Search for: cause+violations+of+information+security+(ISec)+and+privacy+have+become+ubiquitous+in+both+personal+and+work+environments,+acade
-
What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors
Year: 2015 / Volume: 39 / Issue: 4
$15.00 -
Examining the Neural Basis of Information Security Policy Violations: A Noninvasive Brain Stimulation Approach
Year: 2021 / Volume: 45 / Issue: 4
$15.00 -
Managing Consumer Privacy Concerns in Personalization: A Strategic Analysis of Privacy Protection
Year: 2011 / Volume: 35 / Issue: 2
$15.00 -
How Ethics Can Enhance Organizational Privacy: Lessons from the ChoicePoint and TJX Data Breaches
Year: 2009 / Volume: 33 / Issue: 4
$15.00 -
Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Peer Privacy Concerns: Conceptualization and Measurement
Year: 2022 / Volume: 46 / Issue: 1
$15.00 -
The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization
Year: 2006 / Volume: 30 / Issue: 1
$15.00 -
Will Humans-in-the-Loop Become Borgs? Merits and Pitfalls of Working with AI (Open Access)
Year: 2021 / Volume: 45 / Issue: 3b
$0.00 -
Is Cybersecurity a Team Sport? A Multilevel Examination of Workgroup Information Security Effectiveness
Year: 2020 / Volume: 44 / Issue: 2
$15.00 -
Addressing the Personalization-Privacy Paradox: An Empirical Assessment from a Field Experiment on Smartphone Users
Year: 2013 / Volume: 37 / Issue: 4
$15.00