1-5 of 5
Keywords: information security
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Journal of Information Systems (2020) 34 (1): 123–134.
Published: 01 March 2020
...Kalana Malimage; Nirmalee Raddatz; Brad S. Trinkle; Robert E. Crossler; Rebecca Baaske ABSTRACT This study examines the impact of deterrence and inertia on information security policy changes. Corporations recognize the need to prioritize information security, which sometimes involves designing...
Journal Articles
Journal of Information Systems (2016) 30 (3): 119–133.
Published: 01 September 2016
... © 2016 American Accounting Association. All rights reserved. 2016 gamification information security data privacy compliance training A firm's internal control effectiveness depends, in part, upon individual competence, awareness, and compliance. “The strength of any internal control...
Journal Articles
Journal Articles
Journal of Information Systems (2014) 28 (1): 269–285.
Published: 01 June 2014
... data privacy data fusion information security There are many situations where it can be mutually beneficial for two or more entities to share data because the usefulness or value of the combined data exceeds that of the data held individually. This is particularly true in situations where...
Journal Articles
Journal of Information Systems (2012) 26 (2): 71–91.
Published: 01 November 2012
... and helpful comments of reviewers, and those in attendance at presentations at the 2012 AAA IS Midyear Meeting, Bentley University, and Brigham Young University. 2012 security policy internal control knowledge management electronic networks of practice information security Virtual...
Includes: Supplementary data