Skip Nav Destination
Close Modal
Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-20 of 53
Keywords: Privacy
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
1
Sort by
Journal Articles
Large-scale agile security practices in software engineering
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2025) 33 (3): 344–361.
Published: 11 September 2024
...Cláudia Ascenção; Henrique Teixeira; João Gonçalves; Fernando Almeida Purpose Security in large-scale agile is a crucial aspect that should be carefully addressed to ensure the protection of sensitive data, systems and user privacy. This study aims to identify and characterize the security...
Journal Articles
Post hoc security and privacy concerns in mobile apps: the moderating roles of mobile apps’ features and providers
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2024) 32 (1): 1–37.
Published: 19 July 2023
... of security and privacy concerns and investigate whether assurance mechanisms decrease such concerns. Design/methodology/approach This study conducts a scenario-based survey with 694 mobile cloud computing (MCC) app users to understand their perceptions and behaviors. Findings This study finds...
Journal Articles
Enhancing the design of data-related privacy controls for smart home devices
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2023) 31 (3): 368–384.
Published: 14 March 2023
...Chola Chhetri; Vivian Genaro Motti Purpose Past research shows that users of smart home devices (SHDs) have privacy concerns. These concerns have been validated from technical research that shows SHDs introduce a lot of privacy risks. However, there is limited research in addressing these concerns...
Journal Articles
An exploration of Australian attitudes towards privacy
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2023) 31 (3): 353–367.
Published: 16 February 2023
...Aleatha Shanley; Mike Johnstone; Patryk Szewczyk; Michael Crowley Purpose Using technology to meet national security expectations and requirements is not new. Nations attempt to strike a balance between security and the (expressed or otherwise) privacy needs of citizens. Attacks (physical or cyber...
Journal Articles
Journal:
Information and Computer Security
Information and Computer Security (2023) 31 (3): 304–315.
Published: 09 February 2023
...Gunnar Lindqvist; Joakim Kävrestad Purpose The purpose of this paper is to identify whether there is a lower willingness to report a crime if a victim must hand in their mobile phone as evidence. If that is the case, the research seeks to examine whether privacy concerns and lower willingness...
Journal Articles
Understanding the role of users’ socio-location attributes and their privacy implications on social media
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2022) 30 (5): 705–729.
Published: 19 May 2022
...Katerina Vgena; Angeliki Kitsiou; Christos Kalloniatis Purpose The purpose of this paper is to establish reciprocity among socio-location attributes while underlining the additional users’ privacy implications on social media (SM). Design/methodology/approach Digital identity theories, social...
Journal Articles
Toward an architecture to improve privacy and informational self-determination through informed consent
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2022) 30 (4): 549–561.
Published: 23 February 2022
...Mohamad Gharib Purpose Most developed countries have enacted privacy laws to govern the collection and use of personal information (PI) as a response to the increased misuse of PI. Yet, these laws rely heavily on the concept of informational self-determination through the “notice” and “consent...
Journal Articles
Bayesian evaluation of privacy-preserving risk communication for user android app preferences
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2021) 29 (4): 680–693.
Published: 22 June 2021
... of human decision-making during app selection and close with a discussion of the strengths of a Bayesian approach to evaluating privacy and security interventions. Design/methodology/approach The authors focused on the risk communication in mobile marketplace’s realm, examining how risk indicators can...
Journal Articles
Validating an information privacy governance questionnaire to measure the perception of employees
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2021) 29 (5): 761–786.
Published: 18 May 2021
...Paulus Swartz; Adele Da Veiga; Nico Martins Purpose This study aims to conduct a survey in a bank to measure the perception of employees towards the effective governance of information privacy and at the same time validating the information privacy governance questionnaire (IPGQ) used...
Journal Articles
Do privacy concerns determine online information disclosure? The case of internet addiction
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2021) 29 (3): 558–569.
Published: 05 April 2021
...Nik Thompson; Atif Ahmad; Sean Maynard Purpose It is a widely held belief that users make a rational cost-benefit decision when choosing whether to disclose information online. Yet, in the privacy context, the evidence is far from conclusive suggesting that strong and as-yet unmeasured influences...
Journal Articles
Adoption of AI-integrated CRM system by Indian industry: from security and privacy perspective
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2021) 29 (1): 1–24.
Published: 16 July 2020
... organizations with a special focus on security and privacy issues. Design/methodology/approach This study was conducted for the identification of factors responsible for the adoption of the AI-integrated CRM system in Indian organizations focusing attention on security and privacy perspective...
Journal Articles
Security behaviour of mobile financial service users
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (5): 719–741.
Published: 27 June 2020
... and devices (Lee et al., 2013). Also, Elkhodr et al. (2012) asserted that, some of the main concerns in accepting MFSs are privacy and security of users financial data. The inadequate experience of privacy protection and rare resources of independent developers decrease the success...
Journal Articles
A Clark-Wilson and ANSI role-based access control model
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (3): 373–395.
Published: 15 June 2020
...Tamir Tsegaye; Stephen Flowerday Purpose An electronic health record (EHR) enables clinicians to access and share patient information electronically and has the ultimate goal of improving the delivery of healthcare. However, this can create security and privacy risks to patient information...
Journal Articles
Making secret sharing based cloud storage usable
Open Access
Journal:
Information and Computer Security
Information and Computer Security (2019) 27 (5): 647–667.
Published: 09 October 2019
... in a secure and privacy-friendly manner. Selecting the optimal secret sharing parameters, cloud storage servers and other settings for securely storing the secret data shares, while meeting all of end user’s requirements and other restrictions, is a complex task. In particular, complex trade-offs between...
Journal Articles
Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (3): 399–422.
Published: 28 August 2019
... was conducted. Personal information of four newly created consumer profiles was deposited to 10 random insurance organisation websites in each country to evaluate a number of data privacy requirements of the Data Protection Act and Protection of Personal Information Act. Findings The results demonstrate...
Journal Articles
Cloud privacy objectives a value based approach
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2019) 27 (2): 189–220.
Published: 14 February 2019
...David Lewis Coss; Gurpreet Dhillon Purpose To effectively develop privacy policies and practices for cloud computing, organizations need to define a set of guiding privacy objectives that can be applied across their organization. It is argued that it is important to understand individuals’ privacy...
Journal Articles
A model-based approach to support privacy compliance
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2018) 26 (4): 437–453.
Published: 08 October 2018
...Majed Alshammari; Andrew Simpson Purpose Concerns over data-processing activities that may lead to privacy violations or harms have motivated the development of legal frameworks and standards. Further, software engineers are increasingly expected to develop and maintain privacy-aware systems...
Journal Articles
Incorporating privacy in the design of cloud-based systems: a conceptual meta-model
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2017) 25 (5): 614–633.
Published: 13 November 2017
...Christos Kalloniatis Purpose The purpose of this paper is to extend PriS (privacy safeguard), a privacy requirements engineering method for eliciting and modelling privacy requirements during system design, with the addition of privacy-aware cloud-based concepts to assist analysts to reason...
Journal Articles
Measuring attitude towards personal data for adaptive cybersecurity
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2017) 25 (5): 560–579.
Published: 13 November 2017
... with the multidimensionality of attitude theories and suggest that the adopted methodology for the study is appropriate for future research with a more representative sample. Findings Factor analysis of 247 responses identified six constructs of individuals’ attitude towards personal data: protective behaviour, privacy...
Journal Articles
State transgression on electronic expression: is it for real?
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2017) 25 (4): 382–401.
Published: 09 October 2017
... rights only Privacy Surveillance Censorship Cyber security Civil liberties More than 2.3 billion people, accounting for more than a third of the world’s population, had access to internet in 2011, and by 2017, these figures are going to grow to 70 per cent of the world’s population...
1
