Skip to Main Content
Keywords: Security
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Information Technology & People (2025) 38 (1): 472–496.
Published: 07 November 2023
...Hsiao-Ting Tseng; Waqar Nadeem; M. Sam Hajli; Mauricio Featherman; Nick Hajli Purpose Consumers may enjoy the information sharing and social support made available when a social media platform is used for pre-purchase research; however, do consumers reevaluate the privacy and security...
Journal Articles
Journal Articles
Information Technology & People (2023) 36 (8): 174–195.
Published: 27 July 2023
...Andrea Kő; Gábor Tarján; Ariel Mitev Purpose This paper aims to provide a maturity model for information security awareness (MMISA), based on the literature, expert interviews and feedback. In addition to developing the MMISA, the authors investigate the role of the three decisive factors...
Journal Articles
Journal Articles
Journal Articles
Journal Articles
Information Technology & People (2019) 32 (1): 171–188.
Published: 08 January 2019
... study of the DDoS attacks on the Australian census. DDoS is a security reality of the twenty-first century and this case study illustrates the significance of cognitive biases and their impact on developing effective decisions and conducting regular risk assessments in managing cyberattacks. 15 11...
Journal Articles
Information Technology & People (2019) 32 (4): 876–896.
Published: 30 October 2018
... that SNS users are technology savvy and able to protect their personal information which is accessed and shared by online vendors and third-party companies (Osatuyi, 2015). While users view SNS as the responsible agent in ensuring security, SNS themselves argue that the information security breaches...
Journal Articles
Journal Articles
Information Technology & People (2019) 32 (4): 828–857.
Published: 02 October 2018
... recommendations against phishing. The study has thrown light on the benefits of stage theorizing and how its approach to targeted recommendations can be useful in IS security research. Alain Tambe Ebot can be contacted at: tambealain@gmail.com 16 12 2017 16 04 2018 12 07 2018 01 08...
Journal Articles
Information Technology & People (2019) 32 (5): 1130–1152.
Published: 10 August 2018
... within Information System Security Association participated in a three-round Delphi study for aggregating and condensing expert opinions. Three rounds moved participants toward consensus for solutions to counteract social engineering attacks in organizations. Findings Three significant issues...
Journal Articles
Journal Articles
Information Technology & People (2018) 31 (3): 770–790.
Published: 14 May 2018
... the same from happening to their children. We can perhaps draw upon the theory of reasoned actions to form the framework of this hypothesis. © Emerald Publishing Limited 2018 Emerald Publishing Limited Licensed re-use rights only Access control Trust Self-efficacy Security Finally...
Journal Articles
Information Technology & People (2018) 31 (2): 348–367.
Published: 03 April 2018
... information security policies. In so doing, the authors seek to develop a theory of value-driven information security compliance. Design/methodology/approach An interpretive, grounded theory research approach has been adopted to generate a qualitative data set, based upon the results of 55 interviews...
Journal Articles
Information Technology & People (2014) 27 (2): 155–181.
Published: 27 May 2014
... described in this section. Case study Security Literature review Multilevel research Industry statistics make it clear that computer crime and abuse continue to plague operators of information systems (IS). Computer abuse is defined as “unauthorized, deliberate, and internally recognizable...
Journal Articles
Information Technology & People (2013) 26 (4): 401–419.
Published: 11 November 2013
...Cheolho Yoon; Hyungon Kim Purpose – In organizations today, protecting information and computer assets from attacks or disaster has become one of the top managerial issues. The purpose of this paper is to propose and empirically test a comprehensive model of computer security behaviors...

or Create an Account

Close Modal
Close Modal