scispace - formally typeset
Search or ask a question
JournalISSN: 0968-5227

Information Management & Computer Security 

Emerald Publishing Limited
About: Information Management & Computer Security is an academic journal. The journal publishes majorly in the area(s): Information security & Information system. It has an ISSN identifier of 0968-5227. Over the lifetime, 587 publications have been published receiving 18518 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A conceptual foundation for information systems/organizational security awareness is constructed and a novel persuasion strategy aimed at increasing users’ commitment to security guidelines is presented.
Abstract: The current approaches in terms of information security awareness and education are descriptive (i.e. they are not accomplishment‐oriented nor do they recognize the factual/normative dualism); and current research has not explored the possibilities offered by motivation/behavioural theories. The first situation, level of descriptiveness, is deemed to be questionable because it may prove eventually that end‐users fail to internalize target goals and do not follow security guidelines, for example – which is inadequate. Moreover, the role of motivation in the area of information security is not considered seriously enough, even though its role has been widely recognised. To tackle such weaknesses, this paper constructs a conceptual foundation for information systems/organizational security awareness. The normative and prescriptive nature of end‐user guidelines will be considered. In order to understand human behaviour, the behavioural science framework, consisting in intrinsic motivation, a theory of planned behaviour and a technology acceptance model, will be depicted and applied. Current approaches (such as the campaign) in the area of information security awareness and education will be analysed from the viewpoint of the theoretical framework, resulting in information on their strengths and weaknesses. Finally, a novel persuasion strategy aimed at increasing users’ commitment to security guidelines is presented.

647 citations

Journal ArticleDOI
TL;DR: It is found that the areas of open standard, web services, RDF, semantic technologies and portals with self‐service technologies are going to play a significant part in the evolution of CM systems.
Abstract: Purpose – Aims to review the key concepts of competency management (CM) and to propose method for developing competency method.Design/methodology/approach – Examines the CM features of 22 CM systems and 18 learning management systems.Findings – Finds that the areas of open standard (XML, web services, RDF), semantic technologies (ontologies and the semantic web) and portals with self‐service technologies are going to play a significant part in the evolution of CM systems.Originality/value – Emphasizes the beneficial attributes of CM for private and public organizations.

418 citations

Journal ArticleDOI
TL;DR: Investigation of the privacy and security concerns of IT users in order to establish a consensus among them shows that the following major concerns exist: privacy, security and threats, impersonation and forged identity, children protection, e‐mail safety, and censorship.
Abstract: The public lack of confidence in online information technology (IT) is not merely about security of value, but also about trust in the information society. Privacy and security concerns are the number one reason Web users are not purchasing over the Web. Proposes to investigate the privacy and security concerns of IT users in order to establish a consensus among them. Uses data from 158 participants to come to a conclusion that the following major concerns (in the descending of importance) exist: privacy, security and threats, impersonation and forged identity, children protection, e‐mail safety, and censorship. The results also show that privacy and security concerns are the main impediment to shopping on the Internet. The implication is that the successful organizations will be those who expend their resources and efforts to ensure that IT users’ concerns are adequately addressed.

389 citations

Journal ArticleDOI
TL;DR: The findings suggest that online financial dealers and stockbrokers must improve the security of the online system since e‐investors form perceptions about its perceived security and when these perceptions are confirmed, their trust is enhanced and c...
Abstract: Purpose – The purpose of this paper is to test an augmented technology acceptance model (TAM) in the online financial trading context. This research aims to investigate how e‐investors are influenced by perceived trust, security, and privacy jointly with traditional TAM constructs.Design/methodology/approach – The research examines e‐investors' behavioral intention to use online dealers' and stockbrokers' services. The model suggests that perceived trust jointly with perceived usefulness and perceived ease of use are important antecedents of intentions; the hypotheses are statistically tested using structural modeling.Findings – The results from this study suggest that perceived trust, usefulness and ease of use are important issues in online trading systems. The findings suggest that online financial dealers and stockbrokers must improve the security of the online system since e‐investors form perceptions about its perceived security and when these perceptions are confirmed, their trust is enhanced and c...

377 citations

Journal ArticleDOI
Brenda Whittaker1
TL;DR: The results of a survey questionnaire sent to Canada’s 1,450 leading public and private institutions found that the three most common reasons for project failure are poor project planning, a weak business case, and a lack of top management involvement and support.
Abstract: Information technology (IT) project management is a crucial issue for organizations today. A 1995 study in the USA found that 31 per cent of software projects will be canceled before completion, and more than half the projects will cost an average of 189 per cent of the original estimates. This article examines the results of a survey questionnaire that was sent to Canada’s 1,450 leading public and private institutions to find the causes of IT project failure. It found that the three most common reasons for project failure are poor project planning, a weak business case, and a lack of top management involvement and support. It then outlines the reasons behind these failures, thus providing the first steps towards minimizing the risk of future failures.

302 citations

Network Information
Related Journals (5)
Internet Research
1.4K papers, 72.9K citations
84% related
International Journal of Information Management
2.3K papers, 185.9K citations
83% related
Industrial Management and Data Systems
2.4K papers, 109.7K citations
82% related
Information & Management
2.6K papers, 242.7K citations
81% related
Communications of The Ais
1.6K papers, 72.5K citations
81% related
Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
20152
201431
201326
201227
201120
201025