Skip Nav Destination
Close Modal
Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-13 of 13
Keywords: Compliance
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Motivational factors in cybersecurity: linking theory to organizational practice
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2025)
Published: 26 June 2025
... Tobias Reittinger can be contacted at: tobias.reittinger@ur.de 14 03 2025 28 05 2025 28 05 2025 Cybersecurity Motivation Incentives Nudges Awareness Compliance Policy As today’s digital landscape evolves rapidly, the threat of cybercrime is ever-growing. In 2023...
Journal Articles
Journal:
Information and Computer Security
Information and Computer Security (2025) 33 (1): 25–48.
Published: 05 September 2024
...Marcus Gerdin Purpose The purpose of this study is to further validate and extend the unified model of information security policy compliance (UMISPC) developed by Moody et al. (2018) . Design/methodology/approach To be able to compare the results of this study and those reported...
Journal Articles
An exploration of dark and light triad personality traits towards situational crime prevention and compliant information security behaviour
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2024) 32 (3): 344–364.
Published: 01 January 2024
... security behaviour. Moreover, this paper delves into the contrasting influences of light and dark personality traits on insider information security compliance. Design/methodology/approach A cross-sectional survey was conducted to study SCPT measures and the personality factors dyad using a diverse...
Journal Articles
Analytical hierarchy process model for managing cloud security
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2024) 32 (1): 93–111.
Published: 07 September 2023
... Analytical hierarchy process Risk management Business objectives alignment Data sovereignty Compliance © Emerald Publishing Limited 2023 Emerald Publishing Limited Licensed re-use rights only Table 2. Finalized criteria Criteria Explanation Sources Business objectives...
Journal Articles
COVID-19 pandemic-induced organisational cultural shifts and employee information security compliance behaviour: a South African case study
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2023) 31 (2): 221–243.
Published: 19 January 2023
... security compliance behaviour. Design/methodology/approach A single-organisation case study was used to develop understanding from direct experiences of organisational life. Both quantitative and qualitative data were collected using a sequential mixed methods approach, with the qualitative phase...
Journal Articles
Assessing information security behaviour: a self-determination theory perspective
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2021) 29 (4): 625–646.
Published: 08 March 2021
... that the perception of competence, relatedness and autonomy motivates the intention to comply with ISPs which is investigated using correlation analysis. It is, therefore, intended that a positive perception of competence, relatedness and autonomy will help lower the risk of ISP non-compliance and that developing...
Journal Articles
From ISO/IEC27001:2013 and ISO/IEC27002:2013 to GDPR compliance controls
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (4): 645–662.
Published: 08 June 2020
... indicates security management actions an organisation needs to perform to fulfil GDPR requirements. Thus, ISO/IEC 27001:2013 compliant organisations, can use this paper as a basis for extending the already existing security control modules towards data protection; and as guidance for reaching compliance...
Journal Articles
Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform
Available to PurchaseAggeliki Tsohou, Emmanouil Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni, Beatriz Gallego-Nicasio Crespo
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (4): 531–553.
Published: 18 May 2020
.... Even though GDPR leads toward many advantages for the data subjects it turned out to be a significant challenge. Organizations need to implement long and complex changes to become GDPR compliant. Data subjects are empowered with new rights, which, however, they need to become aware of. GDPR compliance...
Journal Articles
Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (3): 399–422.
Published: 28 August 2019
...Adéle Da Veiga; Ruthea Vorster; Fudong Li; Nathan Clarke; Steven M. Furnell Purpose The purpose of this study was to investigate the difference between South Africa (SA) and the United Kingdom (UK) in terms of data protection compliance with the aim to establish if a country that has had data...
Journal Articles
Work-related groups and information security policy compliance
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2018) 26 (5): 533–550.
Published: 12 November 2018
...Teodor Sommestad Purpose It is widely acknowledged that norms and culture influence decisions related to information security. The purpose of this paper is to investigate how work-related groups influence information security policy compliance intentions and to what extent this influence...
Journal Articles
Journal:
Information and Computer Security
Information and Computer Security (2018) 26 (5): 551–567.
Published: 12 November 2018
...Stefan Fenz; Thomas Neubauer Purpose The purpose of this paper is to provide a method to formalize information security control descriptions and a decision support system increasing the automation level and, therefore, the cost efficiency of the information security compliance checking process...
Journal Articles
E-commerce assurance models and trustworthiness issues: an empirical study
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2014) 22 (1): 76–96.
Published: 04 March 2014
... and this research aims to improve on them. Design/methodology/approach – It presents a comprehensive empirical survey on trustworthiness issues and e-commerce assurance models and proposes a new compliance-based e-commerce assurance model that integrates adaptive legislation, adaptive e-commerce-related...
Journal Articles
Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2013) 21 (4): 266–287.
Published: 07 October 2013
...Karin Hedström; Fredrik Karlsson; Ella Kolkowska Purpose – Employees' compliance with information security policies is considered an essential component of information security management. The research aims to illustrate the usefulness of social action theory (SAT) for management of information...
