Information Management & Computer Security: Volume 17 Issue 4

Subjects:

Table of contents

A canonical analysis of intentional information security breaches by insiders

Jordan Shropshire

The paper focuses on intentional information security breaches by insiders. The purpose is to assess the relationship between insiders' backgrounds and motivations and their…

1771

Towards privacy in personal data management

Pavlos S. Efraimidis, Georgios Drosatos, Fotis Nalbadis, Aimilia Tasidou

In order to enhance privacy protection during electronic transactions, the purpose of this paper is to propose, develop, and evaluate a personal data management framework called…

2522

Impact of perceived technical protection on security behaviors

Jie Zhang, Brian J. Reithel, Han Li

The purpose of this paper based on compensation theory, is to incorporate perceived technical security protection into the theory of planned behavior and examined factors…

2815

How perceptions of justice affect security attitudes: suggestions for practitioners and researchers

Michael Workman

Surveillance is seen as an important tool to prevent security breaches and may improve prosecutorial ability, but employees may engage in subtitle counterproductive behaviors in…

1076
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid