Reviewing Influence of UTAUT2 Factors on Cyber Security Compliance: A Literature Review

نویسندگان

چکیده

Evidence suggests that, regardless of the number technical controls in place, organizations will still experience security breaches. Organizations spend millions dollars on their cyber infrastructure that includes and non-technical measures but mostly disregarded most important asset vulnerability human.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Literature Review on Smart Grid Cyber Security

The current U.S. electrical power grid is an out-of-date infrastructure, and the Smart Grid is an upgrade that will add many new functionalities to meet customers’ new power requirements. Updating a system as complex as the electrical power grid has the potential of introducing new security vulnerabilities into the system. This document presents a review of the work related to Smart Grid cyber ...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Systematic Review of Studies on Cyber Physical System Security

Cyber-Physical System (CPS) is a system of systems which integrates physical system with cyber capability in order to improve the physical performance [1]. So far, it is being widely applied in areas closely related to national economy and people’s daily lives. Therefore, CPS security problems have drawn a global attention and an appropriate risk assessment for CPS is in urgent need. According ...

متن کامل

Influence of Security Compliance Demands and Resources on Security Compliance-An Exploratory Study in Vietnam

This study extends current information security compliance research by adapting “work-stress model” of the Job Demands-Resources (JD-R) model to explore how security compliance demands and security resources influence the system users’ information security compliance. The paper proposes that security compliance burnout and security engagement as the mediating factors between security compliance...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of information assurance & cybersecurity

سال: 2021

ISSN: ['2165-9923']

DOI: https://doi.org/10.5171/2021.666987