Cybersecurity Policy Compliance in Higher Education: A Theoretical Framework
Published 2021 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Cybersecurity Policy Compliance in Higher Education: A Theoretical Framework
Authors
Keywords
-
Journal
Journal of Applied Security Research
Volume -, Issue -, Pages 1-22
Publisher
Informa UK Limited
Online
2021-10-28
DOI
10.1080/19361610.2021.1989271
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Defining organisational information security culture—Perspectives from academia and industry
- (2020) Adéle da Veiga et al. COMPUTERS & SECURITY
- Sarah Gilbert: carving a path towards a COVID-19 vaccine
- (2020) Richard Lane LANCET
- A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom
- (2020) Aliyu Aliyu et al. Applied Sciences-Basel
- COVID-19 vaccine trials in Africa
- (2020) Munyaradzi Makoni Lancet Respiratory Medicine
- A systematic review of online examinations: A pedagogical innovation for scalable authentication and integrity
- (2020) Kerryn Butler-Henderson et al. COMPUTERS & EDUCATION
- Moving from a ‘human-as-problem” to a ‘human-as-solution” cybersecurity mindset
- (2019) Verena Zimmermann et al. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES
- Enterprise cybersecurity training and awareness programs: Recommendations for success
- (2019) Wu He et al. JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE
- Positive Orientation as a Predictor of Health Behavior during Chronic Diseases
- (2019) Ewa Kupcewicz et al. International Journal of Environmental Research and Public Health
- Understanding smartphone security behaviors: An extension of the protection motivation theory with anticipated regret
- (2018) Silas Formunyuy Verkijika COMPUTERS & SECURITY
- Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective
- (2018) Huigang Liang et al. Journal of the Association for Information Systems
- Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education
- (2018) Majed Rajab et al. COMPUTERS & SECURITY
- Systematic development of scenarios caused by cyber-attack-induced human errors in nuclear power plants
- (2017) Hee Eun Kim et al. RELIABILITY ENGINEERING & SYSTEM SAFETY
- User Participation in Information Systems Security Risk Management
- (2017) Spears et al. MIS QUARTERLY
- Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- (2017) Bulgurcu et al. MIS QUARTERLY
- Information security policy compliance model in organizations
- (2016) Nader Sohrabi Safa et al. COMPUTERS & SECURITY
- Understanding online safety behaviors: A protection motivation theory perspective
- (2016) Hsin-yi Sandy Tsai et al. COMPUTERS & SECURITY
- Development of cyber information security education and training system
- (2016) Bong-Hyun Kim et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Human behaviour as an aspect of cybersecurity assurance
- (2016) Mark Evans et al. Security and Communication Networks
- Information security culture: A management perspective
- (2009) J.F. Van Niekerk et al. COMPUTERS & SECURITY
- A framework and assessment instrument for information security culture
- (2009) A. Da Veiga et al. COMPUTERS & SECURITY
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started