Publication:
Cyber�Information Security Compliance and Violation Behaviour in Organisations: A Systematic Review

dc.contributor.authorSulaiman N.S.en_US
dc.contributor.authorFauzi M.A.en_US
dc.contributor.authorWider W.en_US
dc.contributor.authorRajadurai J.en_US
dc.contributor.authorHussain S.en_US
dc.contributor.authorHarun S.A.en_US
dc.contributor.authorid57217632988en_US
dc.contributor.authorid57201009714en_US
dc.contributor.authorid57193087794en_US
dc.contributor.authorid13907110500en_US
dc.contributor.authorid57225014964en_US
dc.contributor.authorid57217634429en_US
dc.date.accessioned2023-05-29T09:36:34Z
dc.date.available2023-05-29T09:36:34Z
dc.date.issued2022
dc.description.abstractCyber and information security (CIS) is an issue of national and international interest. Despite sophisticated security systems and extensive physical countermeasures to combat cyber-attacks, organisations are vulnerable due to the involvement of the human factor. Humans are regarded as the weakest link in cybersecurity systems as development in digital technology advances. The area of cybersecurity is an extension of the previously studied fields of information and internet security. The need to understand the underlying human behavioural factors associated with CIS policy warrants further study, mainly from theoretical perspectives. Based on these underlying theoretical perspectives, this study reviews literature focusing on CIS compliance and violations by personnel within organisations. Sixty studies from the years 2008 to 2020 were reviewed. Findings suggest that several prominent theories were used extensively and integrated with another specific theory. Protection Motivation Theory (PMT), the Theory of Planned Behaviour (TPB), and General Deterrence Theory (GDT) were identified as among the most referred-to theories in this area. The use of current theories is discussed based on their emerging importance and their suitability in future CIS studies. This review lays the foundation for future researchers by determining gaps and areas within the CIS context and encompassing employee compliance and violations within an organisation. � 2022 by the authors.en_US
dc.description.natureFinalen_US
dc.identifier.ArtNo386
dc.identifier.doi10.3390/socsci11090386
dc.identifier.issue9
dc.identifier.scopus2-s2.0-85138670140
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85138670140&doi=10.3390%2fsocsci11090386&partnerID=40&md5=d1366b899f6db4e234c43ea600389ead
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/26761
dc.identifier.volume11
dc.publisherMDPIen_US
dc.relation.ispartofAll Open Access, Gold
dc.sourceScopus
dc.sourcetitleSocial Sciences
dc.titleCyber�Information Security Compliance and Violation Behaviour in Organisations: A Systematic Reviewen_US
dc.typeReviewen_US
dspace.entity.typePublication
Files
Collections