- نورایی، فرزاد. (1391). بررسی و شناسایی عوامل موفقیت استقرار سیستم مدیریت امنیت اطلاعات ISMS در ایران ( مطالعه موردی بانک دی)، (پایاننامه کارشناسیارشد). دانشگاه سیستان و بلوچستان، زاهدان.
- زنجیرچی،س.م.، مروتی شریفآبادی، ع. و شاهحسینی بیده، ش.)1393(. مقایسة عملکرد سازمانها در پیادهسازی مدیریت ارتباط با مشتری با استفاده از رویکرد ترکیبی NAP و DEMATEL فازی، فصلنامه بازاریابی نوین، 4(3)،212-195.
- Kobes, P. Human factor aspects in information security management in the traditional IT and cloud computing models. Oper. Res.Decis. 2021, 1, 61–76.
- Florez, H. A Model of an Information Security Management System Based on NTC-ISO/IEC27001 Standard. IAENG Int. J. Comput. Sci. 2021, 48, IJCS_48_2_01
- Pérz-González, D.; Prciado, S.T.; Solna-Gonzalez, P. Organizational practices as antecedents of the information security management performance: An empirical investigation. Inf. Technol. People 2019, 32, 1262–1275
- Safa, N.S.; Von Salms, R. An information security knowledge sharing model in organizations. Computer. Hum. Behavior. 2016, 57, 442–451
- Hwang, I.; Kim, D.; Kim, T.; Kim, S. Why not comply with information security? An empirical approach for the causes of non-compliance. Online Inf. Rev. 2017.
- Miladinovi, V.T. Development of Awareness and Competences of Employees in the Processes of Information Security Management System: Guidelines for practical application. JITA-J. Inf. Technol. Appl. 2020, 20, 87–95.
- Putra, I.M.M.; Mutijrsa, K. Designing Information Security Risk Management on Bali Regional Police Command Center Based on ISO 27005. In Proceedings of the 2021 3rd East Indonesia Conference on Computer and Information Technology (EI Con CIT), Surabaya, Indonesia, 9–11 April 2021; pp. 14–19.
- Siponen, M.; Pahnila, S.; Mahmood, M.A. Compliance with information security policies: An empirical investigation. Computer 2010, 43, 64–71.
- Marlli, L.; Lievrouw, E.; Van Hoyweghen, I. Fit for purpose? The GDPR and the governance of European digital health. Policy Stud. 2020, 41, 447–467.
- Ma, Q.; Schmidt, M.B.; Person, J.N. An Integrated Framework for ISM. 2009, 20, 95–107.
- Rocha Flores. Antansn, E Information Security Knowledge Sharing in Organizations: Investigating the Effect of Behavioral Information Security Governance and National Culture. Computer. 2014, 43, 90–110.
- Parsons, K.; M. Cormac, Determining Employee Awareness Using the Human Aspects of Information Security Questionnaire (HAIS-Q). Computer. Security. 2014, 42, 165–176.
- Singh, A.N.; Gupt, M.; Ojha, A. Identifying factors of “organizational information security management”. J. Enterp. Inf. Manag.2014, 27, 644–667.
- Willison, R. Warkentin, M. Beyond deterrence: An expanded view of employee computer abuse. MIS Q. 2013, 37, 1–20
- Peikare, T.; Shah, M.H.; Lo, M.C. Patients’ perception of the information security management in
- Soomro, Z.A.; Shah, M.H.; Ahmed, J. Information security management needs more holistic approach: A literature review. Int. IT. Management. 2016, 36, 215–225.
- Cho, S.; Martins, J.T.; Bernik, I. Information security: Listening to the perspective of organizational insiders. J. Inf. Sci. 2018, 44,752–767.
- Moody, G.D.; Siponen, M.; Pahnila, S. Toward a unified model of information security policy compliance. MIS Q. 2018, 42,285–311.
- Hwang, I.; Cha, O. Examining technostress creators and role stress as potential threats to employees’ information security compliance. Computer. Hum. Behavior. 2018, 81, 282–293
- Shaukat, K. A review of time-series anomaly detection techniques: A step to future perspectives. Vancouver, BC, Canada, 29–30 April 2021; pp. 865–877.
- Shaukat, K.; Luo, S.; Chen, S.; Liu, D. Cyber Threat Detection Using Machine Learning Techniques: A Performance Evaluation Perspective. In Proceedings of the 2020 International Conference on Cyber Warfare and Security (ICCWS), Islamabad, Pakistan, 20–21 October 2020; pp. 1–6.
- Shaukat, K.; Luo, S.; Varadharajan, V.; Hameed, I.A.; Chen, S.; Liu, D.; Li, J. Performance comparison and current challenges of using machine learning techniques in cybersecurity. Energies 2020, 13, 2509.
- Mamonov, S.; Benbunan-Fich, R. The impact of information security threat awareness on privacy-protective behaviors. Comput. Hum. Behav. 2018, 83, 32–4.
- health centers: The role of organizational and human factors. BMC Med Inform. Decis. Mak. 2018, 18, 102.
- Bentler, P.M.; Bonett, D.G. Significance tests and goodness of fit in the analysis of covariance structures. Psychol. Bull. 1980,88, 588.
- Bollen, K.A. Structural Equations with latent Variables; John Wiley & Sons: New York, NY, USA, 1989; p. 210. (accessed on 16 September 2021).
- Qu, X. Multivariate Data Analysis; Taylor & Francis: London, UK, 2007; (accessed on 16 September 2021).
- Shaukat, K.; Luo, S.; Varadharajan, V.; Hameed, I.A.; Xu, M. A Survey on Machine Learning Techniques for Cyber Security in the Last Decade. IEEE Access 2020, 8, 222310–222354.
- Tintamusik, Y. (2010). Examining the relationship between organization systems and information security awareness, (Doctoral Dissertation). Business Administration. Northcentral University. Retrieved from https://eric.ed.gov/?id=ED516884
- Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), 215-220.
- Bentler, P.M. Comparative fit indexes in structural models. Psychol. Bull. 1990, 107, 238.
|