Table of contents
A research framework for social commerce adoption
Mahmood HajliSocial relationships on the internet through the emergence of Web 2.0 applications created new opportunities for business. This is mainly because of the growth of social…
Push and pull effects of homeland information security incentives
Kai S. Koong, Mohammad I. Merhi, Jun SunThe purpose of this study is to find out whether efforts to improve the information security of government agencies and homeland information security have paid off and also…
Evaluating and enriching information and communication technologies compliance frameworks with regard to privacy
Costas LambrinoudakisThe aim of the paper is to highlight gaps in compliance environments regarding information privacy and provide recommendations for global information privacy standards.
Democracy, culture and information security: a case study in Zanzibar
Hussein Shaaban, Marc ConradThe purpose of this paper is to investigate the impact of culture on information security in a developing country's view.
Resolving vulnerability identification errors using security requirements on business process models
Stefan Taubenberger, Jan Jürjens, Yijun Yu, Bashar NuseibehIn any information security risk assessment, vulnerabilities are usually identified by information‐gathering techniques. However, vulnerability identification errors – wrongly…