2013 International Conference on Advanced Computer Science Applications and Technologies 2013
DOI: 10.1109/acsat.2013.36
|View full text |Cite
|
Sign up to set email alerts
|

Computer and Information Security Ethics -- Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…Accuracy, accessibility, adequacy, assurance, assistance, availability, attentiveness, communication, completeness, commitment, credibility, convenience, efficiency, delivery, currency, ease of use, expectation, format, flexibility, integration, fulfillment, product information, price, precision, product offerings, relevancy, quality, reliability, user-friendliness, security, accountability, pace, training, timeliness, website design, and usefulness are 36 aspects that have been previously extracted from reviewing the comprehensive literature in the information systems field [37][38][39][40][41][42][43]. Thus, EFA [44,45], which is mainly recognized as a procedure to generate theory, is employed, aiming to lessen the number of main aspects by identifying the basic factors that illustrate the majority of variance [46].…”
Section: Methodsmentioning
confidence: 99%
“…Accuracy, accessibility, adequacy, assurance, assistance, availability, attentiveness, communication, completeness, commitment, credibility, convenience, efficiency, delivery, currency, ease of use, expectation, format, flexibility, integration, fulfillment, product information, price, precision, product offerings, relevancy, quality, reliability, user-friendliness, security, accountability, pace, training, timeliness, website design, and usefulness are 36 aspects that have been previously extracted from reviewing the comprehensive literature in the information systems field [37][38][39][40][41][42][43]. Thus, EFA [44,45], which is mainly recognized as a procedure to generate theory, is employed, aiming to lessen the number of main aspects by identifying the basic factors that illustrate the majority of variance [46].…”
Section: Methodsmentioning
confidence: 99%
“…In recent years, there is a tendency among companies towards using social media for their commercial activities and businesses, and entering the social media world will bring them face to face with ethical challenges. Social network technology raises certain ethical issues with current life style (Taherdoost, 2011) and understanding of ethics has not been explored on a large scale (Guo, Wang, & Leskovec, 2011). Against this backdrop, the following hypothesis is postulated.…”
Section: Ethicsmentioning
confidence: 99%
“…Therefore in TPB model, three main factors are affecting BI including perceived behavioural control, subjective norm, and behavioural attitude. However, there are two main problems with TPB model [21,22]. First, the one's attitudes towards information technology will not be largely relevant if a computer system is not accessible.…”
Section: Theory Of Planned Behavior (Tpb)mentioning
confidence: 99%