Ahangar, A., Babal-Hawaeji, F., Hosseini Beheshti, M.S., Hariri, N. & Khademi, M. (2022). Drawing and analyzing the network structure of information security concepts. Journal of Information Processing and Management, 37(2): 473-495. https://doi.org/10.52547/jipm.37.2.473[in persian]
Alhogail, A. (2015). Design and validation of information security culture framework. Computers in human behavior, 49: 567-575.
Bhattacharya, C.B., Sen, S. & Korschun, D. (2011). Leveraging corporate responsibility: the stakeholder route to maximizing business and social value. Cambridge University Press.
Colwill, C. (2009). Human factors in information security: the insider threat–who can you trust these days? Information security technical report,14(4): 186-196.
Deal, T. & Kennedy, A. (1999). The new corporate cultures: revitalizing the workplace after downsizing, mergers, and reengineering. Cambridge: Basic books.
Dhillon, G. & Backhouse, J. (2000). Technical opinion: information system security management in the new millennium. Communications of the acm, 43(7): 125-128.
merete Hagen, J., Albrechtsen, E. & Hovden, J. (2008). Implementation and effectiveness of organizational information security measures. Information management & computer security, 16(4): 377-397.
Niekerk, J.V. & Solms, R.V. (2005). A holistic framework for the fostering of an information security sub-culture in organizations. Nelson Mandela Metropolitan University.
Pathari, V. & Sonar, R. (2012). Identifying linkages between statements in information security policy, procedures and controls. Information management & computer security, 20(4): 264-280.
ragavendran, V.A. (2023). An analysis of the literature on society's concerns on india's cybersecurity in the twenty-first century. International journal of social sciences and management review,
Vol. 6.
Scholl, M. (2023). Sustainable information security sensitization in smes: designing measures with long-term effect. Proceedings of the 56th Hawaii International Conference on System Sciences.
Shabani, M.M., Rafati Asl, S.M. & Sohrabi, S. (2021). Feasibility of establishing knowledge management in a knowledge-oriented organization. Law enforcement information technology magazine, 4(8): 67-84. https://doi.org/10.22034/pitc.2022.1266565.1114 [in persian]
Shafii Nikabadi, M., Jafarian, A. & Jalili Boalhasani, A. (2022). The effect of information security management on the integration of organizational processes in the supply chain. Journal of Information Processing and Management, 27(2): 560-604. [in persian]
Shahini, Sh., Faraj Pahlo, A., Khademizadeh, Sh. & Nadran Tahan, M. (2022). Presenting a proposed architecture for using the Internet of Things in Iranian academic libraries. Journal of information processing and management, 37(2): 473-495. https://doi.org/10.22034/JIPM.2023.701680
[in persian]
Shahriari, M., Maddi, B. & Saberi, M. (2018). Analysis of security challenges of LTE network, and barriers and opportunities of network localization in the standard platform. Electronic and Cyber Defense, 7(26): 121-132. [in persian]
Thomson, K. & Van Niekerk, J. (2012). Combating information security apathy by encouraging prosocial organisational behaviour. Information Management & Computer Security, 20(1): 39-46.
Send comment about this article