Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- articleNovember 2024
How About Enhancing Organizational Security: Critical Success Factors in Information Security Management Performance
Journal of Global Information Management (JGIM), Volume 32, Issue 1Pages 1–18https://doi.org/10.4018/JGIM.358745Despite its importance, there is little research on how organizations perceive information security management. This study classified critical success factors in information security management at the organizational level. A performance model was ...
- articleSeptember 2024
Trust in Cryptocurrency Payments: A Cross-Cultural Analysis of Factors Influencing Adoption
Journal of Organizational and End User Computing (JOEUC-IGI), Volume 36, Issue 1Pages 1–36https://doi.org/10.4018/JOEUC.353910Although cryptocurrencies are not yet widely used as a method of payment in retail and commercial transactions, they are attracting a growing level of interest. However, if cryptocurrencies are to attract mass adoption for settlement, they will need to ...
- articleAugust 2024
Mapping the Impact of Consumer Online Service Experience on Online Impulse Buying Behaviour
Journal of Global Information Management (JGIM), Volume 32, Issue 1Pages 1–27https://doi.org/10.4018/JGIM.347882Managers of e-commerce platforms and online retail stores have noticed a connection between the consumer online service experience (COSE) and the inclination to engage in online impulse buying behaviour (OIBB). Previous research has shown that COSE can ...
- articleJuly 2024
Cracking the Code: A Comprehensive Analysis of Information Security Strategies Among Professionals
Journal of Organizational and End User Computing (JOEUC-IGI), Volume 36, Issue 1Pages 1–21https://doi.org/10.4018/JOEUC.345933With the expanding reach of the Internet of Things, information security threats are increasing, including from the very professionals tasked with defending against these threats. This study identified factors impacting information security behavior ...
- articleOctober 2023
Enforcing Information System Security: Policies and Procedures for Employee Compliance
International Journal on Semantic Web & Information Systems (IJSWIS-IGI), Volume 19, Issue 1Pages 1–17https://doi.org/10.4018/IJSWIS.331396Every year brings numerous security breaches that lead to highly destructive ransomware attacks, data leaks, and reputational damage to governments, companies, and other organizations around the world. As a result, there is a growing need to ensure that ...
- articleMay 2023
Increasing Continuous Engagement With Open Government Data: Learning From the Saudi Experience
- Yulong David Liu,
- Ibrahim Mutambik,
- Abdullah Almuqrin,
- Waleed Halboob,
- Abdullah Alakeel,
- Abdelouahid Derhab
Journal of Global Information Management (JGIM), Volume 31, Issue 1Pages 1–21https://doi.org/10.4018/JGIM.322437A number of countries are today implementing open government data (OGD) initiatives. Yet many of these initiatives are failing to attract the levels of continuous use they need to deliver an acceptable return on investment. This raises the obvious ...