Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-16 of 16
Keywords: Security
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Understanding consumers' interest in social commerce: the role of privacy, trust and security
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2025) 38 (1): 472–496.
Published: 07 November 2023
...Hsiao-Ting Tseng; Waqar Nadeem; M. Sam Hajli; Mauricio Featherman; Nick Hajli Purpose Consumers may enjoy the information sharing and social support made available when a social media platform is used for pre-purchase research; however, do consumers reevaluate the privacy and security...
Journal Articles
A qualitative study of penetration testers and what they can tell us about information security in organisations
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2025) 38 (1): 380–398.
Published: 10 October 2023
...Stefano De Paoli; Jason Johnstone Purpose This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this paper is to understand whether and to what extent penetration testing can...
Journal Articles
Information security awareness maturity: conceptual and practical aspects in Hungarian organizations
Open Access
Journal:
Information Technology & People
Information Technology & People (2023) 36 (8): 174–195.
Published: 27 July 2023
...Andrea Kő; Gábor Tarján; Ariel Mitev Purpose This paper aims to provide a maturity model for information security awareness (MMISA), based on the literature, expert interviews and feedback. In addition to developing the MMISA, the authors investigate the role of the three decisive factors...
Journal Articles
Journal:
Information Technology & People
Information Technology & People (2023) 36 (8): 94–125.
Published: 30 March 2023
...Areej Alyami; David Sammon; Karen Neville; Carolanne Mahony Purpose This study explores the critical success factors (CSFs) for Security Education, Training and Awareness (SETA) program effectiveness. The questionable effectiveness of SETA programs at changing employee behavior and an absence...
Journal Articles
Information disclosure willingness and mobile cloud computing collaboration apps: the impact of security and assurance mechanisms
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2022) 35 (7): 1855–1883.
Published: 09 September 2021
... to the cloud where users lack direct control. This study aims to investigate why users disclose information to MCC apps despite privacy concerns and examine the effect of security and assurance mechanisms (i.e. privacy policies and ISO/IEC 27018 certification) on users’ perceptions and information disclosure...
Journal Articles
Nudging with construal level theory to improve online password use and intended password choice: A security-usability tradeoff perspective
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2019) 32 (4): 993–1020.
Published: 06 June 2019
...Jeffrey P. Kaleta; Jong Seok Lee; Sungjin Yoo Purpose The purpose of this paper is to focus on a potential tradeoff between security and usability in people’s use of online passwords – in general, complex passwords are secure and desirable but difficult to use (i.e. difficult to memorize) whereas...
Journal Articles
The role of cognitive biases in anticipating and responding to cyberattacks
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2019) 32 (1): 171–188.
Published: 08 January 2019
... study of the DDoS attacks on the Australian census. DDoS is a security reality of the twenty-first century and this case study illustrates the significance of cognitive biases and their impact on developing effective decisions and conducting regular risk assessments in managing cyberattacks. 15 11...
Journal Articles
An empirical study of purchase behaviour on social platforms: The role of risk, beliefs and characteristics
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2019) 32 (4): 876–896.
Published: 30 October 2018
... that SNS users are technology savvy and able to protect their personal information which is accessed and shared by online vendors and third-party companies (Osatuyi, 2015). While users view SNS as the responsible agent in ensuring security, SNS themselves argue that the information security breaches...
Journal Articles
Do employees in a “good” company comply better with information security policy? A corporate social responsibility perspective
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2019) 32 (4): 858–875.
Published: 11 October 2018
...Hyungjin Lukas Kim; Jinyoung Han Purpose The purpose of this paper is to investigate the impact of corporate social responsibility (CSR) on employees’ compliance behavior concerning information security policy (ISP). A research model includes CSR activities as an antecedent of ISP compliance...
Journal Articles
How stage theorizing can improve recommendations against phishing attacks
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2019) 32 (4): 828–857.
Published: 02 October 2018
... recommendations against phishing. The study has thrown light on the benefits of stage theorizing and how its approach to targeted recommendations can be useful in IS security research. Alain Tambe Ebot can be contacted at: tambealain@gmail.com 16 12 2017 16 04 2018 12 07 2018 01 08...
Journal Articles
Solutions for counteracting human deception in social engineering attacks
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2019) 32 (5): 1130–1152.
Published: 10 August 2018
... within Information System Security Association participated in a three-round Delphi study for aggregating and condensing expert opinions. Three rounds moved participants toward consensus for solutions to counteract social engineering attacks in organizations. Findings Three significant issues...
Journal Articles
Are users competent to comply with information security policies? An analysis of professional competence models
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2018) 31 (5): 1047–1068.
Published: 17 July 2018
...Aggeliki Tsohou; Philipp Holtkamp Purpose Information security policies (ISPs) are used by organizations to communicate rules on the use of information systems (IS). Research studies show that compliance with the ISPs is not a straightforward issue and that several factors influence individual...
Journal Articles
Child online safety and parental intervention: a study of Sri Lankan internet users
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2018) 31 (3): 770–790.
Published: 14 May 2018
... the same from happening to their children. We can perhaps draw upon the theory of reasoned actions to form the framework of this hypothesis. © Emerald Publishing Limited 2018 Emerald Publishing Limited Licensed re-use rights only Access control Trust Self-efficacy Security Finally...
Journal Articles
Towards a user-centric theory of value-driven information security compliance
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2018) 31 (2): 348–367.
Published: 03 April 2018
... information security policies. In so doing, the authors seek to develop a theory of value-driven information security compliance. Design/methodology/approach An interpretive, grounded theory research approach has been adopted to generate a qualitative data set, based upon the results of 55 interviews...
Journal Articles
An emote opportunity model of computer abuse
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2014) 27 (2): 155–181.
Published: 27 May 2014
... described in this section. Case study Security Literature review Multilevel research Industry statistics make it clear that computer crime and abuse continue to plague operators of information systems (IS). Computer abuse is defined as “unauthorized, deliberate, and internally recognizable...
Journal Articles
Understanding computer security behavioral intention in the workplace: An empirical study of Korean firms
Available to Purchase
Journal:
Information Technology & People
Information Technology & People (2013) 26 (4): 401–419.
Published: 11 November 2013
...Cheolho Yoon; Hyungon Kim Purpose – In organizations today, protecting information and computer assets from attacks or disaster has become one of the top managerial issues. The purpose of this paper is to propose and empirically test a comprehensive model of computer security behaviors...
