IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v21y2019i6d10.1007_s10796-019-09971-5.html
   My bibliography  Save this article

Editorial: Special issue on cyber security, privacy and ethics of information systems

Author

Listed:
  • Alessandro Acquisti

    (Carnegie Mellon University)

  • Tamara Dinev

    (Florida Atlantic University)

  • Mark Keil

    (Georgia State University)

Abstract

No abstract is available for this item.

Suggested Citation

  • Alessandro Acquisti & Tamara Dinev & Mark Keil, 2019. "Editorial: Special issue on cyber security, privacy and ethics of information systems," Information Systems Frontiers, Springer, vol. 21(6), pages 1203-1205, December.
  • Handle: RePEc:spr:infosf:v:21:y:2019:i:6:d:10.1007_s10796-019-09971-5
    DOI: 10.1007/s10796-019-09971-5
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-019-09971-5
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-019-09971-5?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Heidt, Margareta & Gerlach, Jin & Buxmann, Peter, 2019. "Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments," Publications of Darmstadt Technical University, Institute for Business Studies (BWL) 118284, Darmstadt Technical University, Department of Business Administration, Economics and Law, Institute for Business Studies (BWL).
    2. Emmanuel W. Ayaburi & James Wairimu & Francis Kofi Andoh-Baidoo, 2019. "Antecedents and Outcome of Deficient Self-Regulation in Unknown Wireless Networks Use Context: An Exploratory Study," Information Systems Frontiers, Springer, vol. 21(6), pages 1213-1229, December.
    3. Mark Keil & Mary Culnan & Tamara Dinev & Heng Xu, 2019. "Data Governance, Consumer Privacy, and Project Status Reporting: Remembering H. Jeff Smith," Information Systems Frontiers, Springer, vol. 21(6), pages 1207-1212, December.
    4. Margareta Heidt & Jin P. Gerlach & Peter Buxmann, 2019. "Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments," Information Systems Frontiers, Springer, vol. 21(6), pages 1285-1305, December.
    5. Nicholas Martin & Christian Matt & Crispin Niebel & Knut Blind, 2019. "How Data Protection Regulation Affects Startup Innovation," Information Systems Frontiers, Springer, vol. 21(6), pages 1307-1324, December.
    6. Simon Trang & Benedikt Brendel, 2019. "A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research," Information Systems Frontiers, Springer, vol. 21(6), pages 1265-1284, December.
    7. Henner Mohr & Zhiping Walter, 2019. "Formation of Consumers’ Perceived Information Security: Examining the Transfer of Trust in Online Retailers," Information Systems Frontiers, Springer, vol. 21(6), pages 1231-1250, December.
    8. Gianfranco Walsh & Edward Shiu & Louise Hassan & Patrick Hille & Ikuo Takahashi, 2019. "Fear of Online Consumer Identity Theft: Cross-Country Application and Short Scale Development," Information Systems Frontiers, Springer, vol. 21(6), pages 1251-1264, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. R.K. Shyamasundar & Pratiksha Chaudhary & Arushi Jaiswal & Aniket Kuiri, 2021. "Approaches to Enforce Privacy in Databases: Classical to Information Flow-Based Models," Information Systems Frontiers, Springer, vol. 23(4), pages 811-833, August.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Abderrazak Laghouag & Faiz bin Zafrah & Mohamed Rafik Noor Mohamed Qureshi & Alhussain Ali Sahli, 2024. "Eliminating Non-Value-Added Activities and Optimizing Manufacturing Processes Using Process Mining: A Stock of Challenges for Family SMEs," Sustainability, MDPI, vol. 16(4), pages 1-20, February.
    2. Chenglong Zhang & Nan Feng & Jianjian Chen & Dahui Li & Minqiang Li, 0. "Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities," Information Systems Frontiers, Springer, vol. 0, pages 1-18.
    3. Simon Kratzer & Andreas Drechsler & Markus Westner & Susanne Strahringer, 2022. "The Fractional CIO in SMEs: conceptualization and research agenda," Information Systems and e-Business Management, Springer, vol. 20(3), pages 581-611, September.
    4. Chenglong Zhang & Nan Feng & Jianjian Chen & Dahui Li & Minqiang Li, 2021. "Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities," Information Systems Frontiers, Springer, vol. 23(3), pages 773-790, June.
    5. Elvira Ismagilova & Laurie Hughes & Nripendra P. Rana & Yogesh K. Dwivedi, 2022. "Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework," Information Systems Frontiers, Springer, vol. 24(2), pages 393-414, April.
    6. Tejaswini C. Herath & Hemantha S. B. Herath & David Cullum, 2023. "An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks," Information Systems Frontiers, Springer, vol. 25(2), pages 681-721, April.
    7. Marcel Rolf Pfeifer, 2021. "Development of a Smart Manufacturing Execution System Architecture for SMEs: A Czech Case Study," Sustainability, MDPI, vol. 13(18), pages 1-23, September.
    8. Charlotte Wendt & Martin Adam & Alexander Benlian & Sascha Kraus, 2022. "Let’s Connect to Keep the Distance: How SMEs Leverage Information and Communication Technologies to Address the COVID-19 Crisis," Information Systems Frontiers, Springer, vol. 24(4), pages 1061-1079, August.
    9. Federico Iannacci & Colm Fearon & Kristine Pole, 2021. "From Acceptance to Adaptive Acceptance of Social Media Policy Change: a Set-Theoretic Analysis of B2B SMEs," Information Systems Frontiers, Springer, vol. 23(3), pages 663-680, June.
    10. You-Shyang Chen & Jerome Chih-Lung Chou & Yu-Sheng Lin & Ying-Hsun Hung & Xuan-Han Chen, 2023. "Identification of SMEs in the Critical Factors of an IS Backup System Using a Three-Stage Advanced Hybrid MDM–AHP Model," Sustainability, MDPI, vol. 15(4), pages 1-29, February.
    11. Jae Kyu Lee & Younghoon Chang & Hun Yeong Kwon & Beopyeon Kim, 2020. "Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach," Information Systems Frontiers, Springer, vol. 22(1), pages 45-57, February.
    12. Yang Zhao & Yixuan Li & Ning Wang & Ruoxin Zhou & Xin (Robert) Luo, 2022. "A Meta-Analysis of Online Impulsive Buying and the Moderating Effect of Economic Development Level," Information Systems Frontiers, Springer, vol. 24(5), pages 1667-1688, October.
    13. Kavita Rawat & Sunita Kumar, 2022. "A Meta-Analysis on the Determinants of Online Product Reviews with Moderating Effect of Product Type," Academic Journal of Interdisciplinary Studies, Richtmann Publishing Ltd, vol. 11, November.
    14. Ming Yang & Jinglu Jiang & Melody Kiang & Fangyun Yuan, 2022. "Re-Examining the Impact of Multidimensional Trust on Patients’ Online Medical Consultation Service Continuance Decision," Information Systems Frontiers, Springer, vol. 24(3), pages 983-1007, June.
    15. Romanus Izuchukwu Okeke & Max Hashem Eiza, 2023. "The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies," Information Systems Frontiers, Springer, vol. 25(2), pages 451-472, April.
    16. Rao Faizan Ali & P.D.D. Dominic & Kashif Ali, 2020. "Organizational Governance, Social Bonds and Information Security Policy Compliance: A Perspective towards Oil and Gas Employees," Sustainability, MDPI, vol. 12(20), pages 1-27, October.
    17. V. S. Prakash Attili & Saji K. Mathew & Vijayan Sugumaran, 2022. "Information Privacy Assimilation in IT Organizations," Information Systems Frontiers, Springer, vol. 24(5), pages 1497-1513, October.
    18. Kjell Hausken & Jonathan W. Welburn, 2021. "Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits," Information Systems Frontiers, Springer, vol. 23(6), pages 1609-1620, December.
    19. A. F. Salam & Hua Dai & Lei Wang, 2022. "Online Users’ Identity Theft and Coping Strategies, Attribution and Sense of Urgency: A Non-Linear Quadratic Effect Assessment," Information Systems Frontiers, Springer, vol. 24(6), pages 1929-1948, December.
    20. Pedro M. Gardete & Carlos D. Santos, 2020. "No data? No problem! A Search-based Recommendation System with Cold Starts," Papers 2010.03455, arXiv.org.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:21:y:2019:i:6:d:10.1007_s10796-019-09971-5. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.