to pr...
Human compliance in cybersecurity continues to be a persistent problem for organizations. This resea...
This mixed-methods study focused on the internal human factors responsible for data breaches that co...
This paper identifies opportunities for potential theoretical and practical improvements in employee...
The growing number of information security breaches in organisations presents a serious risk to the ...
Information security has for long time been a field of study in computer science, software engineeri...
Evidence suggests that, regardless of the number of technical controls in place, organizations will ...
Information security is among the top organizational priorities. Theoretically, information security...
Cyber and information security (CIS) is an issue of national and international interest. Despite sop...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
The paper aims to identify behavioural theories that influence information security policies complia...
The body of research that focuses on employees’ information Security Policy compliance is problemati...
The Internet and information technology have influenced human life significantly. However, informati...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
As technology and digital applications increase in volume and complexity, organization is facing gre...
Cybersecurity intelligence sharing (CIS) has gained significance as an organizational function to pr...
Human compliance in cybersecurity continues to be a persistent problem for organizations. This resea...
This mixed-methods study focused on the internal human factors responsible for data breaches that co...
This paper identifies opportunities for potential theoretical and practical improvements in employee...
The growing number of information security breaches in organisations presents a serious risk to the ...
Information security has for long time been a field of study in computer science, software engineeri...
Evidence suggests that, regardless of the number of technical controls in place, organizations will ...
Information security is among the top organizational priorities. Theoretically, information security...