Reviewing Influence of UTAUT2 Factors on Cyber Security Compliance: A Literature Review
نویسندگان
چکیده
Evidence suggests that, regardless of the number technical controls in place, organizations will still experience security breaches. Organizations spend millions dollars on their cyber infrastructure that includes and non-technical measures but mostly disregarded most important asset vulnerability human.
منابع مشابه
Literature Review on Smart Grid Cyber Security
The current U.S. electrical power grid is an out-of-date infrastructure, and the Smart Grid is an upgrade that will add many new functionalities to meet customers’ new power requirements. Updating a system as complex as the electrical power grid has the potential of introducing new security vulnerabilities into the system. This document presents a review of the work related to Smart Grid cyber ...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Systematic Review of Studies on Cyber Physical System Security
Cyber-Physical System (CPS) is a system of systems which integrates physical system with cyber capability in order to improve the physical performance [1]. So far, it is being widely applied in areas closely related to national economy and people’s daily lives. Therefore, CPS security problems have drawn a global attention and an appropriate risk assessment for CPS is in urgent need. According ...
متن کاملInfluence of Security Compliance Demands and Resources on Security Compliance-An Exploratory Study in Vietnam
This study extends current information security compliance research by adapting “work-stress model” of the Job Demands-Resources (JD-R) model to explore how security compliance demands and security resources influence the system users’ information security compliance. The paper proposes that security compliance burnout and security engagement as the mediating factors between security compliance...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of information assurance & cybersecurity
سال: 2021
ISSN: ['2165-9923']
DOI: https://doi.org/10.5171/2021.666987