Organizational Cybersecurity Journal: Practice, Process and People , Open Access
Issue(s) available: 3 – From Volume: 1 Issue: 1, to Volume: 2 Issue: 2

Modelling the ethical priorities influencing decision-making in cybersecurity contexts
Bakhtiar Sadeghi, Deborah Richards, Paul Formosa, Mitchell McEwan, Muhammad Hassan Ali Bajwa, Michael Hitchens, Malcolm RyanCybersecurity vulnerabilities are often due to human users acting according to their own ethical priorities. With the goal of providing tailored training to cybersecurity…
Privacy implications of blockchain systems: a data management perspective
Heng Xu, Nan ZhangPrivacy scholars appear to struggle in conceptualizing blockchain from a privacy perspective: is it a privacy-enhancing mechanism like differential privacy, a…
Uncovering the structures of privacy research using bibliometric network analysis and topic modelling
Friso van Dijk, Joost Gadellaa, Chaïm van Toledo, Marco Spruit, Sjaak Brinkkemper, Matthieu BrinkhuisThis paper aims that privacy research is divided in distinct communities and rarely considered as a singular field, harming its disciplinary identity. The authors…
Stress in the cybersecurity profession: a systematic review of related literature and opportunities for future research
Tripti Singh, Allen C. Johnston, John D'Arcy, Peter D. HarmsThe impact of stress on personal and work-related outcomes has been studied in the information systems (IS) literature across several professions. However, the…
Show-and-tell or hide-and-seek? Examining organizational cybersecurity incident notifications
W. Alec Cram, Rissaile Mouajou-KenfackThe growing frequency of cybersecurity incidents commonly requires organizations to notify customers of ongoing events. However, the content contained within these…
A service lens on cybersecurity continuity and management for organizations’ subsistence and growth
Godwin Thomas, Mary-Jane SuleThis paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and…
Application of grounded theory in construction of factors of internal efficiency and external effectiveness of cyber security and developing impact models
Durga Prasad Dube, Rajendra Prasad MohantyAs evident from the literature review, the research on cyber security performance is centered on security metrics, maturity models, etc. Essentially, all these are helpful…
ISSN:
2635-0270e-ISSN:
2635-0289Online date, start – end:
2021Journal’s owner:
Cybersecurity Management CouncilOpen Access:
open accessEditor:
- Dr Gurvirender Tejay