Skip Nav Destination
Close Modal
Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-3 of 3
Keywords: Perceived security
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Do you want a secure e-wallet? Understanding the role of risk and security in e-wallet continuance intention
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2024) 32 (3): 304–321.
Published: 27 November 2023
...WeiLee Lim; Uma Thevi Munikrishnan; Choi-Meng Leong; Lee-Chea Hiew; Mei-Wei Leong; Liu Yang Purpose This study aims to explore e-wallet continuance intention in Malaysia using perceived usefulness (PU), perceived ease of use (PEU), perceived risk (PR) and perceived security (PS). Additional...
Journal Articles
Users’ attitude on perceived security of mobile cloud computing: empirical evidence from SME users in China
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2023) 31 (1): 65–87.
Published: 27 September 2022
... on perceived security of MCC. Practical implications Constant vigilance on these eight issues and improving the level of user awareness on these issues enhance the overall security. Social implications These issues can be used for designing and developing secured MCC system. Originality/value While...
Journal Articles
Users’ attitude on perceived security of enterprise systems mobility: an empirical study
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2021) 29 (1): 159–186.
Published: 29 March 2021
...Ramaraj Palanisamy; Yang Wu Purpose This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain...
