Purpose Understanding the causes and the consequences of online romance scam victimization fear, a psychological stress, is crucial for online daters to achieve a positive experience and for online dating platforms to provide that experience. This research contextualized and tested a theory concerning the negative psychological factors of online romance scams and their consequences on online dating positive psy...
Organizations invest manpower and resources to ensure that sensitive corporate data is secure in the hands of its employees. Information security policies of these organizations explicitly state responsibilities for employees. But there is a massive gap between employee security performance and understanding of their information security requirements. In this study, we explore the factors that can enhance infor...
Managing information security in Information Technology (IT) outsourcing is important. We conduct a Delphi Study to identify key information security concerns in IT outsourcing. A follow-up qualitative study was also undertaken to understand (in)congruence between clients and vendors with respect to the top information security concerns. In a final synthesis, our study found three central constructs to ensure i...
Deciding between security and usability of systems remains an important topic among managers and academics. One of the fundamental problems is to balance the conflicting requirements of security and usability. We argue that definition of objectives for security and usability allows for deciding about the right balance between security and usability. To this effect we propose two instruments for assessing securi...
The next generation in computing transcends the paradigm of traditional desktop and client-server architectures. IT products and solutions of the third platform, specifically in the scope of the Internet of Things (IoT) raise new security threats and vulnerabilities, suggesting that a set of competences is needed for any IoT product or service, regarding information security. The knowledge of that set of skills...
• Purpose The purpose of this paper is to define objectives for Customer Relationship Management (CRM) system adoption. The objectives provide a theoretical basis for strategizing about CRM system adoption. The objectives also provide managers to clearly direct CRM system adoption, thus ensuring a highly successful outcome. • Design/methodology/approach The authors conducted a sequential multi-method research i...
Information Systems (IS) risk management is a challenge to every organization, in that they are exposed to cyber-attacks that bypass physical barriers. Organizations increase online business in order to remain competitive, but as a consequence their online exposure becomes greater. However their risk management practices and governance are inadequate in the face of increasing new threats and vulnerabilities. Th...
In today’s business environment, organisations have recognised the importance of information. Consequently the use of IT is regarded as a primary means of enhancing business improvement. This has resulted in a number organisations focusing on different means of structuring, and process orientation is considered to be the most suitable option. This paper explores issues related with managing information and the ...
In this paper we present an analysis of top security issues related to IT outsourcing. Identification of top issues is important since there is a limited understanding of security in outsourcing relationships. Such an analysis will help decision makers in appropriate strategic planning for secure outsourcing. Our analysis is conducted through a two-phase approach. First, a Delphi study is undertaken to identify...
The planning and subsequent implementation of Enterprise Resource Planning (ERP) systems still present a significant challenge for most organizations. Although consulting firms and customer enterprises have been aquiring more experience and expertise in the field, the level of sophistication of these systems and their wide organizational and social impact frequently leads to failed ERP implementations. In an at...