Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-5 of 5
Keywords: Information security
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
E-waste information security protection motivation: the role of optimism bias
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2022) 35 (2): 600–620.
Published: 18 February 2021
...Hao Chen; Ofir Turel; Yufei Yuan Purpose Electronic waste (e-waste) such as discarded computers and smartphones may contain large amounts of confidential data. Improper handling of remaining information in e-waste can, therefore, drive information security risk. This risk, however, is not always...
Journal Articles
Understanding employees' information security identities: an interpretive narrative approach
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2022) 35 (1): 435–458.
Published: 16 February 2021
.... Several identities are identified as well as the changes that may occur in the identities. Design/methodology/approach Few interpretive or critical studies exist in behavioral information security research to represent employee perspectives of power and control. Using qualitative interviews...
Journal Articles
Technostress and its influence on employee information security policy compliance
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2022) 35 (1): 119–141.
Published: 28 December 2020
...Forough Nasirpouri Shadbad; David Biros Purpose This study focuses on unintended negative consequences of IT, called technostress. Given that employees are recognized as a major information security threat, it makes sense to investigate how technostress resulting from employees' constant...
Journal Articles
Who are you talking about? Contrasting determinants of online disclosure about self or others
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2021) 34 (3): 999–1017.
Published: 14 July 2020
... 23 06 2020 © Emerald Publishing Limited 2020 Emerald Publishing Limited Licensed re-use rights only Self-disclosure Disclosure about others Privacy Information security Social media SEM Social networking sites (SNSs) are finely calibrated machines, designed to extract...
Journal Articles
Towards a user-centric theory of value-driven information security compliance
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2018) 31 (2): 348–367.
Published: 03 April 2018
... information security policies. In so doing, the authors seek to develop a theory of value-driven information security compliance. Design/methodology/approach An interpretive, grounded theory research approach has been adopted to generate a qualitative data set, based upon the results of 55 interviews...
