Skip Nav Destination
Close Modal
Update search
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
All
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Article Type
Issue Section
Date
Availability
1-5 of 5
Keywords: information security
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2020) 34 (1): 123–134.
Published: 01 March 2020
...Kalana Malimage; Nirmalee Raddatz; Brad S. Trinkle; Robert E. Crossler; Rebecca Baaske ABSTRACT This study examines the impact of deterrence and inertia on information security policy changes. Corporations recognize the need to prioritize information security, which sometimes involves designing...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2016) 30 (3): 119–133.
Published: 01 September 2016
... © 2016 American Accounting Association. All rights reserved. 2016 gamification information security data privacy compliance training A firm's internal control effectiveness depends, in part, upon individual competence, awareness, and compliance. “The strength of any internal control...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2016) 30 (1): 71–92.
Published: 01 March 2016
...Paul John Steinbart; Robyn L. Raschke; Graham Gal; William N. Dilla ABSTRACT The ever-increasing number of security incidents underscores the need to understand the key determinants of an effective information security program. Research that addresses this topic requires objective measures...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2014) 28 (1): 269–285.
Published: 01 June 2014
... data privacy data fusion information security There are many situations where it can be mutually beneficial for two or more entities to share data because the usefulness or value of the combined data exceeds that of the data held individually. This is particularly true in situations where...
Journal Articles
Journal:
Journal of Information Systems
Journal of Information Systems (2012) 26 (2): 71–91.
Published: 01 November 2012
... and helpful comments of reviewers, and those in attendance at presentations at the 2012 AAA IS Midyear Meeting, Bentley University, and Brigham Young University. 2012 security policy internal control knowledge management electronic networks of practice information security Virtual...
Includes: Supplementary data