S Conger, JH Pratt, KD Loch - Information Systems Journal, 2013 - Wiley Online Library
This research presents a model of personal information privacy (PIP) that includes not only transactional data gathering, but also interorganisational data sharing. Emerging …
X Lin, X Wang - International Journal of Information Management, 2020 - Elsevier
Abstract Information systems research provides increasing evidence that women and men differ in their use of information technology. However, research has not sufficiently explained …
Using traditional meta-analytic techniques, we compile relevant research to enhance conceptual appreciation of ethical climate theory (ECT) as it has been studied in the …
This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the …
ARTIFICIAL INTELLIGENCE/MACHINE LEARNING achieving human-level competence at solving tasks across many domains in medicine. AI solutions based on deep learning have …
JM Stanton, KR Stam, P Mastrangelo, J Jolton - Computers & security, 2005 - Elsevier
Many information security specialists believe that promoting good end user behaviors and constraining bad end user behaviors provide one important method for making information …
C Yoon - Journal of business ethics, 2011 - Springer
Since digital piracy has posed a significant threat to the development of the software industry and the growth of the digital media industry, it has, for the last decade, held considerable …
HS Rhee, C Kim, YU Ryu - Computers & security, 2009 - Elsevier
The ultimate success of information security depends on appropriate information security practice behaviors by the end users. Based on social cognitive theory, this study models and …
AG Peace, DF Galletta, JYL Thong - Journal of Management …, 2003 - Taylor & Francis
Theft of software and other intellectual property has become one of the most visible problems in computing today. This paper details the development and empirical validation of …