Sep 1, 2015 | Research library
Information systems researchers typically use self-report measures, such as questionnaires to study consumers’ online risk perception. The self-report approach captures the conscious perception of online risk but not the unconscious perception that precedes and...
Sep 1, 2015 | Research library
This paper aims to summarize the findings of risk research across various fields and examine their impact on risk management practices. The fundamental approaches to risk discussed in this paper suggest that the concepts of probability used in studying processes in...
Aug 30, 2015 | Research library
This study investigates the roles of social influence and personal preference in users’ social media adoption behavior, proposing sociability as a criterion to classify social media. The study examines the determinants of usage intention across social media with...
Aug 13, 2015 | Research library
A report on a set of semi-structured interviews that aimed to determine how firms make decisions regarding their cyber security investment. The report finds that senior management understand the importance of cyber security, that budgeting for cyber security is not...
Aug 13, 2015 | Research library
An overview of the threat landscape of HP in 2014. This report outlines the threats that occurred and the changes that were made to improve the resilience of the software company HP. The report aimed to provide an understanding of potential threats and interventions...
Aug 10, 2015 | Research library
This paper discusses the involvement of CEOs in cyber security. Backed up by strong research, it explores the current state of CEO involvement, addresses some of the challenges involved in CEO involvement and offers four golden rules of cyber security....