1 - 7 of 7 articles
PurposeThe aim of this study is to encourage management boards to recognize that employees play a major role in the management of information security. Thus, these issues need to be addressed efficiently, especially in organizations in which data are a valuable...
PurposeSecurity has been a critical matter in the development of electronic services. The purpose of this research is to develop a new model to help e-service practitioners and researchers in the evaluation of e-service security and its effect on quality and intention to use...
PurposeThis paper presents an initial development of a personal data attitude (PDA) measurement instrument based on established psychometric principles. The aim of the research was to develop a reliable measurement scale for quantifying and comparing attitudes towards personal data that can be...
PurposeThis study aims to explore the challenges that the escalation of commitment poses to information security.Design/methodology/approachTwo distinct scenarios of escalation behavior are presented based on literature review. Psychological, organizational and economic theories on escalation of...
PurposeThe purpose of this study is to explore how the opening phrase of a phishing email influences the action taken by the recipient.Design/methodology/approachTwo types of phishing emails were sent to 593 employees, who were asked to provide personally identifiable information (PII). A...
PurposeThe purpose of this paper is to extend PriS (privacy safeguard), a privacy requirements engineering method for eliciting and modelling privacy requirements during system design, with the addition of privacy-aware cloud-based concepts to assist analysts to reason and model about privacy in...
PurposeThis paper aims to discover factors that are truly affecting cloud adoption decisions in organizations. Many reasons have been given for the adoption, or lack thereof, of the cloud.Design/methodology/approachThe paper uses an empirical approach by means of an exploratory survey, using...
Read and print from thousands of top scholarly journals.
Continue with Facebook
Sign up with Google
Log in with Microsoft
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.