2019
DOI: 10.1080/0144929x.2019.1583769
|View full text |Cite
|
Sign up to set email alerts
|

The impact of time pressure on cybersecurity behaviour: a systematic literature review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
23
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 46 publications
(24 citation statements)
references
References 55 publications
1
23
0
Order By: Relevance
“…As such, the systematic literature search follows software engineering guidelines [4]. To facilitate the comparison of literature across multiple disciplines, a conceptual framework was devised following the approach of Baumeister and Leary [17], a method used successfully for multidisciplinary computing and health literature reviews [18].…”
Section: Methodsmentioning
confidence: 99%
“…As such, the systematic literature search follows software engineering guidelines [4]. To facilitate the comparison of literature across multiple disciplines, a conceptual framework was devised following the approach of Baumeister and Leary [17], a method used successfully for multidisciplinary computing and health literature reviews [18].…”
Section: Methodsmentioning
confidence: 99%
“…Behavioral aspects of information system security are studied through compliance with guidelines, engagement in protective behaviors to avoid malicious attacks, or succumbing to them (Hassandoust et al., 2020). Some authors have focused on emotions, identity, and need for justice in the theoretical study of information system security behaviors (Wang et al., 2017; Chowdhury et al., 2019). Others have considered protection motivation theory (Sommestad et al., 2015; Mou et al., 2017), or deterrence (Trang and Brendel, 2019), or have proposed meta‐analyses on information security compliance (Sommestad et al., 2014; Cram et al., 2017).…”
Section: Background Theory and Assumptionsmentioning
confidence: 99%
“…As the increase and dependence on digitally enabled technology continues to impact almost every area of life, it has created a demand for innovative software-based solutions. However, developing secure software is a multi-faceted activity that can strain a project's budget, design, and overall functionality [2]. The demand for software often pits delivering value at high speed against high quality.…”
Section: Introductionmentioning
confidence: 99%