Skip to Content

139 Results Found

  • Article
  • Open Access
9 Citations
3,518 Views
19 Pages

15 March 2021

This study empirically investigates the influence of information security marketing and response cost on employees’ information security intention in the container shipping industry. Survey data were collected from 285 respondents in Taiwan. Explorat...

  • Article
  • Open Access
8 Citations
3,184 Views
19 Pages

Employee security compliance behavior has become an important safeguard to protect the security of corporate information assets. Focusing on human factors, this paper discusses how to regulate and guide employees’ compliance with information se...

  • Article
  • Open Access
31 Citations
8,905 Views
16 Pages

8 October 2021

Information security awareness (ISA) has become a vital issue, as security breaches often attributed to humans lead to losses for individuals and organizations. Information security (IS) education may be an effective strategy to improve students’ ISA...

  • Article
  • Open Access
6 Citations
3,622 Views
29 Pages

MASISCo—Methodological Approach for the Selection of Information Security Controls

  • Mauricio Diéguez,
  • Carlos Cares,
  • Cristina Cachero and
  • Jorge Hochstetter

13 January 2023

As cyber-attacks grow worldwide, companies have begun to realize the importance of being protected against malicious actions that seek to violate their systems and access their information assets. Faced with this scenario, organizations must carry ou...

  • Proceeding Paper
  • Open Access
2 Citations
5,785 Views
7 Pages

Bring-Your-Own-Device (BYOD) and Productivity: A Conceptual Framework

  • Mohamad Rahimi Mohamad Rosman,
  • Nurfatihah S Baharuddin,
  • Noor Azreen Alimin,
  • Nik Nur Izzati Nik Rosli,
  • Amira Idayu Mohd Shukry and
  • Noor Masliana Razlan

BYOD is defined as the act of bringing your own gadget, facilities, or device to the organization or institution. The concept of BYOD has spread almost to many sectors, especially in education, due to a shortage of financial resources in the aftermat...

  • Article
  • Open Access
28 Citations
6,798 Views
27 Pages

16 October 2020

Information security attacks on oil and gas (O&G) organizations have increased since the last decade. From 2015 to 2019, almost 70 percent of O&G organizations faced at least one significant security breach worldwide. Research has shown that...

  • Article
  • Open Access
263 Views
22 Pages

26 February 2026

Cybersecurity effectiveness in digitally intensive university environments depends not only on technological safeguards but also on how individuals enact protective behaviors within decentralized systems. While prior research has largely emphasized c...

  • Article
  • Open Access
11 Citations
4,665 Views
12 Pages

27 October 2021

In the Fourth Industrial Revolution era, data-based business management activities among enterprises proliferated are mainly based on digital transformation. In this change, the information security system and its operation are emphasized as essentia...

  • Article
  • Open Access
3 Citations
2,625 Views
17 Pages

This study investigates the factors affecting customer use intentions of MyData services in the fintech industry, focusing on the mediating role of perceived value across informational, security, and service dimensions. Six independent factors were d...

  • Article
  • Open Access
6 Citations
3,184 Views
31 Pages

27 July 2025

Cybersecurity threats increasingly originate from human actions within organizations, emphasizing the need to understand behavioral factors behind non-compliance with information security policies (ISPs). Despite the presence of formal security polic...

  • Article
  • Open Access
3 Citations
2,935 Views
21 Pages

25 June 2025

Insider threats pose significant challenges to organizations, seriously endangering information security and privacy protection. These threats arise when employees with legitimate access to systems and databases misuse their privileges. Such individu...

  • Article
  • Open Access
13 Citations
4,717 Views
13 Pages

Background: Healthcare information includes sensitive data and, as such, must be secure; however, the risk of healthcare information leakage is increasing. Nurses manage healthcare information in hospitals; however, previous studies have either been...

  • Article
  • Open Access
71 Citations
11,885 Views
23 Pages

26 April 2018

In the context of the sharing economy, Airbnb has become a formidable mode of accommodation in the tourism industry worldwide, with a presence in over 34,000 cities in 191 countries. However, the risks associated with online bookings are significant...

  • Article
  • Open Access
18 Citations
7,834 Views
20 Pages

Towards a Better Understanding of the Sense of Safety and Security of Community-Dwelling Older Adults. The Case of the Age-Friendly City of The Hague

  • Joost van Hoof,
  • Jeroen Dikken,
  • Willeke H. van Staalduinen,
  • Suzan van der Pas,
  • Rudy F. M. van den Hoven and
  • Loes M. T. Hulsebosch-Janssen

The sense of safety and security of older people is a widely acknowledged action domain for policy and practice in age-friendly cities. Despite an extensive body of knowledge on the matter, the theory is fragmented, and a classification is lacking. T...

  • Article
  • Open Access
3 Citations
1,717 Views
18 Pages

27 December 2024

Establishing robust cybersecurity for Internet of Things (IoT) ecosystems poses significant challenges for system operators due to IoT resource constraints, trade-offs between security and performance, diversity of applications, and their security re...

  • Article
  • Open Access
6 Citations
5,130 Views
15 Pages

13 October 2016

A smart home can be realized by the provision of services, such as building control, automation and security implemented in accordance with a user’s request. One of the important issues is how to respond quickly and appropriately to a user’s request...

  • Article
  • Open Access
2 Citations
4,378 Views
17 Pages

7 March 2025

Services rendered by bug hunters have increasingly become an indispensable component of the security culture of organizations. By pre-emptively locating vulnerabilities in their information systems, organizations reduce the risk and the potential imp...

  • Article
  • Open Access
71 Citations
29,509 Views
19 Pages

The era of Big Data analytics has begun in most industries within developed countries. This new analytics tool has raised motivation for experts and researchers to study its impacts to business values and challenges. However, studies which help to un...

  • Article
  • Open Access
3 Citations
2,455 Views
23 Pages

In recent years, we have seen a growing wave in the integration of IoT (Internet of Things) technologies into society. This has created new opportunities, but at the same time given rise to several critical issues, creating new challenges that need t...

  • Article
  • Open Access
14 Citations
4,244 Views
18 Pages

10 December 2019

There is growing interest in how Internet specialized banks that provide the Internet as a major customer channel can change the paradigm of the banking industry by securing a niche market in competition with existing banks that have a multi-channel...

  • Article
  • Open Access
10 Citations
7,173 Views
16 Pages

28 February 2022

This research aims to explore the effects that In-flight Safety Information Characteristics of airlines have on attitude, customer satisfaction, customer trust, and safety behavioral intentions. A total of 477 passengers with air travel experience we...

  • Review
  • Open Access
4 Citations
6,507 Views
25 Pages

Cybercrime Intention Recognition: A Systematic Literature Review

  • Yidnekachew Worku Kassa,
  • Joshua Isaac James and
  • Elefelious Getachew Belay

In this systematic literature review, we delve into the realm of intention recognition within the context of digital forensics and cybercrime. The rise of cybercrime has become a major concern for individuals, organizations, and governments worldwide...

  • Proceeding Paper
  • Open Access
5 Citations
2,699 Views
8 Pages

A Cybersecurity Experience with Cloud Virtual-Remote Laboratories

  • Llanos Tobarra,
  • Antonio Robles-Gómez,
  • Rafael Pastor,
  • Roberto Hernández,
  • Andrés Duque and
  • Jesús Cano

In recent years, there has been a great increase in the daily use of technology, to the extent that people are almost permanently connected to the Internet. In our particular case, we are interested in maintaining information security, which is known...

  • Article
  • Open Access
2 Citations
3,371 Views
21 Pages

7 November 2023

The utilization of user privacy data in the health data tracking system (HDTS) offers numerous benefits for businesses and public services, contingent upon users’ privacy sharing intentions. However, previous research neglected users’ pre...

  • Article
  • Open Access
7 Citations
2,888 Views
15 Pages

28 September 2023

The comprehensive system of information security of an enterprise includes both tactical aspects of information and strategic priorities, reflecting the information policy and information strategy of the enterprise. Ensuring a given level of cybersec...

  • Feature Paper
  • Article
  • Open Access
8 Citations
4,335 Views
19 Pages

Exploring the Success Factors of Smart City Adoption via Structural Equation Modeling

  • Tayseer Alkdour,
  • Mohammed Amin Almaiah,
  • Rima Shishakly,
  • Abdalwali Lutfi and
  • Mahmoud Alrawad

14 November 2023

This study investigated the roles of security and technological factors in the adoption of smart cities, with the aim of developing a deeper understanding of the key aspects of the successful adoption of smart cities in Jordanian traditional cities....

  • Article
  • Open Access
14 Citations
5,636 Views
22 Pages

How the COVID-19 Pandemic Affected the Sustainable Adoption of Digital Signature: An Integrated Factors Analysis Model

  • Ahmad Arif Santosa,
  • Yogi Tri Prasetyo,
  • Firdaus Alamsjah,
  • Anak Agung Ngurah Perwira Redi,
  • Indra Gunawan,
  • Angga Ranggana Putra,
  • Satria Fadil Persada and
  • Reny Nadlifatin

4 April 2022

Digital signatures have been widely and primarily used for document approval activities during the Coronavirus pandemic in Indonesia. This is the digital equivalent of a handwritten signature or stamped seal, although it provides more inherent securi...

  • Article
  • Open Access
19 Citations
9,085 Views
20 Pages

E-wallets and mobile payment systems provide fast, secure, and convenient payment in transactions services while minimizing the need for human interaction. However, the adoption of the technology has had varying levels of success. Using a sample of 3...

  • Article
  • Open Access
3,599 Views
23 Pages

14 March 2025

Earlier research focused on investigating the acceptance of educational technologies applied in formal learning settings. Understanding the factors that can lead to the adoption of other dominant technologies in social communication for informal lear...

  • Article
  • Open Access
164 Citations
19,476 Views
24 Pages

The Use of a Technology Acceptance Model (TAM) to Predict Patients’ Usage of a Personal Health Record System: The Role of Security, Privacy, and Usability

  • Adi Alsyouf,
  • Abdalwali Lutfi,
  • Nizar Alsubahi,
  • Fahad Nasser Alhazmi,
  • Khalid Al-Mugheed,
  • Rami J. Anshasi,
  • Nora Ibrahim Alharbi and
  • Moteb Albugami

Personal health records (PHR) systems are designed to ensure that individuals have access and control over their health information and to support them in being active participants rather than passive ones in their healthcare process. Yet, PHR system...

  • Article
  • Open Access
38 Citations
9,515 Views
22 Pages

16 October 2018

Until today, inadequate food supply, malnutrition, food adulteration, etc., are still the key concern in developing economies. In order to address these issues of food security crisis, and to stimulate a sustainable supply of liquid milk (LM), a cons...

  • Article
  • Open Access
5 Citations
2,923 Views
20 Pages

11 July 2024

Privacy by design (PbD) has attracted considerable attention from researchers and information security experts due to its enormous potential for protecting private information and improving the privacy and security quality of information technology p...

  • Article
  • Open Access
1,495 Views
31 Pages

An Exploratory Factor Analysis Approach on Challenging Factors for Government Cloud Service Adoption Intention

  • Ndukwe Ukeje,
  • Jairo A. Gutierrez,
  • Krassie Petrova and
  • Ugochukwu Chinonso Okolie

This study explores the challenges hindering the government’s adoption of cloud computing despite its benefits in improving services, reducing costs, and enhancing collaboration. Key barriers include information security, privacy, compliance, a...

  • Article
  • Open Access
20 Citations
3,041 Views
37 Pages

In this study, we identified the factors that influence consumer purchasing intentions and their perceptions of the trustworthiness of the privacy-related practices of e-commerce websites. We produced a list of website attributes that represent these...

  • Article
  • Open Access
26 Citations
12,443 Views
21 Pages

22 November 2023

The primary aim of this research is to thoroughly examine the determinants that influence customers’ intention towards embracing FinTech products and services, thereby enriching our understanding of the adoption and utilization trends within th...

  • Article
  • Open Access
3 Citations
2,465 Views
8 Pages

7 December 2022

Transparent linear NIR digital graphics with the intention of security information were printed on a polypropylene material. A label for expensive juices in transparent glass or plastic packaging is demonstrated. Obligatory information about the cont...

  • Article
  • Open Access
220 Citations
35,236 Views
14 Pages

14 August 2020

The rapid advancement of smart tourism technology brings new opportunities for tourism development. More travel destinations are relying on smart technology to attract more tourists to visit and enrich their travel experience. The main purpose of thi...

  • Article
  • Open Access
12 Citations
6,347 Views
21 Pages

24 September 2023

After the pandemic, there has been an increasing emphasis on customer convenience, with biometrics emerging as a key solution. This study empirically investigates the intention of Korean travelers to use airport biometric systems. The technology acce...

  • Article
  • Open Access
59 Citations
17,661 Views
27 Pages

10 August 2020

To enhance the sustainability of business operations, enterprises have interests in enterprise resource planning (ERP) transitions from an existing on-premise method to a cloud-based system. This study conducts a comprehensive analysis using the tech...

  • Article
  • Open Access
39 Citations
15,898 Views
27 Pages

This study validates and extends the latest unified theory of acceptance and use of technology (UTAUT2) with the privacy calculus model. To evaluate the adoption of healthcare and e-government applications, researchers have recommended—in previ...

  • Article
  • Open Access
1 Citations
1,589 Views
36 Pages

18 December 2024

Healthcare institutions and health registries often store patients’ health data. In order to ensure privacy, sensitive medical information is stored separately from the identifying information of the patient. Generally, institutions anonymize m...

  • Article
  • Open Access
19 Citations
5,901 Views
22 Pages

Security Risks and User Perception towards Adopting Wearable Internet of Medical Things

  • Sanjit Thapa,
  • Abubakar Bello,
  • Alana Maurushat and
  • Farnaz Farid

The Wearable Internet of Medical Things (WIoMT) is a collective term for all wearable medical devices connected to the internet to facilitate the collection and sharing of health data such as blood pressure, heart rate, oxygen level, and more. Standa...

  • Article
  • Open Access
4 Citations
2,957 Views
12 Pages

Design of a Trusted Content Authorization Security Framework for Social Media

  • Jiawei Han,
  • Qingsa Li,
  • Ying Xu,
  • Yan Zhu and
  • Bingxin Wu

18 February 2024

Artificial intelligence-generated content (AIGC) technology has had disruptive results in AI, representing a new trend in research and application and promoting a new era of AI. The potential benefits of this technology are both profound and diverse....

  • Article
  • Open Access
42 Citations
6,843 Views
18 Pages

9 July 2021

Whereas the pivotal role of trust in the adoption of e-government was highlighted in prior research, attention was rarely paid thus far to investigate the role of post-use trust and its impact on citizens’ continuous-use intention of e-government. Th...

  • Article
  • Open Access
41 Citations
9,431 Views
12 Pages

Internationally, there is increasing recognition of the importance of proper diet values and habits, a balanced intake of healthy food products, and rates of obesity control encompassing information on fat content and calories. In this context, some...

  • Article
  • Open Access
27 Citations
9,596 Views
20 Pages

20 October 2022

The Zero Trust concept is being adopted in information technology (IT) deployments, while human users remain to be the main risk for operational technology (OT) deployments. This article proposes to enhance the new Modbus/TCP Security protocol with a...

  • Article
  • Open Access
561 Views
24 Pages

14 October 2025

The cyber–physical integrated power distribution system is poised to become the predominant trend in the development of future power systems. Although the highly intelligent panoramic link information system in substations facilitates the effic...

  • Article
  • Open Access
9 Citations
4,687 Views
13 Pages

Distributed Key Management to Secure IoT Wireless Sensor Networks in Smart-Agro

  • Safwan Mawlood Hussein,
  • Juan Antonio López Ramos and
  • José Antonio Álvarez Bermejo

15 April 2020

With the deepening of the research and development in the field of embedded devices, the paradigm of the Internet of things (IoT) is gaining momentum. Its technology’s widespread applications increasing the number of connected devices constantl...

  • Article
  • Open Access
5 Citations
8,263 Views
32 Pages

8 July 2015

In Internet of Things (IoT), the main driving technologies are considered to be tiny sensory objects. These objects cannot host traditional preventive and detective technologies to provide protection against the increasing threat sophistication. Furt...

  • Article
  • Open Access
3 Citations
3,313 Views
18 Pages

The prevalence of information technology (IT) and information systems (IS) provides opportunities for enterprises to sustain open innovation. However, information silos that appeared with IS use have made IS inconvenient and thus impeded enterprises’...

of 3