1 - 6 of 6 articles
AbstractE-commerce businesses have endeavored to facilitate online transactions by establishing website reputations through use of digital security mechanisms to alleviate the uncertainty about online transactions. This study incorporates the two-step flow of communication theory to elaborate on...
AbstractSocial engineering is becoming the most prevalent strategy used by hackers today. With continually blossoming e-commerce activity on the web, customers adopting online banking services will become prime targets for such hackers. As such, banks have a responsibility to contain this issue...
AbstractInformation Systems (IS) Security has become a critical issue in the IT world. Among all threats against IS security, the insider threat is the greatest. This paper proposes a game theoretical model to study the economic impact of insider threats on IS security investments. We identify...
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.