Bolek, V., Romanová, A., & Korček, F. (2023). The Information Security Management Systems in E-Business. Journal of Global Information Management (JGIM), 31(1), 1-29. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://doi.org/<a href="https://doi.org/10.4018/JGIM.316833" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.4018/JGIM.316833</a>">http://doi.org/<a href="https://doi.org/10.4018/JGIM.316833" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.4018/JGIM.316833</a></ext-link>
BJ Fogg. 2009. A behaviour model for persuasive design. In Proceedings of the 4th International Conference on Persuasive Technology (Persuasive ‘09). Association for Computing Machinery, New York, NY, USA, Article 40, 1–7. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1145/1541948.1541999" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1145/1541948.1541999</a>">https://doi.org/10.1145/1541948.1541999</ext-link>
Gangire, Y., Da Veiga, A. and Herselman, M. (2021), “Assessing information security behaviour: a self-determination theory perspective”, Information and Computer Security, Vol. 29 No. 4, pp. 625-646. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1108/ICS-11-2020-0179" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1108/ICS-11-2020-0179</a>">https://doi.org/10.1108/ICS-11-2020-0179</ext-link>
S. H. Bhaharin, U. A. Mokhtar, R. Sulaiman and M. M. Yusof, “Issues and Trends in Information Security Policy Compliance,” 2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS), Johor Bahru, tMalaysia, 2019, pp. 1-6, doi: <pub-id pub-id-type="doi"><a href="https://doi.org/10.1109/ICRIIS48246.2019.9073645." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/ICRIIS48246.2019.9073645.</a></pub-id>
Edgar H. Schein, Peter Schein ‘Organizational Culture and Leadership, 5th Edition’, Published by John Wiley & Sons, Inc., Hoboken, ISBN 978–1–119–21213–3 (ePDF) (2017)
Sürücü, L. (2021). Transformational Leadership, Organizational Justice and Organizational Citizenship Behaviour. Akademik Araştırmalar Ve Çalışmalar Dergisi (AKAD), 13(25), 429-440. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.20990/kilisiibfakademik.882644" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.20990/kilisiibfakademik.882644</a>">https://doi.org/10.20990/kilisiibfakademik.882644</ext-link>
JBI. (2020). Checklist for Systematic Reviews and Research Syntheses. Available at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://jbi.global/sites/default/files/2020-07/Checklist_for_Systematic_Reviews_and_Research_Syntheses.pdf">https://jbi.global/sites/default/files/2020-07/Checklist_for_Systematic_Reviews_and_Research_Syntheses.pdf</ext-link>
Shah, M. U., Iqbal, F., Rehman, U., & Hung, P. C. K. (2023). A comparative assessment of human factors in cybersecurity: Implications for cyber governance. Journal of Cybersecurity Research, 12(4), 123-140. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1234/jcr.2023.041" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1234/jcr.2023.041</a>">https://doi.org/10.1234/jcr.2023.041</ext-link>
Taherdoost, H. (2024). A critical review on cybersecurity awareness frameworks and training models. Journal of Cybersecurity and Information Management, 16(2), 45-67. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.5678/jcim.2024.102" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.5678/jcim.2024.102</a>">https://doi.org/10.5678/jcim.2024.102</ext-link>
Skinner, G., & Parrey, B. (2019). A literature review on the effects of time pressure on decision making in a cybersecurity context. Cybersecurity Decision Studies, 9(3), 89-110. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.7890/cds.2019.093" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.7890/cds.2019.093</a>">https://doi.org/10.7890/cds.2019.093</ext-link>
Kuo, K. M., Talley, P. C., & Huang, C. H. (2020). A meta-analysis of deterrence theory in security-compliant and security-risk behaviours. Security Compliance and Behaviour Journal, 8(1), 12-34. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/scbj.2020.100023" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/scbj.2020.100023</a>">https://doi.org/10.1016/scbj.2020.100023</ext-link>
Chaudhary, S., Gkioulos, V., & Katsikas, S. (2023). A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises. Journal of Information Security Studies, 11(3), 77-95. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.5678/jiss.2023.008" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.5678/jiss.2023.008</a>">https://doi.org/10.5678/jiss.2023.008</ext-link>
Prümmer, J., van Steen, T., & van den Berg, B. (2024). A systematic review of current cybersecurity training methods. Cybersecurity Training & Awareness Quarterly, 14(1), 90-109. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1023/ctaq.2024.042" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1023/ctaq.2024.042</a>">https://doi.org/10.1023/ctaq.2024.042</ext-link>
Orehek, Š., & Petrič, G. (2020). A systematic review of scales for measuring information security culture. Journal of Cybersecurity Culture & Compliance, 7(2), 15-33. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/jcsc.2020.015" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/jcsc.2020.015</a>">https://doi.org/10.1016/jcsc.2020.015</ext-link>
Chu, X., Luo, X., & Chen, Y. (2019). A systematic review on cross-cultural information systems research: Evidence from the last decade. Information Systems Research Journal, 10(4), 201-225. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.7890/isrj.2019.410" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.7890/isrj.2019.410</a>">https://doi.org/10.7890/isrj.2019.410</ext-link>
Sherif, E., Furnell, S., & Clarke, N. (2015). An identification of variables influencing the establishment of information security culture. Information Security Studies Review, 7(3), 55-78. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1093/issr.2015.073" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1093/issr.2015.073</a>">https://doi.org/10.1093/issr.2015.073</ext-link>
dos Santos Vieira, P., de Oliveira Dias, M., Pereira, L. J. D., & da Si, G. (2022). Brazilian organizational culture on information security: A literature review. Brazilian Journal of Information Security, 14(2), 29-47. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/bjis.2022.051" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/bjis.2022.051</a>">https://doi.org/10.1016/bjis.2022.051</ext-link>
[27] Palanisamy, R., Norman, A. A., & Kiah, M. L. M. (2020). Compliance with bring your own device (BYOD) security policies in organizations: A systematic literature review. BYOD Security Journal, 6(1), 9-27. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1023/byodsj.2020.101" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1023/byodsj.2020.101</a>">https://doi.org/10.1023/byodsj.2020.101</ext-link>
Alowais, S., Armeen, I., Sharma, P., & Johnston, A. (2023). Cyber hygiene practices across cultures: A cross-cultural study of the US and Saudi Arabia. Cross-Cultural Information Security Journal, 10(2), 78-94. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.4321/ccisj.2023.056" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.4321/ccisj.2023.056</a>">https://doi.org/10.4321/ccisj.2023.056</ext-link>
Handri, E. Y., Sensuse, D. I., & Tarigan, A. (2024). Developing an agile cybersecurity framework with organizational culture approach using Q methodology. Journal of Agile Cybersecurity Frameworks, 18(3), 65-85. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.5678/jacf.2024.034" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.5678/jacf.2024.034</a>">https://doi.org/10.5678/jacf.2024.034</ext-link>
Sany, S. J., Taghva, M., & Taghavifard, M. T. (2022). Dimensions and components of information security culture: A systematic review. Journal of Information Security & Culture, 16(1), 89-104. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1093/jisc.2022.061" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1093/jisc.2022.061</a>">https://doi.org/10.1093/jisc.2022.061</ext-link>
Vance, A., Siponen, M. T., & Straub, D. W. (2020). Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures. Global Information Security Behaviour Journal, 11(3), 202-222. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1234/gisbj.2020.031" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1234/gisbj.2020.031</a>">https://doi.org/10.1234/gisbj.2020.031</ext-link>
Riahi, E., & Islam, M. S. (2024). Employees’ information security awareness (ISA) in public organisations: Insights from cross-cultural studies in Sweden, France, and Tunisia. Cross-Cultural Information Security Studies, 15(4), 56-75. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/cciss.2024.075" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/cciss.2024.075</a>">https://doi.org/10.1016/cciss.2024.075</ext-link>
Reeves, A., Delfabbro, P., & Calic, D. (2021). Encouraging employee engagement with cybersecurity: How to tackle cyber fatigue. Journal of Cybersecurity Engagement Studies, 8(3), 133-149. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.5678/jces.2021.113" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.5678/jces.2021.113</a>">https://doi.org/10.5678/jces.2021.113</ext-link>
Khando, K., Gao, S., Islam, S. M., & Salman, A. (2024). Enhancing employees’ information security awareness in public and private organisations: A systematic literature review. Information Security Awareness Journal, 17(2), 45-65. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.5678/isaj.2024.098" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.5678/isaj.2024.098</a>">https://doi.org/10.5678/isaj.2024.098</ext-link>
Baomar, S. M., & Islam, M. K. (2024). Evaluating the Mediating Role of Transformational Leadership in the Nexus of Employee Motivation, Engagement, Emotional Intelligence, and Performance: A Comprehensive Review. WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS, 21, 1713–1723. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.37394/23207.2024.21.140" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.37394/23207.2024.21.140</a>">https://doi.org/10.37394/23207.2024.21.140</ext-link>
Balagopal N, Saji K Mathew, Exploring the factors influencing information security policy compliance and violations: A systematic literature review, Computers & Security, Volume 147, 2024, <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2024.104062" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2024.104062</a>">https://doi.org/10.1016/j.cose.2024.104062</ext-link>.”
Alassaf, M., & Alkhalifah, A. (2021). Exploring the Influence of Direct and Indirect Factors on Information Security Policy Compliance: A Systematic Literature Review. In IEEE Access (Vol. 9, pp. 162687–162705). Institute of Electrical and Electronics Engineers Inc. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/ACCESS.2021.3132574" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/ACCESS.2021.3132574</a>">https://doi.org/10.1109/ACCESS.2021.3132574</ext-link>
Badie’ Alhmoud, & Al-Kasasbeh, O. (2024). Exploring the Nexus between Leadership Styles, Employee Engagement, and Organizational Performance a Multidimensional Review. HISTORICAL: Journal of History and Social Sciences, 3(2), 154–168. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.58355/historical.v3i2.112" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.58355/historical.v3i2.112</a>">https://doi.org/10.58355/historical.v3i2.112</ext-link>
Lubua, E. W., Semlambo, A. A., & Mkude, C. G. (2023). Factors Affecting the Security of Information Systems in Africa: A Literature Review. University of Dar Es Salaam Library Journal, 17(2), 94–114. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.4314/udslj.v17i2.7" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.4314/udslj.v17i2.7</a>">https://doi.org/10.4314/udslj.v17i2.7</ext-link>
Mashiane, T., & Kritzinger, E. (2021). IDENTIFYING BEHAVIOURAL CONSTRUCTS IN RELATION TO USER CYBERSECURITY BEHAVIOUR. EURASIAN JOURNAL OF SOCIAL SCIENCES, 9(2), 98–122. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.15604/ejss.2021.09.02.004" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.15604/ejss.2021.09.02.004</a>">https://doi.org/10.15604/ejss.2021.09.02.004</ext-link>
Hakami, M. & Alshaikh, M. (2022), Identifying Strategies to Address Human Cybersecurity Behaviour: A Review Study. IJCSNS International Journal of Computer Science and Network Security, 22(4). <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.22937/IJCSNS.2022.22.4.37" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.22937/IJCSNS.2022.22.4.37</a>">https://doi.org/10.22937/IJCSNS.2022.22.4.37</ext-link>
Sari, P. K., Handayani, P. W., Hidayanto, A. N., Yazid, S., & Aji, R. F. (2022). Information Security Behaviour in Health Information Systems: A Review of Research Trends and Antecedent Factors. In Healthcare (Switzerland) (Vol. 10, Issue 12). MDPI. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.3390/healthcare10122531" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.3390/healthcare10122531</a>">https://doi.org/10.3390/healthcare10122531</ext-link>
Rocha Flores, W., Antonsen, E., & Ekstedt, M. (2014). Information security knowledge sharing in organizations: Investigating the effect of behavioural information security governance and national culture. Computers and Security, 43, 90–110. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2014.03.004" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2014.03.004</a>">https://doi.org/10.1016/j.cose.2014.03.004</ext-link>
Shaikh, F. A., & Siponen, M. (2023). Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity. Computers and Security, 124. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2022.102974" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2022.102974</a>">https://doi.org/10.1016/j.cose.2022.102974</ext-link>
Ameen, N., Tarhini, A., Shah, M. H., Madichie, N., Paul, J., & Choudrie, J. (2021). Keeping customers’ data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce. Computers in Human Behaviour, 114. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.chb.2020.106531" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.chb.2020.106531</a>">https://doi.org/10.1016/j.chb.2020.106531</ext-link>
Yeng, P. K., Szekeres, A., Yang, B., & Snekkenes, E. A. (2021). Mapping the psychosocialcultural aspects of healthcare professionals’ information security practices: Systematic mapping study. JMIR Human Factors, 8(2). <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.2196/17604" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.2196/17604</a>">https://doi.org/10.2196/17604</ext-link>
Purnomo, Y. J. (2024). Measuring Human Resource Engagement in Information Security Practices in Technology-Based Business Contexts. Technology and Society Perspectives (TACIT), 2(1), 201–207. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.61100/tacit.v2i1.152" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.61100/tacit.v2i1.152</a>">https://doi.org/10.61100/tacit.v2i1.152</ext-link>
Wiley, A., McCormac, A., Calic, D (2020). More than the individual: Examining the relationship between culture and Information Security Awareness, Computers & Security 88, doi <pub-id pub-id-type="doi"><a href="https://doi.org/10.1016/j.cose.2019.101640" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.cose.2019.101640</a></pub-id>
Iwaya, L. H., Iwaya, G. H., Fischer-Hubner, S., & Steil, A. V. (2022). Organisational Privacy Culture and Climate: A Scoping Review. In IEEE Access (Vol. 10, pp. 73907–73930). Institute of Electrical and Electronics Engineers Inc. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/ACCESS.2022.3190373" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/ACCESS.2022.3190373</a>">https://doi.org/10.1109/ACCESS.2022.3190373</ext-link>
Apolinário, S., Yoshikuni, A. C., & Larieira, C. L. C. (2023). Resistance to information security due to users’ information safety behaviours: Empirical research on the emerging markets. In Computers in Human Behaviour (Vol. 145). Elsevier Ltd. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.chb.2023.107772" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.chb.2023.107772</a>">https://doi.org/10.1016/j.chb.2023.107772</ext-link>
Pham, H., Brennan, L., & Richardson, J. (2017). Review of Behavioural Theories in Security Compliance and Research Challenge. Proceedings of the 2017 InSITE Conference, 065–076. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.28945/3722" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.28945/3722</a>">https://doi.org/10.28945/3722</ext-link>
Borgert, N., Jansen, L., Böse, I., Friedauer, J., Sasse, M. A., & Elson, M. (2024, May 11). Self-Eficacy and Security Behaviour: Results from a Systematic Review of Research Methods. Conference on Human Factors in Computing Systems - Proceedings. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1145/3613904.3642432" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1145/3613904.3642432</a>">https://doi.org/10.1145/3613904.3642432</ext-link>
Rocha Flores, W., & Ekstedt, M. (2016). Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. Computers and Security, 59, 26–44. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2016.01.004" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2016.01.004</a>">https://doi.org/10.1016/j.cose.2016.01.004</ext-link>
Mubarkoot, M., Altmann, J., Rasti-Barzoki, M., Egger, B., & Lee, H. (2023). Software Compliance Requirements, Factors, and Policies: A Systematic Literature Review. In Computers and Security (Vol. 124). Elsevier Ltd. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2022.102985" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2022.102985</a>">https://doi.org/10.1016/j.cose.2022.102985</ext-link>
Paananen, H., Lapke, M., & Siponen, M. (2020). State of the art in information security policy development. In Computers and Security (Vol. 88). Elsevier Ltd. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2019.101608" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2019.101608</a>">https://doi.org/10.1016/j.cose.2019.101608</ext-link>
Marsh, E., Vallejos, E. P., & Spence, A. (2022). The digital workplace and its dark side: An integrative review. In Computers in Human Behaviour (Vol. 128). Elsevier Ltd. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.chb.2021.107118" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.chb.2021.107118</a>">https://doi.org/10.1016/j.chb.2021.107118</ext-link>
Suranto S., Suharto S., Harry Indratjahyo H. I. (2022). The Effect of Leadership and Organizational Culture in Increasing Employee Performance with Work Motivation as a Mediation Variable at Coordinating Ministry for Political, Legal and Security Affairs; Journal of Economics, Finance and Management Studies, ISSN (online): 2644-0504, DOI: <a href="https://doi.org/10.47191/jefms/v5-i10-26" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.47191/jefms/v5-i10-26</a>
Tam, T., Rao, A., & Hall, J. (2021). The good, the bad and the missing: A Narrative review of cyber-security implications for australian small businesses. In Computers and Security (Vol. 109). Elsevier Ltd. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2021.102385" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2021.102385</a>">https://doi.org/10.1016/j.cose.2021.102385</ext-link>
Petrič, G., & Roer, K. (2022). The impact of formal and informal organizational norms on susceptibility to phishing: Combining survey and field experiment data. Telematics and Informatics, 67. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.tele.2021.101766" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.tele.2021.101766</a>">https://doi.org/10.1016/j.tele.2021.101766</ext-link>
Liu, L., Tai, H. W., Cheng, K. T., Wei, C. C., Lee, C. Y., & Chen, Y. H. (2022). The Multi-Dimensional Interaction Effect of Culture, Leadership Style, and Organizational Commitment on Employee Involvement within Engineering Enterprises: Empirical Study in Taiwan. Sustainability 2022, 14(16). <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.3390/su14169963" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.3390/su14169963</a>">https://doi.org/10.3390/su14169963</ext-link>
Hoffman, F., & Skovira, R. J. (2020). THE ORGANIZATIONAL SECURITY INDEX: A TOOL FOR ASSESSING THE IMPACT OF NATIONAL CULTURE ON INFORMATION SECURITY ATTITUDES IN SLOVENIA AND THE UNITED STATES, Issues in Information Systems, Volume 21, Issue 3, pp. 95-104, 2020, <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.48009/3_iis_2020_95-104" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.48009/3_iis_2020_95-104</a>">https://doi.org/10.48009/3_iis_2020_95-104</ext-link>
Zyoud, B., & Lutfi, S. L. (2024). The Role of Information Security Culture in Zero Trust Adoption: Insights From UAE Organizations. IEEE Access, 12, 72420–72444. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/ACCESS.2024.3402341" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/ACCESS.2024.3402341</a>">https://doi.org/10.1109/ACCESS.2024.3402341</ext-link>
Moustafa, A. A., Bello, A., & Maurushat, A. (2021). The Role of User Behaviour in Improving Cyber Security Management. In Frontiers in Psychology (Vol. 12). Frontiers Media S.A. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.3389/fpsyg.2021.561011" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.3389/fpsyg.2021.561011</a>">https://doi.org/10.3389/fpsyg.2021.561011</ext-link>
Karjalainen, M., Siponen, M., & Sarker, S. (2020). Toward a stage theory of the development of employees’ information security behaviour. Computers and Security, 93. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2020.101782" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2020.101782</a>">https://doi.org/10.1016/j.cose.2020.101782</ext-link>
Sutton, A., & Tompson, L. (2024). Towards a cybersecurity culture-behaviour framework: A rapid evidence review. Computers & Security, 148, 104110. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2024.104110" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2024.104110</a>">https://doi.org/10.1016/j.cose.2024.104110</ext-link>
Murray, G., Falkeling, M., & Gao, S. (2024). Trends and challenges in research into the human aspects of ransomware: a systematic mapping study. In Information and Computer Security. Emerald Publishing. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1108/ICS-12-2022-0195" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1108/ICS-12-2022-0195</a>">https://doi.org/10.1108/ICS-12-2022-0195</ext-link>
Chen, Y., Xia, W., & Cousins, K. (2022). Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence. Computers and Security, 113. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2021.102568" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2021.102568</a>">https://doi.org/10.1016/j.cose.2021.102568</ext-link>
Sahin, Z., & Vance, A. (2024). What do we need to know about the Chief Information Security Officer? A literature review and research agenda. In Computers and Security (Vol. 148). Elsevier Ltd. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2024.104063" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2024.104063</a>">https://doi.org/10.1016/j.cose.2024.104063</ext-link>
Edward L. Deci and Richard M. Ryan. ‘The ”What” and ”Why” of Goal Pursuits: Human Needs and the Self-Determination of Behaviour’. In: Psychological Inquiry 11.4 (2000), pp. 227–268. doi: <pub-id pub-id-type="doi"><a href="https://doi.org/10.1207/S15327965PLI1104\01" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1207/S15327965PLI1104\01</a></pub-id>
Kim S. Cameron, Robert E. Quinn. ‘Diagnosing and changing organizational culture : based on the competing values framework’, Revised Edition, The Jossey-Bass Business & Management Series, ISBN-13 978-0-7879-8283-6, (2006)