937
Views
16
CrossRef citations to date
0
Altmetric
Article

Institutional Isomorphism in Organizational Cybersecurity: A Text Analytics Approach

& ORCID Icon

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (5)

Jaeyoung An, Choong C. Lee & Nayeon Kwak. (2023) A STUDY ON CONTENT CREATOR COMPETENCIES INFLUENCING YOUTUBE CHANNEL LOYALTY AND VIEWING SATISFACTION. Journal of Organizational Computing and Electronic Commerce 33:1-2, pages 70-95.
Read now
Swati Jain, Arunabha Mukhopadhyay & Saloni Jain. (2023) CAN CYBER RISK OF HEALTH CARE FIRMS BE INSURED? A MULTINOMIAL LOGISTIC REGRESSION MODEL. Journal of Organizational Computing and Electronic Commerce 33:1-2, pages 41-69.
Read now
Elinor Tsen, Ryan K L Ko & Sergeja Slapnicar. (2022) An exploratory study of organizational cyber resilience, its precursors and outcomes . Journal of Organizational Computing and Electronic Commerce 32:2, pages 153-174.
Read now
Kalpit Sharma & Arunabha Mukhopadhyay. (2022) Sarima-Based Cyber-Risk Assessment and Mitigation Model for A Smart City’s Traffic Management Systems (Scram). Journal of Organizational Computing and Electronic Commerce 32:1, pages 1-20.
Read now
Kalpit Sharma & Arunabha Mukhopadhyay. (2021) Kernel naïve Bayes classifier-based cyber-risk assessment and mitigation framework for online gaming platforms. Journal of Organizational Computing and Electronic Commerce 31:4, pages 343-363.
Read now

Articles from other publishers (11)

Amir Zadeh, Brandon Lavine, Hamed Zolbanin & Donald Hopkins. (2023) A cybersecurity risk quantification and classification framework for informed risk mitigation decisions. Decision Analytics Journal 9, pages 100328.
Crossref
Sergeja Slapničar, Micheal Axelsen, Ivano Bongiovanni & David Stockdale. (2023) A pathway model to five lines of accountability in cybersecurity governance. International Journal of Accounting Information Systems 51, pages 100642.
Crossref
Francisco Isaí Morales-Sáenz, Jose-Melchor Medina-Quintero & Fernando Ortiz-Rodriguez. 2023. Emerging Technologies and Digital Transformation in the Manufacturing Industry. Emerging Technologies and Digital Transformation in the Manufacturing Industry 115 139 .
Debalina Bera, Obi Ogbanufe & Dan J. Kim. (2023) Towards a thematic dimensional framework of online fraud: An exploration of fraudulent email attack tactics and intentions. Decision Support Systems 171, pages 113977.
Crossref
Rodrigo Yokoyama & Carlos Hideo Arima. (2023) Application of the Threat Modeling Method In an Operating System. Revista de Gestão e Secretariado (Management and Administrative Professional Review) 14:4, pages 5102-5122.
Crossref
Megan Gale, Ivano Bongiovanni & Sergeja Slapnicar. (2022) Governing cybersecurity from the boardroom: Challenges, drivers, and ways ahead. Computers & Security 121, pages 102840.
Crossref
Mohammad Atwah Al‐ma'aitah. (2022) Investigating the drivers of cybersecurity enhancement in public organizations: The case of Jordan. THE ELECTRONIC JOURNAL OF INFORMATION SYSTEMS IN DEVELOPING COUNTRIES 88:5.
Crossref
Shankar Prawesh, Kaushal Chari & Manish Agrawal. (2021) Industry Norms as Predictors of IT Outsourcing Behaviors. International Journal of Information Management 56, pages 102242.
Crossref
Sergeja Slapničar, Micheal Axelsen, Ivano Bongiovanni & David Stockdale. (2022) A Pathway Model to Five Lines of Accountability in Cybersecurity Governance. SSRN Electronic Journal.
Crossref
Tina Vuko, Sergeja Slapničar, Marko Čular & Matej Drašček. (2021) Key drivers of cybersecurity audit effectiveness: the neo-institutional perspective. SSRN Electronic Journal.
Crossref
Elinor Tsen, Ryan KL Ko & Sergeja Slapničar. (2020) Organisational Cyber Resilience and its Influence on Cyber Attack Outcomes: An Exploratory Study of 1,145 Publicised Attacks. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.