Table of contents
A canonical analysis of intentional information security breaches by insiders
Jordan ShropshireThe paper focuses on intentional information security breaches by insiders. The purpose is to assess the relationship between insiders' backgrounds and motivations and their…
Towards privacy in personal data management
Pavlos S. Efraimidis, Georgios Drosatos, Fotis Nalbadis, Aimilia TasidouIn order to enhance privacy protection during electronic transactions, the purpose of this paper is to propose, develop, and evaluate a personal data management framework called…
Impact of perceived technical protection on security behaviors
Jie Zhang, Brian J. Reithel, Han LiThe purpose of this paper based on compensation theory, is to incorporate perceived technical security protection into the theory of planned behavior and examined factors…
How perceptions of justice affect security attitudes: suggestions for practitioners and researchers
Michael WorkmanSurveillance is seen as an important tool to prevent security breaches and may improve prosecutorial ability, but employees may engage in subtitle counterproductive behaviors in…