MbrlCatalogueTitleDetail

Do you wish to reserve the book?
Formulating the Cyber Security Culture in Organizations: Proposing and Arguing Insights
Formulating the Cyber Security Culture in Organizations: Proposing and Arguing Insights
Hey, we have placed the reservation for you!
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Formulating the Cyber Security Culture in Organizations: Proposing and Arguing Insights
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Title added to your shelf!
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Formulating the Cyber Security Culture in Organizations: Proposing and Arguing Insights
Formulating the Cyber Security Culture in Organizations: Proposing and Arguing Insights

Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
How would you like to get it?
We have requested the book for you! Sorry the robot delivery is not available at the moment
We have requested the book for you!
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Formulating the Cyber Security Culture in Organizations: Proposing and Arguing Insights
Formulating the Cyber Security Culture in Organizations: Proposing and Arguing Insights
Journal Article

Formulating the Cyber Security Culture in Organizations: Proposing and Arguing Insights

2023
Request Book From Autostore and Choose the Collection Method
Overview
Purpose: This research aims to enhance practical organizational practices and academic research literature by critically investigating the latest findings in cybersecurity culture research through a systematic review of relevant literature and research.   Theoretical Framework:This work seeks to summarize key research developments in a research area that remains challenging for companies as they seek to build strong security cultures to protect their information (Tripwire, 2020). And reviewing the legal regulations that must be trained to protect institutions from cyber threats in the Kingdom of Bahrain and Saudi Arabia.   Design/Methodology/Approach: The methodology of this study implements a systematic literature review to assess the main components of cybersecurity culture and what good practice can help to build it professionally.    Findings: The main results find that current literature must move from a technical approach to information security to a socio-cultural one. Also, this study predicts that cybercrime will increase dramatically and cost the world trillions annually.    Research Practical and Social Implications: this study attempts to define human resource management's role in cybersecurity awareness training and therfore the managers can deveplo the necessary rules to secure the organizational information.   Originality/Value: The study is within the first studies  to  be  conducted  in  GCC countries.  Moreover, the  to build a cyber security culture is unique topic add on to the academic knowledge. Also, can motivate the future studies to focus on efficiently organizing security procedures and enhancing security readiness appraisal consequences by providing more perceptions of imminent threats and security hazards.