Skip to Main Content
Keywords: Information security
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Information Technology & People (2022) 35 (2): 600–620.
Published: 18 February 2021
...Hao Chen; Ofir Turel; Yufei Yuan Purpose Electronic waste (e-waste) such as discarded computers and smartphones may contain large amounts of confidential data. Improper handling of remaining information in e-waste can, therefore, drive information security risk. This risk, however, is not always...
Journal Articles
Information Technology & People (2022) 35 (1): 435–458.
Published: 16 February 2021
.... Several identities are identified as well as the changes that may occur in the identities. Design/methodology/approach Few interpretive or critical studies exist in behavioral information security research to represent employee perspectives of power and control. Using qualitative interviews...
Journal Articles
Information Technology & People (2022) 35 (1): 119–141.
Published: 28 December 2020
...Forough Nasirpouri Shadbad; David Biros Purpose This study focuses on unintended negative consequences of IT, called technostress. Given that employees are recognized as a major information security threat, it makes sense to investigate how technostress resulting from employees' constant...
Journal Articles
Information Technology & People (2021) 34 (3): 999–1017.
Published: 14 July 2020
... 23 06 2020 © Emerald Publishing Limited 2020 Emerald Publishing Limited Licensed re-use rights only Self-disclosure Disclosure about others Privacy Information security Social media SEM Social networking sites (SNSs) are finely calibrated machines, designed to extract...
Journal Articles
Information Technology & People (2018) 31 (2): 348–367.
Published: 03 April 2018
... information security policies. In so doing, the authors seek to develop a theory of value-driven information security compliance. Design/methodology/approach An interpretive, grounded theory research approach has been adopted to generate a qualitative data set, based upon the results of 55 interviews...

or Create an Account

Close Modal
Close Modal