Non-Compliant Mobile Device Usage and Information Systems Security: A Bystander Theory Perspective.
Narasimha ParavastuClaire A. SimmersMurugan AnandarajanPublished in: Int. J. Inf. Syst. Soc. Chang. (2018)
Keyphrases
- information systems
- mobile devices
- information security
- information assurance
- theoretical framework
- computer security
- health care
- access control
- mobile commerce
- databases
- context aware
- intrusion detection
- security level
- information technology
- theoretical foundation
- security issues
- design science
- mobile technologies
- design theory
- data security
- location aware
- security requirements
- user satisfaction
- mobile learning
- learning activities