Skip to Main Content
Keywords: Cybersecurity
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Information Technology & People (2025) 38 (5): 2326–2356.
Published: 02 July 2024
... IS use and shortcomings in data privacy and cybersecurity and to provide an explanatory model for health record misuse. Design/methodology/approach This research is based on four data sets that we collected through a longitudinal project studying digital health (implementation, use and evaluation...
Journal Articles
Journal Articles
Information Technology & People (2019) 32 (5): 1318–1342.
Published: 08 July 2019
... for quantifying cybersecurity costs for increasing accuracy, objectivity and comparability. Their criterion for cost–benefit calculation (Brecht and Nowey, 2012) are as follows: costs for managing information security (in this research referred to as defence cost), costs related to information security measures...

or Create an Account

Close Modal
Close Modal