Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems

Communications of the IIMA

Privacy

Publication Year

Articles 1 - 4 of 4

Full-Text Articles in Business

End-Users Compliance To The Information Security Policy: A Comparison Of Motivational Factors, Peter Straver, Pascal Ravesteyn Dec 2019

End-Users Compliance To The Information Security Policy: A Comparison Of Motivational Factors, Peter Straver, Pascal Ravesteyn

Communications of the IIMA

Business information, held within information systems, is critical for most organizations. To protect these critical information assets, security controls should be deployed which might come as a hindrance for the end-users. The Information Security Policies (ISP) give direction to their behaviors. Organizations can focus on conditions likely to promote so-called motivational factors influencing the end-users intentions to perform the desired behavior of compliance to ISP in order to protect these information assets.

In total, six motivational factors, applicable to intentions on compliance, are found during research and are measured within five organizational contexts. From the measurements and analysis is learned, …


Electronic Privacy: Patient Concerns, Anza A. Akram Jan 2015

Electronic Privacy: Patient Concerns, Anza A. Akram

Communications of the IIMA

This study postulates issues related to electronic privacy and addresses the factors that directly effect personal electronic information. There is no positivist study done to measure patient privacy concerns using Smith et a 1(1996) privacy model and the effect of previous experience and media on these concerns. This study measures the four dimensions of patient concerns against the electronic privacy, defines as the automation of patient records, meaning that computerized patient records will be signed, modified, authenticated, stored, and retrieved via computer. The defined model uses multiple constructs with multiple indicators and thus. Partial Least Square (PLS) is applied to …


Lying About Private Information: An Ethical Justification, Sabah S. Al-Fedaghi Jan 2015

Lying About Private Information: An Ethical Justification, Sabah S. Al-Fedaghi

Communications of the IIMA

Lying motivated by a fear of misusing private information is a key issue in ethics with many important applications in law, business, politics, and psychology. In this paper, lying is separated according to two types of assertions: lying about non-private information and lying about private information. This distinction is applied to the case of the 'known murderer' in the context of Kant's categorical imperative. The main result of the paper is narrowing the ethical dilemma to a choice between 'a zero private information society' and 'an alTlying-about-private-information society'. We claim that privacy as a universal requirement supports lying about private …


Cracking Down On Cybercrime Global Response: The Cybercrime Convention, Sylvia Mercado Kierkegaard Jan 2015

Cracking Down On Cybercrime Global Response: The Cybercrime Convention, Sylvia Mercado Kierkegaard

Communications of the IIMA

Computers and the Internet have brought innumerable benefits to society. They have revolutionized the way people work, play, and communicate. In spite of the benefits the Internet has introduced to the global community, it is also fraught with risks associated with undesirable elements keen to misuse its usage. Computers and the Internet present new ways to engage in old crimes, such as fraud and piracy. They also have made it possible for criminals to perpetrate new harmful acts, like data access and interference. However, national legislations and regional agreements are not sufficient to address the global nature of cybercrime. Therefore, …