Skip to Main Content
Skip Nav Destination
Keywords: Compliance
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Information and Computer Security (2025)
Published: 26 June 2025
... Tobias Reittinger can be contacted at: tobias.reittinger@ur.de 14 03 2025 28 05 2025 28 05 2025 Cybersecurity Motivation Incentives Nudges Awareness Compliance Policy As today’s digital landscape evolves rapidly, the threat of cybercrime is ever-growing. In 2023...
Journal Articles
Information and Computer Security (2025) 33 (1): 25–48.
Published: 05 September 2024
...Marcus Gerdin Purpose The purpose of this study is to further validate and extend the unified model of information security policy compliance (UMISPC) developed by Moody et al. (2018) . Design/methodology/approach To be able to compare the results of this study and those reported...
Journal Articles
Journal Articles
Information and Computer Security (2024) 32 (1): 93–111.
Published: 07 September 2023
... Analytical hierarchy process Risk management Business objectives alignment Data sovereignty Compliance © Emerald Publishing Limited 2023 Emerald Publishing Limited Licensed re-use rights only Table 2. Finalized criteria Criteria Explanation Sources Business objectives...
Journal Articles
Journal Articles
Information and Computer Security (2021) 29 (4): 625–646.
Published: 08 March 2021
... that the perception of competence, relatedness and autonomy motivates the intention to comply with ISPs which is investigated using correlation analysis. It is, therefore, intended that a positive perception of competence, relatedness and autonomy will help lower the risk of ISP non-compliance and that developing...
Journal Articles
Information and Computer Security (2020) 28 (4): 645–662.
Published: 08 June 2020
... indicates security management actions an organisation needs to perform to fulfil GDPR requirements. Thus, ISO/IEC 27001:2013 compliant organisations, can use this paper as a basis for extending the already existing security control modules towards data protection; and as guidance for reaching compliance...
Journal Articles
Journal Articles
Journal Articles
Information and Computer Security (2018) 26 (5): 533–550.
Published: 12 November 2018
...Teodor Sommestad Purpose It is widely acknowledged that norms and culture influence decisions related to information security. The purpose of this paper is to investigate how work-related groups influence information security policy compliance intentions and to what extent this influence...
Journal Articles
Journal Articles
Information Management & Computer Security (2014) 22 (1): 76–96.
Published: 04 March 2014
... and this research aims to improve on them. Design/methodology/approach – It presents a comprehensive empirical survey on trustworthiness issues and e-commerce assurance models and proposes a new compliance-based e-commerce assurance model that integrates adaptive legislation, adaptive e-commerce-related...
Journal Articles

or Create an Account

Close Modal
Close Modal