Privacy enhancing technology adoption and its impact on SMEs' performance

T Hasani, D Rezania, N Levallet… - International …, 2023 - journals.sagepub.com
As society places greater emphasis on information privacy and data protection,
organizations are increasingly adopting Privacy Enhancing Technologies (PETs) to …

Internet of Things (IoT) and the road to happiness

N Ahmad, AM Zulkifli - Digital Transformation and Society, 2022 - emerald.com
Purpose This study aims to provide a systematic review about the Internet of Things (IoT)
and its impacts on happiness. It intends to serve as a platform for further research as it is …

Environmental and organisational factors affecting the adoption of enterprise resource planning systems in the Jordanian banking sector

Z Jaradat, MA Shbail, MB Baker - International Journal of …, 2022 - inderscienceonline.com
In this paper, a framework is proposed to determine the major factors affecting the adoption
of enterprise resource planning (ERP) system in the banking sector. The proposed …

Individual and technological factors affecting the adoption of enterprise resource planning systems in the Jordanian banking sector

MOA Shbail, Z Jaradat, MB Baker… - … Journal of Business …, 2024 - inderscienceonline.com
This paper proposed a framework of the drivers of enterprise resource planning (ERP)
system adoption in the banking sector of Jordan, based on the UTAUT model. The study …

Identifying the effect of data breach publicity on information security awareness using hierarchical regression

HN Chua, JS Teh, A Herbland - IEEE Access, 2021 - ieeexplore.ieee.org
The technological evolution has formed new challenges for organizations to safeguard their
information as digital assets. Information Security Awareness (ISA) is the cognitive state …

Data cart–designing a tool for the GDPR-compliant handling of personal data by employees

J Tolsdorf, F Dehling, L Lo Iacono - Behaviour & Information …, 2022 - Taylor & Francis
Employees who process personal data as part of their job play a critical role in protecting
privacy. They are expected to follow strict data protection guidelines and protect personal …

Text embedding in image using an optimisation-based key generation method

SA Shawkat, N Tagougui… - International Journal of …, 2023 - inderscienceonline.com
Data hiding capacity and image quality of the cover object are important factors in text
steganography, and data encryption is being widely employed to secure data in order to …

Hands off my data: Users' security concerns and intention to adopt privacy enhancing technologies

F Mangiò, D Andreini, G Pedeliento - Italian Journal of Marketing, 2020 - Springer
As the number of data leak scandals and data infringements increase by the day, people are
becoming more concerned than ever about their online security. As a result, software and …

Using the theory of interpersonal behavior to predict information security policy compliance

WY Chin, HN Chua - 2021 Eighth International Conference on …, 2021 - ieeexplore.ieee.org
Employees' compliance with information security policies (ISP) which may minimize the
information security threats has always been a major concern for organizations. Numerous …

Exploring mental models of the right to informational self-determination of office workers in Germany

J Tolsdorf, F Dehling, D Reinhardt… - Proceedings on Privacy …, 2021 - petsymposium.org
Applied privacy research has so far focused mainly on consumer relations in private life.
Privacy in the context of employment relationships is less well studied, although it is subject …