2020
DOI: 10.1080/0144929x.2020.1781259
|View full text |Cite
|
Sign up to set email alerts
|

Between privacy and security: the factors that drive intentions to use cyber-security applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 42 publications
0
1
0
Order By: Relevance
“…Information sharing has become a significant part of companies' security efforts, and the optimal level of sharing can be conditioned by the budget allocated to protection and security [39,40]. The implementation of security applications protects against threats, but they also tend to access a range of information that invades privacy [41]. Organizations that invest in security systems also consider critical infrastructure security, as this refers to the protection of systems, networks, and assets whose operation ensures statewide security and, if computing resources are limited, it is impossible to run anti-malware programs [42].…”
Section: Security Investmentsmentioning
confidence: 99%
“…Information sharing has become a significant part of companies' security efforts, and the optimal level of sharing can be conditioned by the budget allocated to protection and security [39,40]. The implementation of security applications protects against threats, but they also tend to access a range of information that invades privacy [41]. Organizations that invest in security systems also consider critical infrastructure security, as this refers to the protection of systems, networks, and assets whose operation ensures statewide security and, if computing resources are limited, it is impossible to run anti-malware programs [42].…”
Section: Security Investmentsmentioning
confidence: 99%