Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information
Copyright © Taylor & Francis Group, LLC. Contemporary organizations operate in highly interconnected environments where they are frequently confronted by the challenge of balancing the protection of information resources with the need for sharing information. This tension between the expected...
| Main Authors: | Anderson, C., Baskerville, Richard, Kaul, M. |
|---|---|
| Format: | Journal Article |
| Published: |
M E Sharpe, Inc.
2017
|
| Online Access: | http://hdl.handle.net/20.500.11937/62286 |
Similar Items
Generative Control Theory for Information Security
by: Raymond, B., et al.
Published: (2014)
by: Raymond, B., et al.
Published: (2014)
Strategic Information Security Risk Management
by: Baskerville, Richard
Published: (2008)
by: Baskerville, Richard
Published: (2008)
Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online
by: Kim, J., et al.
Published: (2018)
by: Kim, J., et al.
Published: (2018)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Information security: Going digital (invited lecture)
by: Baskerville, Richard
Published: (2019)
by: Baskerville, Richard
Published: (2019)
Utilizing hippocratic database for personal information privacy protection
by: Mohamed Sidek, Zailani, et al.
Published: (2008)
by: Mohamed Sidek, Zailani, et al.
Published: (2008)
A projection of the future effects of quantum computation on information privacy and information security
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Framing the Information Security Process in Modern Society
by: Straub, D., et al.
Published: (2008)
by: Straub, D., et al.
Published: (2008)
Information Systems Security Strategy: A Process View
by: Baskerville, Richard, et al.
Published: (2008)
by: Baskerville, Richard, et al.
Published: (2008)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A Blockchain Interoperability Framework to Streamline Information Sharing for Achieving Sustainability Outcomes
by: Chandan, Anulipt
Published: (2023)
by: Chandan, Anulipt
Published: (2023)
User-centered evaluation of privacy models for protecting personal medical information
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Privacy models for protecting personal medical information: a preliminary study
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Transferring Information Security Risk to an Opponent: New Principles for Non-Financial Risk Transfer Treatments
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
Incident-centered information security: Managing a strategic balance between prevention and response
by: Baskerville, Richard, et al.
Published: (2014)
by: Baskerville, Richard, et al.
Published: (2014)
Information security and data protection: Selected issues
by: Zulhuda, Sonny
Published: (2013)
by: Zulhuda, Sonny
Published: (2013)
Mitigating privacy issues on Facebook by implementing information security awareness with Islamic perspectives
by: Faisal, Ammy Amelia, et al.
Published: (2013)
by: Faisal, Ammy Amelia, et al.
Published: (2013)
Intervention effect rates as a path to research relevance: Information systems security example
by: Siponen, M., et al.
Published: (2018)
by: Siponen, M., et al.
Published: (2018)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
Economic perspective analysis of protecting big data security and privacy
by: Tao, Hai, et al.
Published: (2019)
by: Tao, Hai, et al.
Published: (2019)
Information security professional perceptions of knowledge-sharing intention in virtual communities under social cognitive theory
by: Tamjidyamcholo, Alireza, et al.
Published: (2013)
by: Tamjidyamcholo, Alireza, et al.
Published: (2013)
An information privacy taxonomy for collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Principles for re-designing information systems for environmental sustainability
by: Baskerville, Richard, et al.
Published: (2016)
by: Baskerville, Richard, et al.
Published: (2016)
A new conceptual framework within information privacy: Meta privacy
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Gathering of information in internet environment: Balancing the right to discovery and right to protect the privacy under the laws
by: Mohamed, Duryana
Published: (2013)
by: Mohamed, Duryana
Published: (2013)
Gathering of information in Internet environment: balancing the right to discovery and right to protect the privacy under the laws
by: Mohamed, Duryana
Published: (2013)
by: Mohamed, Duryana
Published: (2013)
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al.
by: Esmeel, Thamer Khalil, et al.
Information Theory Perspective on Modelling Sustainability
by: Todorov, Vladislav, et al.
Published: (2010)
by: Todorov, Vladislav, et al.
Published: (2010)
Security and density: A paradox of public protection at the expense of personal privacy
by: Jonescu, Emil
Published: (2017)
by: Jonescu, Emil
Published: (2017)
Design theorizing individual information systems
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
Privacy and security problems in using health information application in Smart National Identity Card (SNIC)
by: Hassan, Ismail Bile, et al.
Published: (2014)
by: Hassan, Ismail Bile, et al.
Published: (2014)
National reconciliation
by: Ismail, Nik Ahmad Hisham
Published: (2014)
by: Ismail, Nik Ahmad Hisham
Published: (2014)
Conceptualizing a framework to enhance information security culture and compliance behavior in organizations through protection motivation theory
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
Information and communication privacy in wireless sensor networks
by: Salami, Abdulazeez F., et al.
Published: (2011)
by: Salami, Abdulazeez F., et al.
Published: (2011)
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
The computational view of information privacy enhancing technologies
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Prioritizing Information for Achieving QoS Control in WSN
by: Sharif, Atif, et al.
Published: (2010)
by: Sharif, Atif, et al.
Published: (2010)
Individual information systems as a research arena
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
Similar Items
-
Generative Control Theory for Information Security
by: Raymond, B., et al.
Published: (2014) -
Strategic Information Security Risk Management
by: Baskerville, Richard
Published: (2008) -
Breaking the Privacy Kill Chain: Protecting Individual and Group Privacy Online
by: Kim, J., et al.
Published: (2018) -
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006) -
Information security: Going digital (invited lecture)
by: Baskerville, Richard
Published: (2019)