Business organizations have huge potential to increase their customer base by offering e- commerce services, especially in the post-pandemic era. Ensuring secure e-commerce …
Hardware and software security mechanisms are widely used to strengthen information systems (IS) against attacks. However, these systems are still highly vulnerable to threats …
A Shameli-Sendi, R Aghababaei-Barzegar… - Computers & …, 2016 - Elsevier
Abstract Information is a perennially significant business asset in all organizations. Therefore, it must be protected as any other valuable asset. This is the objective of …
MH Larsen, MS Lund - IEEE Access, 2021 - ieeexplore.ieee.org
This paper aims to present an approach to investigate cyber risk perception with use of recognized psychological models, and to give an overview of state-of-the-art research within …
Mobile payment has played a vital role in transforming traditional payment methods into digital payment methods and has led to changes in consumers' behaviors in economic …
Standards and best practices for information security awareness programs focus on the content and processes of the programs, without taking into consideration how individuals …
A quantitative empirical online study examined a set of 16 security hazards on the Internet and two comparisons in 436 UK-and US students, measuring perceptions of risk and other …
In the post pandemic era, the telecommuting of business employees has widely become acceptable in organizations, which demands extensive dependence on digital technologies …
The gap between the perceived security of an information system and its real security level can influence people'decisions and behavior. The objective of this study is to find effective …