2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT) 2019
DOI: 10.1109/jeeit.2019.8717438
|View full text |Cite
|
Sign up to set email alerts
|

Information Security Policy Perceived Compliance Among Staff in Palestine universities: An Empirical Pilot study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…Using the general deterrence theory (GDT), they identified demographic and human reasons behind IS violations and deployed a series of theories (i.e., GDT, PMT, and TPB) to evaluate predictors of ISCB. They found that ISCB was influenced by awareness, sanction certainty, and self-efficacy [28]. They also evaluated the potential factors influencing ISCB and information security awareness in business contexts.…”
Section: Literature Studiesmentioning
confidence: 99%
“…Using the general deterrence theory (GDT), they identified demographic and human reasons behind IS violations and deployed a series of theories (i.e., GDT, PMT, and TPB) to evaluate predictors of ISCB. They found that ISCB was influenced by awareness, sanction certainty, and self-efficacy [28]. They also evaluated the potential factors influencing ISCB and information security awareness in business contexts.…”
Section: Literature Studiesmentioning
confidence: 99%
“…There is a need to understand what influences compliance with information security policies (ISPs) [7,8]. Understanding employees' information security behaviour, is an important step in the assessment and consequently the improvement of information security behaviour [9].…”
Section: Introductionmentioning
confidence: 99%