Nov 1, 2010 | Research library
Industry analysts estimate that billions of dollars in lost revenue were attributed to employee Internet abuse. Trends also suggest that lost job productivity and corporate liability have emerged as new workplace concerns due to growth of new online technologies and...
Oct 4, 2010 | Research library
Even though personal firewalls are an important aspect of security for the users of personal computers, little attention has been given to their usability. We conducted semi-structured interviews with a diverse set of participants to gain an understanding of their...
Sep 1, 2010 | Research library
Employees’ failure to comply with information systems security policies is a major concern for information technology security managers. In efforts to understand this problem, IS security researchers have traditionally viewed violations of IS security policies...
Aug 14, 2010 | Research library
New marketing paradigms that exploit the capabilities for data collection, aggregation, and dissemination introduced by the Internet provide benefits to consumers but also pose real or perceived privacy hazards. In four experiments, we seek to understand consumer...
Aug 6, 2010 | Research library
The insider threat is undeniable. The first step in addressing this issue is to evaluate the potential for such threats. Merely technical solutions are not adequate as insider threats primarily stem from human factors. Hence, it is imperative to adopt a three-tiered...
Aug 1, 2010 | Research library
Protecting information from a wide variety of security threats is an important and sometimes daunting organizational activity. Instead of relying solely on technological advancements to help solve human problems, managers within firms must recognize and understand the...