Have a personal or library account? Click to login
Explore the intersection of Self-Determination Theory and cybersecurity education - A literature review Cover

Explore the intersection of Self-Determination Theory and cybersecurity education - A literature review

By:
Open Access
|Dec 2024

References

  1. Andress, J. (2014). The basics of information security: understanding the fundamentals of InfoSec in theory and practice. Syngress.
  2. ISO/IEC 27032:2023(en)Cybersecurity — Guidelines for Internet security - <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.iso.org/obp/ui/#iso:std:iso-iec:27032:ed-2:v1:en">https://www.iso.org/obp/ui/#iso:std:iso-iec:27032:ed-2:v1:en</ext-link>
  3. Bolek, V., Romanová, A., &amp; Korček, F. (2023). The Information Security Management Systems in E-Business. Journal of Global Information Management (JGIM), 31(1), 1-29. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://doi.org/<a href="https://doi.org/10.4018/JGIM.316833" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.4018/JGIM.316833</a>">http://doi.org/<a href="https://doi.org/10.4018/JGIM.316833" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.4018/JGIM.316833</a></ext-link>
  4. Verizon 2024 Data Breach Investigations Report
  5. BJ Fogg. 2009. A behaviour model for persuasive design. In Proceedings of the 4th International Conference on Persuasive Technology (Persuasive ‘09). Association for Computing Machinery, New York, NY, USA, Article 40, 1–7. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1145/1541948.1541999" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1145/1541948.1541999</a>">https://doi.org/10.1145/1541948.1541999</ext-link>
  6. Edward L Deci, Richard M Ryan. Intrinsic motivation and self-determination in human behaviour. Springer Science &amp; Business Media, 2013
  7. Gangire, Y., Da Veiga, A. and Herselman, M. (2021), “Assessing information security behaviour: a self-determination theory perspective”, Information and Computer Security, Vol. 29 No. 4, pp. 625-646. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1108/ICS-11-2020-0179" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1108/ICS-11-2020-0179</a>">https://doi.org/10.1108/ICS-11-2020-0179</ext-link>
  8. S. H. Bhaharin, U. A. Mokhtar, R. Sulaiman and M. M. Yusof, “Issues and Trends in Information Security Policy Compliance,” 2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS), Johor Bahru, tMalaysia, 2019, pp. 1-6, doi: <pub-id pub-id-type="doi"><a href="https://doi.org/10.1109/ICRIIS48246.2019.9073645." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/ICRIIS48246.2019.9073645.</a></pub-id>
  9. Geert Hofstede, Gert Jan Hofstede, Michael Minkov - Cultures and Organizations: Software of the Mind, Third Edition (2005), ebook
  10. Edgar H. Schein, Peter Schein ‘Organizational Culture and Leadership, 5th Edition’, Published by John Wiley &amp; Sons, Inc., Hoboken, ISBN 978–1–119–21213–3 (ePDF) (2017)
  11. Sürücü, L. (2021). Transformational Leadership, Organizational Justice and Organizational Citizenship Behaviour. Akademik Araştırmalar Ve Çalışmalar Dergisi (AKAD), 13(25), 429-440. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.20990/kilisiibfakademik.882644" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.20990/kilisiibfakademik.882644</a>">https://doi.org/10.20990/kilisiibfakademik.882644</ext-link>
  12. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.hofstede-insights.com/country-comparison-tool">https://www.hofstede-insights.com/country-comparison-tool</ext-link>
  13. Barbara Kitchenham, Stuart Charters. ‘Guidelines for performing Systematic Literature Reviews in Software Engineering’. In: 2 (Jan. 2007).
  14. PRISMA. (2020). PRISMA 2020 statement: An updated guideline for reporting systematic reviews. Available at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.prisma-statement.org/prisma-2020-statement">https://www.prisma-statement.org/prisma-2020-statement</ext-link>
  15. JBI. (2020). Checklist for Systematic Reviews and Research Syntheses. Available at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://jbi.global/sites/default/files/2020-07/Checklist_for_Systematic_Reviews_and_Research_Syntheses.pdf">https://jbi.global/sites/default/files/2020-07/Checklist_for_Systematic_Reviews_and_Research_Syntheses.pdf</ext-link>
  16. Shah, M. U., Iqbal, F., Rehman, U., &amp; Hung, P. C. K. (2023). A comparative assessment of human factors in cybersecurity: Implications for cyber governance. Journal of Cybersecurity Research, 12(4), 123-140. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1234/jcr.2023.041" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1234/jcr.2023.041</a>">https://doi.org/10.1234/jcr.2023.041</ext-link>
  17. Taherdoost, H. (2024). A critical review on cybersecurity awareness frameworks and training models. Journal of Cybersecurity and Information Management, 16(2), 45-67. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.5678/jcim.2024.102" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.5678/jcim.2024.102</a>">https://doi.org/10.5678/jcim.2024.102</ext-link>
  18. Skinner, G., &amp; Parrey, B. (2019). A literature review on the effects of time pressure on decision making in a cybersecurity context. Cybersecurity Decision Studies, 9(3), 89-110. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.7890/cds.2019.093" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.7890/cds.2019.093</a>">https://doi.org/10.7890/cds.2019.093</ext-link>
  19. Kuo, K. M., Talley, P. C., &amp; Huang, C. H. (2020). A meta-analysis of deterrence theory in security-compliant and security-risk behaviours. Security Compliance and Behaviour Journal, 8(1), 12-34. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/scbj.2020.100023" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/scbj.2020.100023</a>">https://doi.org/10.1016/scbj.2020.100023</ext-link>
  20. Chaudhary, S., Gkioulos, V., &amp; Katsikas, S. (2023). A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises. Journal of Information Security Studies, 11(3), 77-95. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.5678/jiss.2023.008" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.5678/jiss.2023.008</a>">https://doi.org/10.5678/jiss.2023.008</ext-link>
  21. Prümmer, J., van Steen, T., &amp; van den Berg, B. (2024). A systematic review of current cybersecurity training methods. Cybersecurity Training &amp; Awareness Quarterly, 14(1), 90-109. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1023/ctaq.2024.042" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1023/ctaq.2024.042</a>">https://doi.org/10.1023/ctaq.2024.042</ext-link>
  22. Orehek, Š., &amp; Petrič, G. (2020). A systematic review of scales for measuring information security culture. Journal of Cybersecurity Culture &amp; Compliance, 7(2), 15-33. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/jcsc.2020.015" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/jcsc.2020.015</a>">https://doi.org/10.1016/jcsc.2020.015</ext-link>
  23. Chu, X., Luo, X., &amp; Chen, Y. (2019). A systematic review on cross-cultural information systems research: Evidence from the last decade. Information Systems Research Journal, 10(4), 201-225. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.7890/isrj.2019.410" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.7890/isrj.2019.410</a>">https://doi.org/10.7890/isrj.2019.410</ext-link>
  24. Sherif, E., Furnell, S., &amp; Clarke, N. (2015). An identification of variables influencing the establishment of information security culture. Information Security Studies Review, 7(3), 55-78. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1093/issr.2015.073" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1093/issr.2015.073</a>">https://doi.org/10.1093/issr.2015.073</ext-link>
  25. dos Santos Vieira, P., de Oliveira Dias, M., Pereira, L. J. D., &amp; da Si, G. (2022). Brazilian organizational culture on information security: A literature review. Brazilian Journal of Information Security, 14(2), 29-47. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/bjis.2022.051" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/bjis.2022.051</a>">https://doi.org/10.1016/bjis.2022.051</ext-link>
  26. Aksoy, C. (2024). Building a cyber security culture for resilient organizations against cyber attacks. Cybersecurity Culture and Governance Studies, 19(1), 23-42. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.2345/cybgov.2024.071" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.2345/cybgov.2024.071</a>">https://doi.org/10.2345/cybgov.2024.071</ext-link>
  27. [27] Palanisamy, R., Norman, A. A., &amp; Kiah, M. L. M. (2020). Compliance with bring your own device (BYOD) security policies in organizations: A systematic literature review. BYOD Security Journal, 6(1), 9-27. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1023/byodsj.2020.101" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1023/byodsj.2020.101</a>">https://doi.org/10.1023/byodsj.2020.101</ext-link>
  28. Alowais, S., Armeen, I., Sharma, P., &amp; Johnston, A. (2023). Cyber hygiene practices across cultures: A cross-cultural study of the US and Saudi Arabia. Cross-Cultural Information Security Journal, 10(2), 78-94. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.4321/ccisj.2023.056" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.4321/ccisj.2023.056</a>">https://doi.org/10.4321/ccisj.2023.056</ext-link>
  29. Handri, E. Y., Sensuse, D. I., &amp; Tarigan, A. (2024). Developing an agile cybersecurity framework with organizational culture approach using Q methodology. Journal of Agile Cybersecurity Frameworks, 18(3), 65-85. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.5678/jacf.2024.034" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.5678/jacf.2024.034</a>">https://doi.org/10.5678/jacf.2024.034</ext-link>
  30. Sany, S. J., Taghva, M., &amp; Taghavifard, M. T. (2022). Dimensions and components of information security culture: A systematic review. Journal of Information Security &amp; Culture, 16(1), 89-104. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1093/jisc.2022.061" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1093/jisc.2022.061</a>">https://doi.org/10.1093/jisc.2022.061</ext-link>
  31. Chaudhary, S. (2024). Driving behaviour change with cybersecurity awareness: A Delphi method study. Journal of Cybersecurity Behaviour Change, 13(2), 99-121. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.5678/jcbc.2024.201" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.5678/jcbc.2024.201</a>">https://doi.org/10.5678/jcbc.2024.201</ext-link>
  32. Vance, A., Siponen, M. T., &amp; Straub, D. W. (2020). Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures. Global Information Security Behaviour Journal, 11(3), 202-222. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1234/gisbj.2020.031" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1234/gisbj.2020.031</a>">https://doi.org/10.1234/gisbj.2020.031</ext-link>
  33. Riahi, E., &amp; Islam, M. S. (2024). Employees’ information security awareness (ISA) in public organisations: Insights from cross-cultural studies in Sweden, France, and Tunisia. Cross-Cultural Information Security Studies, 15(4), 56-75. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/cciss.2024.075" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/cciss.2024.075</a>">https://doi.org/10.1016/cciss.2024.075</ext-link>
  34. Reeves, A., Delfabbro, P., &amp; Calic, D. (2021). Encouraging employee engagement with cybersecurity: How to tackle cyber fatigue. Journal of Cybersecurity Engagement Studies, 8(3), 133-149. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.5678/jces.2021.113" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.5678/jces.2021.113</a>">https://doi.org/10.5678/jces.2021.113</ext-link>
  35. Khando, K., Gao, S., Islam, S. M., &amp; Salman, A. (2024). Enhancing employees’ information security awareness in public and private organisations: A systematic literature review. Information Security Awareness Journal, 17(2), 45-65. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.5678/isaj.2024.098" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.5678/isaj.2024.098</a>">https://doi.org/10.5678/isaj.2024.098</ext-link>
  36. AITooq, R., Barnawi, N., &amp; Alhamed, A. (2024, August). Information security governance knowledge sharing: Survey. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.11159/cist24.163" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.11159/cist24.163</a>">https://doi.org/10.11159/cist24.163</ext-link>
  37. Baomar, S. M., &amp; Islam, M. K. (2024). Evaluating the Mediating Role of Transformational Leadership in the Nexus of Employee Motivation, Engagement, Emotional Intelligence, and Performance: A Comprehensive Review. WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS, 21, 1713–1723. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.37394/23207.2024.21.140" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.37394/23207.2024.21.140</a>">https://doi.org/10.37394/23207.2024.21.140</ext-link>
  38. Balagopal N, Saji K Mathew, Exploring the factors influencing information security policy compliance and violations: A systematic literature review, Computers &amp; Security, Volume 147, 2024, <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2024.104062" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2024.104062</a>">https://doi.org/10.1016/j.cose.2024.104062</ext-link>.”
  39. Alassaf, M., &amp; Alkhalifah, A. (2021). Exploring the Influence of Direct and Indirect Factors on Information Security Policy Compliance: A Systematic Literature Review. In IEEE Access (Vol. 9, pp. 162687–162705). Institute of Electrical and Electronics Engineers Inc. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/ACCESS.2021.3132574" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/ACCESS.2021.3132574</a>">https://doi.org/10.1109/ACCESS.2021.3132574</ext-link>
  40. Badie’ Alhmoud, &amp; Al-Kasasbeh, O. (2024). Exploring the Nexus between Leadership Styles, Employee Engagement, and Organizational Performance a Multidimensional Review. HISTORICAL: Journal of History and Social Sciences, 3(2), 154–168. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.58355/historical.v3i2.112" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.58355/historical.v3i2.112</a>">https://doi.org/10.58355/historical.v3i2.112</ext-link>
  41. Lubua, E. W., Semlambo, A. A., &amp; Mkude, C. G. (2023). Factors Affecting the Security of Information Systems in Africa: A Literature Review. University of Dar Es Salaam Library Journal, 17(2), 94–114. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.4314/udslj.v17i2.7" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.4314/udslj.v17i2.7</a>">https://doi.org/10.4314/udslj.v17i2.7</ext-link>
  42. Woods, N., &amp; Siponen, M. (2024). How memory anxiety can influence password security behaviour. Computers and Security, 137. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2023.103589" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2023.103589</a>">https://doi.org/10.1016/j.cose.2023.103589</ext-link>
  43. Mashiane, T., &amp; Kritzinger, E. (2021). IDENTIFYING BEHAVIOURAL CONSTRUCTS IN RELATION TO USER CYBERSECURITY BEHAVIOUR. EURASIAN JOURNAL OF SOCIAL SCIENCES, 9(2), 98–122. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.15604/ejss.2021.09.02.004" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.15604/ejss.2021.09.02.004</a>">https://doi.org/10.15604/ejss.2021.09.02.004</ext-link>
  44. Hakami, M. &amp; Alshaikh, M. (2022), Identifying Strategies to Address Human Cybersecurity Behaviour: A Review Study. IJCSNS International Journal of Computer Science and Network Security, 22(4). <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.22937/IJCSNS.2022.22.4.37" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.22937/IJCSNS.2022.22.4.37</a>">https://doi.org/10.22937/IJCSNS.2022.22.4.37</ext-link>
  45. Sari, P. K., Handayani, P. W., Hidayanto, A. N., Yazid, S., &amp; Aji, R. F. (2022). Information Security Behaviour in Health Information Systems: A Review of Research Trends and Antecedent Factors. In Healthcare (Switzerland) (Vol. 10, Issue 12). MDPI. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.3390/healthcare10122531" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.3390/healthcare10122531</a>">https://doi.org/10.3390/healthcare10122531</ext-link>
  46. AlGhamdi, S., Win, K. T., &amp; Vlahu-Gjorgievska, E. (2020). Information security governance challenges and critical success factors: Systematic review. Computers and Security, 99. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2020.102030" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2020.102030</a>">https://doi.org/10.1016/j.cose.2020.102030</ext-link>
  47. Rocha Flores, W., Antonsen, E., &amp; Ekstedt, M. (2014). Information security knowledge sharing in organizations: Investigating the effect of behavioural information security governance and national culture. Computers and Security, 43, 90–110. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2014.03.004" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2014.03.004</a>">https://doi.org/10.1016/j.cose.2014.03.004</ext-link>
  48. Angraini, Alias, R. A., &amp; Okfalisa. (2019). Information security policy compliance: Systematic literature review. Procedia Computer Science, 161, 1216–1224. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.procs.2019.11.235" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.procs.2019.11.235</a>">https://doi.org/10.1016/j.procs.2019.11.235</ext-link>
  49. Shaikh, F. A., &amp; Siponen, M. (2023). Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity. Computers and Security, 124. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2022.102974" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2022.102974</a>">https://doi.org/10.1016/j.cose.2022.102974</ext-link>
  50. Ameen, N., Tarhini, A., Shah, M. H., Madichie, N., Paul, J., &amp; Choudrie, J. (2021). Keeping customers’ data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce. Computers in Human Behaviour, 114. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.chb.2020.106531" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.chb.2020.106531</a>">https://doi.org/10.1016/j.chb.2020.106531</ext-link>
  51. Yeng, P. K., Szekeres, A., Yang, B., &amp; Snekkenes, E. A. (2021). Mapping the psychosocialcultural aspects of healthcare professionals’ information security practices: Systematic mapping study. JMIR Human Factors, 8(2). <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.2196/17604" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.2196/17604</a>">https://doi.org/10.2196/17604</ext-link>
  52. Purnomo, Y. J. (2024). Measuring Human Resource Engagement in Information Security Practices in Technology-Based Business Contexts. Technology and Society Perspectives (TACIT), 2(1), 201–207. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.61100/tacit.v2i1.152" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.61100/tacit.v2i1.152</a>">https://doi.org/10.61100/tacit.v2i1.152</ext-link>
  53. Wiley, A., McCormac, A., Calic, D (2020). More than the individual: Examining the relationship between culture and Information Security Awareness, Computers &amp; Security 88, doi <pub-id pub-id-type="doi"><a href="https://doi.org/10.1016/j.cose.2019.101640" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.cose.2019.101640</a></pub-id>
  54. Iwaya, L. H., Iwaya, G. H., Fischer-Hubner, S., &amp; Steil, A. V. (2022). Organisational Privacy Culture and Climate: A Scoping Review. In IEEE Access (Vol. 10, pp. 73907–73930). Institute of Electrical and Electronics Engineers Inc. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/ACCESS.2022.3190373" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/ACCESS.2022.3190373</a>">https://doi.org/10.1109/ACCESS.2022.3190373</ext-link>
  55. Apolinário, S., Yoshikuni, A. C., &amp; Larieira, C. L. C. (2023). Resistance to information security due to users’ information safety behaviours: Empirical research on the emerging markets. In Computers in Human Behaviour (Vol. 145). Elsevier Ltd. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.chb.2023.107772" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.chb.2023.107772</a>">https://doi.org/10.1016/j.chb.2023.107772</ext-link>
  56. Pham, H., Brennan, L., &amp; Richardson, J. (2017). Review of Behavioural Theories in Security Compliance and Research Challenge. Proceedings of the 2017 InSITE Conference, 065–076. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.28945/3722" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.28945/3722</a>">https://doi.org/10.28945/3722</ext-link>
  57. Borgert, N., Jansen, L., Böse, I., Friedauer, J., Sasse, M. A., &amp; Elson, M. (2024, May 11). Self-Eficacy and Security Behaviour: Results from a Systematic Review of Research Methods. Conference on Human Factors in Computing Systems - Proceedings. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1145/3613904.3642432" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1145/3613904.3642432</a>">https://doi.org/10.1145/3613904.3642432</ext-link>
  58. Rocha Flores, W., &amp; Ekstedt, M. (2016). Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. Computers and Security, 59, 26–44. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2016.01.004" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2016.01.004</a>">https://doi.org/10.1016/j.cose.2016.01.004</ext-link>
  59. Mubarkoot, M., Altmann, J., Rasti-Barzoki, M., Egger, B., &amp; Lee, H. (2023). Software Compliance Requirements, Factors, and Policies: A Systematic Literature Review. In Computers and Security (Vol. 124). Elsevier Ltd. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2022.102985" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2022.102985</a>">https://doi.org/10.1016/j.cose.2022.102985</ext-link>
  60. Paananen, H., Lapke, M., &amp; Siponen, M. (2020). State of the art in information security policy development. In Computers and Security (Vol. 88). Elsevier Ltd. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2019.101608" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2019.101608</a>">https://doi.org/10.1016/j.cose.2019.101608</ext-link>
  61. Kuppusamy, P., Samy, G. N., Maarop, N., Magalingam, P., Kamaruddin, N., Shanmugam, B., &amp; Perumal, S. (2020). Systematic Literature Review of Information Security Compliance Behaviour Theories. Journal of Physics: Conference Series, 1551(1). <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1088/1742-6596/1551/1/012005" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1088/1742-6596/1551/1/012005</a>">https://doi.org/10.1088/1742-6596/1551/1/012005</ext-link>
  62. Marsh, E., Vallejos, E. P., &amp; Spence, A. (2022). The digital workplace and its dark side: An integrative review. In Computers in Human Behaviour (Vol. 128). Elsevier Ltd. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.chb.2021.107118" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.chb.2021.107118</a>">https://doi.org/10.1016/j.chb.2021.107118</ext-link>
  63. Suranto S., Suharto S., Harry Indratjahyo H. I. (2022). The Effect of Leadership and Organizational Culture in Increasing Employee Performance with Work Motivation as a Mediation Variable at Coordinating Ministry for Political, Legal and Security Affairs; Journal of Economics, Finance and Management Studies, ISSN (online): 2644-0504, DOI: <a href="https://doi.org/10.47191/jefms/v5-i10-26" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.47191/jefms/v5-i10-26</a>
  64. Tam, T., Rao, A., &amp; Hall, J. (2021). The good, the bad and the missing: A Narrative review of cyber-security implications for australian small businesses. In Computers and Security (Vol. 109). Elsevier Ltd. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2021.102385" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2021.102385</a>">https://doi.org/10.1016/j.cose.2021.102385</ext-link>
  65. Petrič, G., &amp; Roer, K. (2022). The impact of formal and informal organizational norms on susceptibility to phishing: Combining survey and field experiment data. Telematics and Informatics, 67. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.tele.2021.101766" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.tele.2021.101766</a>">https://doi.org/10.1016/j.tele.2021.101766</ext-link>
  66. Liu, L., Tai, H. W., Cheng, K. T., Wei, C. C., Lee, C. Y., &amp; Chen, Y. H. (2022). The Multi-Dimensional Interaction Effect of Culture, Leadership Style, and Organizational Commitment on Employee Involvement within Engineering Enterprises: Empirical Study in Taiwan. Sustainability 2022, 14(16). <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.3390/su14169963" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.3390/su14169963</a>">https://doi.org/10.3390/su14169963</ext-link>
  67. Hoffman, F., &amp; Skovira, R. J. (2020). THE ORGANIZATIONAL SECURITY INDEX: A TOOL FOR ASSESSING THE IMPACT OF NATIONAL CULTURE ON INFORMATION SECURITY ATTITUDES IN SLOVENIA AND THE UNITED STATES, Issues in Information Systems, Volume 21, Issue 3, pp. 95-104, 2020, <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.48009/3_iis_2020_95-104" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.48009/3_iis_2020_95-104</a>">https://doi.org/10.48009/3_iis_2020_95-104</ext-link>
  68. Zyoud, B., &amp; Lutfi, S. L. (2024). The Role of Information Security Culture in Zero Trust Adoption: Insights From UAE Organizations. IEEE Access, 12, 72420–72444. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/ACCESS.2024.3402341" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/ACCESS.2024.3402341</a>">https://doi.org/10.1109/ACCESS.2024.3402341</ext-link>
  69. Moustafa, A. A., Bello, A., &amp; Maurushat, A. (2021). The Role of User Behaviour in Improving Cyber Security Management. In Frontiers in Psychology (Vol. 12). Frontiers Media S.A. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.3389/fpsyg.2021.561011" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.3389/fpsyg.2021.561011</a>">https://doi.org/10.3389/fpsyg.2021.561011</ext-link>
  70. Karjalainen, M., Siponen, M., &amp; Sarker, S. (2020). Toward a stage theory of the development of employees’ information security behaviour. Computers and Security, 93. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2020.101782" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2020.101782</a>">https://doi.org/10.1016/j.cose.2020.101782</ext-link>
  71. Sutton, A., &amp; Tompson, L. (2024). Towards a cybersecurity culture-behaviour framework: A rapid evidence review. Computers &amp; Security, 148, 104110. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2024.104110" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2024.104110</a>">https://doi.org/10.1016/j.cose.2024.104110</ext-link>
  72. Murray, G., Falkeling, M., &amp; Gao, S. (2024). Trends and challenges in research into the human aspects of ransomware: a systematic mapping study. In Information and Computer Security. Emerald Publishing. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1108/ICS-12-2022-0195" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1108/ICS-12-2022-0195</a>">https://doi.org/10.1108/ICS-12-2022-0195</ext-link>
  73. Chen, Y., Xia, W., &amp; Cousins, K. (2022). Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence. Computers and Security, 113. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2021.102568" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2021.102568</a>">https://doi.org/10.1016/j.cose.2021.102568</ext-link>
  74. Sahin, Z., &amp; Vance, A. (2024). What do we need to know about the Chief Information Security Officer? A literature review and research agenda. In Computers and Security (Vol. 148). Elsevier Ltd. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.cose.2024.104063" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.cose.2024.104063</a>">https://doi.org/10.1016/j.cose.2024.104063</ext-link>
  75. Edward L. Deci and Richard M. Ryan. ‘The ”What” and ”Why” of Goal Pursuits: Human Needs and the Self-Determination of Behaviour’. In: Psychological Inquiry 11.4 (2000), pp. 227–268. doi: <pub-id pub-id-type="doi"><a href="https://doi.org/10.1207/S15327965PLI1104\01" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1207/S15327965PLI1104\01</a></pub-id>
  76. Kim S. Cameron, Robert E. Quinn. ‘Diagnosing and changing organizational culture : based on the competing values framework’, Revised Edition, The Jossey-Bass Business &amp; Management Series, ISBN-13 978-0-7879-8283-6, (2006)
DOI: https://doi.org/10.2478/ijasitels-2024-0017 | Journal eISSN: 2559-365X | Journal ISSN: 2067-354X
Language: English
Page range: 55 - 77
Published on: Dec 18, 2024
Published by: Lucian Blaga University of Sibiu
In partnership with: Paradigm Publishing Services
Publication frequency: 2 times per year

© 2024 Iulia Feraru, Laura Bacali, published by Lucian Blaga University of Sibiu
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.