Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-3 of 3
Keywords: Cybersecurity
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Unpacking the complexities of health record misuse: insights from Australian health services
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2025) 38 (5): 2326–2356.
Published: 02 July 2024
... IS use and shortcomings in data privacy and cybersecurity and to provide an explanatory model for health record misuse. Design/methodology/approach This research is based on four data sets that we collected through a longitudinal project studying digital health (implementation, use and evaluation...
Journal Articles
Exploring the synergy between nano-influencers and sports community: behavior mapping through machine learning
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2022) 35 (7): 1829–1854.
Published: 22 September 2021
...Jitendra Yadav; Madhvendra Misra; Nripendra P. Rana; Kuldeep Singh Purpose The paper aims to explore the influence of cybersecurity on the semantic orientation of the sports consumers. Focusing on both sport and esports, this study finds the social media factors contributing in the sentiment...
Journal Articles
Cybersecurity economics – balancing operational security spending
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2019) 32 (5): 1318–1342.
Published: 08 July 2019
... for quantifying cybersecurity costs for increasing accuracy, objectivity and comparability. Their criterion for cost–benefit calculation (Brecht and Nowey, 2012) are as follows: costs for managing information security (in this research referred to as defence cost), costs related to information security measures...
