{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T18:21:59Z","timestamp":1778091719687,"version":"3.51.4"},"reference-count":87,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T00:00:00Z","timestamp":1712707200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSIT"],"published-print":{"date-parts":[[2024,5,7]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>This paper aims to explore the factors affecting cybersecurity implementation in organizations in various countries and develop a cybersecurity framework to improve cybersecurity practices within organizations for cybersecurity risk management through a systematic literature review (SLR) approach.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>This SLR adhered to RepOrting Standards for Systematics Evidence Syntheses (ROSES) publication standards and used various research approaches. The study\u2019s article selection process involved using Scopus, one of the most important scientific databases, to review articles published between 2014 and 2023.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>This review identified the four main themes: individual factors, organizational factors, technological factors and governmental role. In addition, nine subthemes that relate to these primary topics were established.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This research sheds light on the multifaceted nature of cybersecurity by exploring factors influencing implementation and developing an improvement framework, offering valuable insights for researchers to advance theoretical developments, assisting industry practitioners in tailoring cybersecurity strategies to their needs and providing policymakers with a basis for creating more effective cybersecurity regulations and standards.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/jsit-07-2023-0132","type":"journal-article","created":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T09:18:36Z","timestamp":1712567916000},"page":"234-256","source":"Crossref","is-referenced-by-count":13,"title":["Building a thematic framework of cybersecurity: a systematic literature review approach"],"prefix":"10.1108","volume":"26","author":[{"given":"Tze Yin","family":"Khaw","sequence":"first","affiliation":[]},{"given":"Azlan","family":"Amran","sequence":"additional","affiliation":[]},{"given":"Ai Ping","family":"Teoh","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2024,4,10]]},"reference":[{"issue":"2","key":"key2024050608010476800_ref001","first-page":"113","article-title":"Effectiveness of instructional strategies designed for older adults in learning digital technologies: a systematic literature review","volume":"3","year":"2022","journal-title":"SN Computer Science"},{"issue":"2","key":"key2024050608010476800_ref002","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1108\/ICS-10-2017-0073","article-title":"Security monitoring and information security assurance behaviour among employees: an empirical analysis","volume":"27","year":"2019","journal-title":"Information and Computer Security"},{"issue":"6","key":"key2024050608010476800_ref003","doi-asserted-by":"publisher","first-page":"1151","DOI":"10.1080\/0144929X.2020.1856928","article-title":"The influence of hardiness and habit on security behaviour intention","volume":"41","year":"2022","journal-title":"Behaviour and Information Technology"},{"issue":"1","key":"key2024050608010476800_ref004","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1108\/ICS-03-2014-0018","article-title":"An examination of factors that influence the number of information security policy violations in Qatari organizations","volume":"23","year":"2015","journal-title":"Information and Computer Security"},{"issue":"1","key":"key2024050608010476800_ref005","first-page":"1","article-title":"Smart grid security: Threats, vulnerabilities and solutions","volume":"1","year":"2012","journal-title":"International Journal of Smart Grid and Clean Energy"},{"issue":"1","key":"key2024050608010476800_ref006","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1108\/ICS-09-2016-0073","article-title":"Information security policy compliance: a higher education case study","volume":"26","year":"2018","journal-title":"Information and Computer Security"},{"issue":"4","key":"key2024050608010476800_ref007","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1108\/ICS-10-2021-0169","article-title":"The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors","volume":"30","year":"2022","journal-title":"Information and Computer Security"},{"issue":"2","key":"key2024050608010476800_ref008","doi-asserted-by":"publisher","first-page":"4880","DOI":"10.35940\/ijrte.B3653.078219","article-title":"Improving information security performance: the role of management support and security operation center","volume":"8","year":"2019","journal-title":"International Journal of Recent Technology and Engineering (IJRTE)"},{"key":"key2024050608010476800_ref009","doi-asserted-by":"publisher","first-page":"102641","DOI":"10.1016\/j.cose.2022.102641","article-title":"A longitudinal study on improving employee information protective knowledge and behaviors","volume":"116","year":"2022","journal-title":"Computers and Security"},{"issue":"1","key":"key2024050608010476800_ref010","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/IJBCRM.2018.090580","article-title":"An initial assessment of small business risk management approaches for cyber security threats","volume":"8","year":"2018","journal-title":"International Journal of Business Continuity and Risk Management"},{"issue":"2","key":"key2024050608010476800_ref011","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1057\/jit.2014.26","article-title":"On being \u2018systematic\u2019 in literature reviews in IS","volume":"30","year":"2015","journal-title":"Journal of Information Technology"},{"issue":"2","key":"key2024050608010476800_ref012","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1108\/ICS-09-2022-0152","article-title":"COVID-19 pandemic-induced organisational cultural shifts and employee information security compliance behaviour: a South African case study","volume":"31","year":"2023","journal-title":"Information and Computer Security"},{"issue":"4","key":"key2024050608010476800_ref013","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1080\/08874417.2016.1258679","article-title":"Factors that influence employees\u201d security policy compliance: an awareness-motivation-capability perspective","volume":"58","year":"2018","journal-title":"Journal of Computer Information Systems"},{"issue":"3","key":"key2024050608010476800_ref014","doi-asserted-by":"publisher","first-page":"299","DOI":"10.18280\/ijsse.120304","article-title":"Cybersecurity training in Norwegian critical infrastructure companies","volume":"12","year":"2022","journal-title":"International Journal of Safety and Security Engineering"},{"key":"key2024050608010476800_ref015","unstructured":"Collier, K. (2023), \u201cWhite house looks to put cybersecurity pressure on companies\u201d, NBCNews.com, NBCUniversal News Group, 2 March, available at: www.nbcnews.com\/tech\/security\/white-house-looks-put-cybersecurity-pressure-companies-rcna72941 (accessed 3 March 2023)."},{"issue":"5","key":"key2024050608010476800_ref016","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1108\/IMCS-08-2013-0057","article-title":"Security culture and the employment relationship as drivers of employees\u201d security compliance","volume":"22","year":"2014","journal-title":"Information Management and Computer Security"},{"issue":"8","key":"key2024050608010476800_ref017","doi-asserted-by":"publisher","first-page":"1796","DOI":"10.1080\/0144929X.2021.1905066","article-title":"What we think we know about cybersecurity: an investigation of the relationship between perceived knowledge, internet trust, and protection motivation in a cybercrime context","volume":"41","year":"2022","journal-title":"Behaviour and Information Technology"},{"issue":"3","key":"key2024050608010476800_ref018","doi-asserted-by":"publisher","first-page":"1198","DOI":"10.11591\/ijere.v11i3.22863","article-title":"Cybersecurity program for Philippine higher education institutions: a multiple-case study","volume":"11","year":"2022","journal-title":"International Journal of Evaluation and Research in Education (IJERE)"},{"key":"key2024050608010476800_ref019","unstructured":"Dewey, A. and Drahota, A. (2016), \u201cIntroduction to systematic reviews: online learning module Cochrane training\u201d, available at: https:\/\/training.cochrane.org\/interactivelearning\/module-1-introduction-conducting-systematic-reviews (accessed 3 March 2023)."},{"key":"key2024050608010476800_ref020","doi-asserted-by":"publisher","first-page":"102954","DOI":"10.1016\/j.cose.2022.102954","article-title":"Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: a UK survey for 2018 and 2019","volume":"124","year":"2023","journal-title":"Computers and Security"},{"issue":"3","key":"key2024050608010476800_ref021","first-page":"716","article-title":"Cybersecurity in the automotive industry: a systematic literature review (SLR)","volume":"63","year":"2022","journal-title":"Journal of Computer Information Systems"},{"key":"key2024050608010476800_ref022","doi-asserted-by":"publisher","first-page":"113818","DOI":"10.1016\/j.dss.2022.113818","article-title":"Contextual drivers of employees\u201d phishing susceptibility: insights from a field study","volume":"160","year":"2022","journal-title":"Decision Support Systems"},{"issue":"3","key":"key2024050608010476800_ref023","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1108\/IMDS-05-2022-0313","article-title":"Interplay between cyber supply chain risk management practices and cyber security performance","volume":"123","year":"2022","journal-title":"Industrial Management and Data Systems"},{"key":"key2024050608010476800_ref024","doi-asserted-by":"publisher","first-page":"102583","DOI":"10.1016\/j.technovation.2022.102583","article-title":"Resilience in healthcare systems: cyber security and digital transformation","volume":"121","year":"2022","journal-title":"Technovation"},{"issue":"3","key":"key2024050608010476800_ref025","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1111\/jori.12381","article-title":"Cyber risk management in the US banking and insurance industry: a textual and empirical analysis of determinants and value","volume":"89","year":"2022","journal-title":"Journal of Risk and Insurance"},{"issue":"1","key":"key2024050608010476800_ref026","first-page":"1","article-title":"ROSES reporting standards for systematic evidence syntheses: pro forma, flow-diagram and descriptive summary of the plan and conduct of environmental systematic reviews and systematic maps","volume":"7","year":"2018","journal-title":"Environmental Evidence"},{"key":"key2024050608010476800_ref027","doi-asserted-by":"publisher","first-page":"102726","DOI":"10.1016\/j.jisa.2020.102726","article-title":"Evaluating the cyber security readiness of organizations and its influence on performance","volume":"58","year":"2021","journal-title":"Journal of Information Security and Applications"},{"issue":"2","key":"key2024050608010476800_ref028","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1108\/13287261211232180","article-title":"A review of social media security risks and mitigation techniques","volume":"14","year":"2012","journal-title":"Journal of Systems and Information Technology"},{"issue":"1","key":"key2024050608010476800_ref029","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/jcp2010001","article-title":"Cybersecurity practices for social media users: a systematic literature review","volume":"2","year":"2022","journal-title":"Journal of Cybersecurity and Privacy"},{"key":"key2024050608010476800_ref030","doi-asserted-by":"publisher","first-page":"101432","DOI":"10.1016\/j.jup.2022.101432","article-title":"Cybersecurity and resilience in the Swiss electricity sector: status and policy options","volume":"79","year":"2022","journal-title":"Utilities Policy"},{"issue":"1","key":"key2024050608010476800_ref031","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.im.2013.10.001","article-title":"Information systems security policy compliance: an empirical study of the effects of socialisation, influence, and cognition","volume":"51","year":"2014","journal-title":"Information and Management"},{"issue":"1","key":"key2024050608010476800_ref032","doi-asserted-by":"publisher","first-page":"53","DOI":"10.4018\/IRMJ.2018010103","article-title":"Roles of organizational climate, social bonds, and perceptions of security threats on IS security policy compliance intentions","volume":"31","year":"2018","journal-title":"Information Resources Management Journal"},{"issue":"3","key":"key2024050608010476800_ref033","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1108\/ICS-06-2021-0073","article-title":"The effect of perceived organizational culture on employees","volume":"30","year":"2022","journal-title":"Information and Computer Security"},{"key":"key2024050608010476800_ref034","doi-asserted-by":"crossref","first-page":"65044","DOI":"10.1109\/ACCESS.2022.3179822","article-title":"Analyzing and evaluating critical cyber security challenges faced by vendor organizations in software development: SLR based approach","volume":"10","year":"2022","journal-title":"IEEE Access"},{"issue":"2","key":"key2024050608010476800_ref035","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1108\/QAE-04-2022-0097","article-title":"Risk management in higher education research: a systematic literature review","volume":"31","year":"2023","journal-title":"Quality Assurance in Education"},{"issue":"1","key":"key2024050608010476800_ref036","doi-asserted-by":"publisher","first-page":"449","DOI":"10.21511\/ppm.18(1),.2020.39","article-title":"Cyber-security effect on organizational internal process: mediating role of technological infrastructure","volume":"18","year":"2020","journal-title":"Problems and Perspectives in Management"},{"issue":"3","key":"key2024050608010476800_ref037","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s10799-015-0217-5","article-title":"Relationships between need-pull\/technology-push and information security management and the moderating role of regulatory pressure","volume":"16","year":"2015","journal-title":"Information Technology and Management"},{"issue":"1","key":"key2024050608010476800_ref038","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","article-title":"Systematic literature reviews in software engineering\u2013a systematic literature review","volume":"51","year":"2009","journal-title":"Information and Software Technology"},{"issue":"4","key":"key2024050608010476800_ref039","doi-asserted-by":"crossref","first-page":"2081","DOI":"10.9770\/jesi.2019.6.4(37)","article-title":"Information security management in SMEs: factors of success","volume":"6","year":"2019","journal-title":"Entrepreneurship and Sustainability Issues"},{"issue":"3","key":"key2024050608010476800_ref040","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.1007\/s11365-020-00635-4","article-title":"The art of crafting a systematic literature review in entrepreneurship research","volume":"16","year":"2022","journal-title":"International Entrepreneurship and Management Journal"},{"issue":"1","key":"key2024050608010476800_ref041","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3233\/THC-161263","article-title":"Cybersecurity in healthcare: a systematic review of modern threats and trends","volume":"25","year":"2017","journal-title":"Technology and Health Care"},{"issue":"6","key":"key2024050608010476800_ref042","doi-asserted-by":"publisher","first-page":"1597","DOI":"10.1108\/JEIM-06-2020-0240","article-title":"Antecedents for enhanced level of cyber-security in organisations","volume":"34","year":"2021","journal-title":"Journal of Enterprise Information Management"},{"key":"key2024050608010476800_ref043","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ijinfomgt.2018.10.017","article-title":"Investigating the impact of cybersecurity policy awareness on employees' cybersecurity behavior","volume":"45","year":"2019","journal-title":"International Journal of Information Management"},{"issue":"28","key":"key2024050608010476800_ref044","doi-asserted-by":"publisher","first-page":"102152","DOI":"10.1016\/j.ijinfomgt.2020.102152","article-title":"Motivating information security policy compliance: the critical role of supervisor-subordinate Guanxi and organizational commitment","volume":"54","year":"2020","journal-title":"International Journal of Information Management"},{"issue":"6","key":"key2024050608010476800_ref045","doi-asserted-by":"publisher","first-page":"3757","DOI":"10.1109\/TEM.2020.2996175","article-title":"Cyber-resiliency for digital enterprises: a strategic leadership perspective","volume":"69","year":"2022","journal-title":"IEEE Transactions on Engineering Management"},{"issue":"21","key":"key2024050608010476800_ref046","doi-asserted-by":"publisher","first-page":"11174","DOI":"10.3390\/app122111174","article-title":"Cyber trust index: a framework for rating and improving cybersecurity performance","volume":"12","year":"2022","journal-title":"Applied Sciences"},{"key":"key2024050608010476800_ref047","doi-asserted-by":"crossref","first-page":"102820","DOI":"10.1016\/j.cose.2022.102820","article-title":"Attributes impacting cybersecurity policy development: an evidence from seven nations","volume":"120","year":"2022","journal-title":"Computers and Security"},{"issue":"1","key":"key2024050608010476800_ref048","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10799-013-0156-y","article-title":"Perceived information security of internal users in Indian IT services industry","volume":"15","year":"2014","journal-title":"Information Technology and Management"},{"issue":"10","key":"key2024050608010476800_ref049","doi-asserted-by":"crossref","first-page":"10749","DOI":"10.1016\/j.heliyon.2022.e10749","article-title":"Impact of competition on microfinance institutions: bibliometric analysis and systematic literature review","volume":"8","year":"2022","journal-title":"Heliyon"},{"issue":"4","key":"key2024050608010476800_ref050","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1080\/02684527.2020.1752459","article-title":"Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation","volume":"35","year":"2020","journal-title":"Intelligence and National Security"},{"issue":"7","key":"key2024050608010476800_ref051","doi-asserted-by":"publisher","first-page":"103507","DOI":"10.1016\/j.im.2021.103507","article-title":"Informing cybersecurity strategic commitment through top management perceptions: the role of institutional pressures","volume":"58","year":"2021","journal-title":"Information and Management"},{"issue":"1","key":"key2024050608010476800_ref052","first-page":"43","article-title":"A guide to conducting a standalone systematic literature review","volume":"37","year":"2015","journal-title":"Communications of the Association for Information Systems"},{"issue":"2","key":"key2024050608010476800_ref053","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3424282","article-title":"Assessing the moderating effect of security technologies on employees compliance with cybersecurity control procedures","volume":"12","year":"2021","journal-title":"ACM Transactions on Management Information Systems"},{"issue":"3","key":"key2024050608010476800_ref054","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1108\/ICS-11-2020-0185","article-title":"Enterprise risk management and information technology security in the financial sector","volume":"30","year":"2022","journal-title":"Information and Computer Security"},{"issue":"4","key":"key2024050608010476800_ref055","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1108\/09685221011079199","article-title":"A survey of intrusion detection and prevention systems","volume":"18","year":"2010","journal-title":"Information Management and Computer Security"},{"issue":"1","key":"key2024050608010476800_ref056","doi-asserted-by":"publisher","first-page":"100080","DOI":"10.1016\/j.jjimei.2022.100080","article-title":"LCCI: a framework for least cybersecurity controls to be implemented for small and medium enterprises (SMEs)","volume":"2","year":"2022","journal-title":"International Journal of Information Management Data Insights"},{"key":"key2024050608010476800_ref057","volume-title":"Systematic Reviews in the Social Sciences: A Practical Guide","year":"2008"},{"key":"key2024050608010476800_ref058","doi-asserted-by":"crossref","first-page":"100343","DOI":"10.1016\/j.ijcci.2021.100343","article-title":"Cybersecurity awareness for children: a systematic literature review","volume":"30","year":"2021","journal-title":"International Journal of Child-Computer Interaction"},{"key":"key2024050608010476800_ref059","doi-asserted-by":"crossref","first-page":"123717","DOI":"10.1016\/j.jclepro.2020.123717","article-title":"Mitigating climate change via food consumption and food waste: a systematic map of behavioral interventions","volume":"279","year":"2021","journal-title":"Journal of Cleaner Production"},{"key":"key2024050608010476800_ref060","unstructured":"Rende, J. (2023), \u201cCouncil post: Why overcoming the cybersecurity labor shortage matters to company success\u201d, Forbes, Forbes Magazine, 2 March, available at: www.forbes.com\/sites\/forbestechcouncil\/2023\/03\/01\/why-overcoming-the-cybersecurity-labor-shortage-matters-to-company-success\/?sh=8fe30cb7766b (accessed 3 March 2023)."},{"issue":"2","key":"key2024050608010476800_ref0110","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1111\/1753-6405.12393","article-title":"Literature reviews vs systematic reviews","volume":"39","year":"2015","journal-title":"Australian and New Zealand Journal of Public Health"},{"issue":"3","key":"key2024050608010476800_ref061","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1108\/ICS-01-2019-0010","article-title":"It is not my job: exploring the disconnect between corporate security policies and actual security practices in SMEs","volume":"28","year":"2020","journal-title":"Information and Computer Security"},{"key":"key2024050608010476800_ref062","article-title":"Security issues in IoT and cloud computing service models with suggested solutions","volume":"2022","year":"2022","journal-title":"Security and Communication Networks"},{"key":"key2024050608010476800_ref063","unstructured":"SentinelOne (2023), \u201cThe national cybersecurity strategy: how the US government plans to protect America\u201d, SentinelOne, 2 March, available at: www.sentinelone.com\/blog\/the-national-cybersecurity-strategy-how-the-us-government-plans-to-protect-america\/ (accessed 3 March 2023)."},{"key":"key2024050608010476800_ref064","doi-asserted-by":"publisher","first-page":"102974","DOI":"10.1016\/j.cose.2022.102974","article-title":"Information security risk assessments following cybersecurity breaches: the mediating role of top management attention to cybersecurity","volume":"124","year":"2023","journal-title":"Computers and Security"},{"key":"key2024050608010476800_ref065","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102774","article-title":"Organizational and team culture as antecedents of protection motivation among IT employees","volume":"120","year":"2022","journal-title":"Computers and Security"},{"key":"key2024050608010476800_ref066","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102756","article-title":"Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise","volume":"119","year":"2022","journal-title":"Computers and Security"},{"key":"key2024050608010476800_ref067","first-page":"1","article-title":"What the profession of cybersecurity needs to know and do","year":"2019","journal-title":"The EDP Audit, Control, and Security Newsletter"},{"issue":"2","key":"key2024050608010476800_ref068","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.im.2013.08.006","article-title":"Employees\u201d adherence to information security policies: an exploratory field study","volume":"51","year":"2014","journal-title":"Information and Management"},{"key":"key2024050608010476800_ref069","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/j.future.2018.09.063","article-title":"Government regulations in cyber security: Framework, standards and recommendations","volume":"92","year":"2019","journal-title":"Future Generation Computer Systems"},{"issue":"5","key":"key2024050608010476800_ref070","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1108\/ICS-07-2016-0054","article-title":"Information security management and the human aspect in organizations","volume":"25","year":"2017","journal-title":"Information and Computer Security"},{"issue":"1","key":"key2024050608010476800_ref071","first-page":"3","article-title":"Editor's comments: Rigor and relevance in is research: redefining the debate and a call for future research","volume":"35","year":"2011","journal-title":"MIS Quarterly"},{"issue":"3","key":"key2024050608010476800_ref072","doi-asserted-by":"publisher","first-page":"102282","DOI":"10.1016\/j.telpol.2021.102282","article-title":"Analysis of cybersecurity competencies: Recommendations for telecommunications policy","volume":"46","year":"2022","journal-title":"Telecommunications Policy"},{"issue":"14","key":"key2024050608010476800_ref073","doi-asserted-by":"crossref","first-page":"2181","DOI":"10.3390\/electronics11142181","article-title":"Understanding cybersecurity frameworks and information security standards\u2014a review and comprehensive overview","volume":"11","year":"2022","journal-title":"Electronics"},{"issue":"2","key":"key2024050608010476800_ref013000","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1111\/lsi.12303","article-title":"Data breach, privacy, and cyber insurance: how insurance companies act as \u2018compliance managers\u2019 for businesses","volume":"43","year":"2018","journal-title":"Law & Social Inquiry"},{"key":"key2024050608010476800_ref074","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2021.105595","article-title":"What influences employees to follow security policies?","volume":"147","year":"2022","journal-title":"Safety Science"},{"issue":"2","key":"key2024050608010476800_ref075","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.dcan.2019.01.005","article-title":"A systematic literature review of blockchain cyber security","volume":"6","year":"2020","journal-title":"Digital Communications and Networks"},{"issue":"4","key":"key2024050608010476800_ref076","doi-asserted-by":"publisher","first-page":"110","DOI":"10.3390\/bdcc6040110","article-title":"Combining sociocultural intelligence with artificial intelligence to increase organizational cyber security provision through enhanced resilience","volume":"6","year":"2022","journal-title":"Big Data and Cognitive Computing"},{"issue":"3","key":"key2024050608010476800_ref01300","doi-asserted-by":"crossref","first-page":"573","DOI":"10.3390\/jcp2030029","article-title":"Addressing human factors in cybersecurity leadership","volume":"2","year":"2022","journal-title":"Journal of Cybersecurity and Privacy"},{"key":"key2024050608010476800_ref077","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102309","article-title":"Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation","volume":"106","year":"2021","journal-title":"Computers and Security"},{"key":"key2024050608010476800_ref078","doi-asserted-by":"publisher","first-page":"104282","DOI":"10.1016\/j.tourman.2021.104282","article-title":"Deterrence and leadership factors: which are important for information security policy compliance in the hotel industry","volume":"84","year":"2021","journal-title":"Tourism Management"},{"key":"key2024050608010476800_ref079","first-page":"1","article-title":"A survey on services provision and distribution of official and commercial intellectual property platforms","volume":"2020","year":"2020","journal-title":"Security and Communication Networks"},{"issue":"6","key":"key2024050608010476800_ref080","doi-asserted-by":"publisher","first-page":"3826","DOI":"10.1109\/TEM.2020.2994981","article-title":"Antecedents of cybersecurity implementation: a study of the cyber-preparedness of U.K. Social enterprises","volume":"69","year":"2022","journal-title":"IEEE Transactions on Engineering Management"},{"key":"key2024050608010476800_ref081","doi-asserted-by":"publisher","first-page":"102520","DOI":"10.1016\/j.ijinfomgt.2022.102520","article-title":"The role of cybersecurity and policy awareness in shifting employee compliance attitudes: building supply chain capabilities","volume":"66","year":"2022","journal-title":"International Journal of Information Management"},{"issue":"1","key":"key2024050608010476800_ref082","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1177\/0739456X17723971","article-title":"Guidance on conducting a systematic literature review","volume":"39","year":"2019","journal-title":"Journal of Planning Education and Research"},{"issue":"5","key":"key2024050608010476800_ref083","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1108\/ICS-09-2020-0153","article-title":"Users\u201d perception of cybersecurity, trust and cloud computing providers\u201d performance","volume":"29","year":"2021","journal-title":"Information and Computer Security"},{"key":"key2024050608010476800_ref084","first-page":"120","article-title":"Critical challenges for requirement implementation in context of global software development: a systematic literature review","volume-title":"2015 International Conference on Open Source Systems and Technologies (ICOSST)","year":"2015"}],"container-title":["Journal of Systems and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JSIT-07-2023-0132\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JSIT-07-2023-0132\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:23:54Z","timestamp":1753395834000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jsit\/article\/26\/2\/234-256\/1236369"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,10]]},"references-count":87,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024,4,10]]},"published-print":{"date-parts":[[2024,5,7]]}},"alternative-id":["10.1108\/JSIT-07-2023-0132"],"URL":"https:\/\/doi.org\/10.1108\/jsit-07-2023-0132","relation":{},"ISSN":["1328-7265","1328-7265"],"issn-type":[{"value":"1328-7265","type":"print"},{"value":"1328-7265","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,10]]}}}