Skip to Main Content
Skip Nav Destination
Keywords: Privacy
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Information and Computer Security (2025) 33 (3): 344–361.
Published: 11 September 2024
...Cláudia Ascenção; Henrique Teixeira; João Gonçalves; Fernando Almeida Purpose Security in large-scale agile is a crucial aspect that should be carefully addressed to ensure the protection of sensitive data, systems and user privacy. This study aims to identify and characterize the security...
Journal Articles
Journal Articles
Information and Computer Security (2023) 31 (3): 368–384.
Published: 14 March 2023
...Chola Chhetri; Vivian Genaro Motti Purpose Past research shows that users of smart home devices (SHDs) have privacy concerns. These concerns have been validated from technical research that shows SHDs introduce a lot of privacy risks. However, there is limited research in addressing these concerns...
Journal Articles
Information and Computer Security (2023) 31 (3): 353–367.
Published: 16 February 2023
...Aleatha Shanley; Mike Johnstone; Patryk Szewczyk; Michael Crowley Purpose Using technology to meet national security expectations and requirements is not new. Nations attempt to strike a balance between security and the (expressed or otherwise) privacy needs of citizens. Attacks (physical or cyber...
Journal Articles
Journal Articles
Journal Articles
Information and Computer Security (2022) 30 (4): 549–561.
Published: 23 February 2022
...Mohamad Gharib Purpose Most developed countries have enacted privacy laws to govern the collection and use of personal information (PI) as a response to the increased misuse of PI. Yet, these laws rely heavily on the concept of informational self-determination through the “notice” and “consent...
Journal Articles
Information and Computer Security (2021) 29 (4): 680–693.
Published: 22 June 2021
... of human decision-making during app selection and close with a discussion of the strengths of a Bayesian approach to evaluating privacy and security interventions. Design/methodology/approach The authors focused on the risk communication in mobile marketplace’s realm, examining how risk indicators can...
Journal Articles
Information and Computer Security (2021) 29 (5): 761–786.
Published: 18 May 2021
...Paulus Swartz; Adele Da Veiga; Nico Martins Purpose This study aims to conduct a survey in a bank to measure the perception of employees towards the effective governance of information privacy and at the same time validating the information privacy governance questionnaire (IPGQ) used...
Journal Articles
Information and Computer Security (2021) 29 (3): 558–569.
Published: 05 April 2021
...Nik Thompson; Atif Ahmad; Sean Maynard Purpose It is a widely held belief that users make a rational cost-benefit decision when choosing whether to disclose information online. Yet, in the privacy context, the evidence is far from conclusive suggesting that strong and as-yet unmeasured influences...
Journal Articles
Information and Computer Security (2021) 29 (1): 1–24.
Published: 16 July 2020
... organizations with a special focus on security and privacy issues. Design/methodology/approach This study was conducted for the identification of factors responsible for the adoption of the AI-integrated CRM system in Indian organizations focusing attention on security and privacy perspective...
Journal Articles
Information and Computer Security (2020) 28 (5): 719–741.
Published: 27 June 2020
... and devices (Lee et al., 2013). Also, Elkhodr et al. (2012) asserted that, some of the main concerns in accepting MFSs are privacy and security of users financial data. The inadequate experience of privacy protection and rare resources of independent developers decrease the success...
Journal Articles
Information and Computer Security (2020) 28 (3): 373–395.
Published: 15 June 2020
...Tamir Tsegaye; Stephen Flowerday Purpose An electronic health record (EHR) enables clinicians to access and share patient information electronically and has the ultimate goal of improving the delivery of healthcare. However, this can create security and privacy risks to patient information...
Journal Articles
Information and Computer Security (2019) 27 (5): 647–667.
Published: 09 October 2019
... in a secure and privacy-friendly manner. Selecting the optimal secret sharing parameters, cloud storage servers and other settings for securely storing the secret data shares, while meeting all of end user’s requirements and other restrictions, is a complex task. In particular, complex trade-offs between...
Journal Articles
Journal Articles
Information and Computer Security (2019) 27 (2): 189–220.
Published: 14 February 2019
...David Lewis Coss; Gurpreet Dhillon Purpose To effectively develop privacy policies and practices for cloud computing, organizations need to define a set of guiding privacy objectives that can be applied across their organization. It is argued that it is important to understand individuals’ privacy...
Journal Articles
Information and Computer Security (2018) 26 (4): 437–453.
Published: 08 October 2018
...Majed Alshammari; Andrew Simpson Purpose Concerns over data-processing activities that may lead to privacy violations or harms have motivated the development of legal frameworks and standards. Further, software engineers are increasingly expected to develop and maintain privacy-aware systems...
Journal Articles
Information and Computer Security (2017) 25 (5): 614–633.
Published: 13 November 2017
...Christos Kalloniatis Purpose The purpose of this paper is to extend PriS (privacy safeguard), a privacy requirements engineering method for eliciting and modelling privacy requirements during system design, with the addition of privacy-aware cloud-based concepts to assist analysts to reason...
Journal Articles
Information and Computer Security (2017) 25 (5): 560–579.
Published: 13 November 2017
... with the multidimensionality of attitude theories and suggest that the adopted methodology for the study is appropriate for future research with a more representative sample. Findings Factor analysis of 247 responses identified six constructs of individuals’ attitude towards personal data: protective behaviour, privacy...
Journal Articles
Information and Computer Security (2017) 25 (4): 382–401.
Published: 09 October 2017
... rights only Privacy Surveillance Censorship Cyber security Civil liberties More than 2.3 billion people, accounting for more than a third of the world’s population, had access to internet in 2011, and by 2017, these figures are going to grow to 70 per cent of the world’s population...

or Create an Account

Close Modal
Close Modal