Showing 1 - 5 of 5
Persistent link: https://www.econbiz.de/10012133854
Purpose – The purpose of this paper is to evaluate privacy boundaries and explores employees’ reactions in employee monitoring. Design/methodology/approach – The research used the metaphor of boundary turbulence in the Communication Privacy Management (CPM) theory to demonstrate the...
Persistent link: https://www.econbiz.de/10014825871
Persistent link: https://www.econbiz.de/10011588617
Purpose – This paper aims to examine the influence of organization factors on the effectiveness of implementing BS7799, an information security management (ISM) standard. Design/methodology/approach – Based on literature review, a research model was formulated by extracting the antecedents...
Persistent link: https://www.econbiz.de/10014823947
Purpose – This paper aims to examine the influence of organization culture on the effectiveness of implementing information security management (ISM). Design/methodology/approach – Based on a literature review, a model of the relationship between organizational culture and ISM was...
Persistent link: https://www.econbiz.de/10014824024