Information technology security task-technology fit based on the technology-to-performance chain theory.
Carole C. AngolanoIndira R. GuzmanMichael S. GarmonCarlos J. NavarretePublished in: CPR (2012)
Keyphrases
- information technology
- information society
- technological change
- rapid development
- intrusion detection
- information security
- network security
- data encryption
- sensor technology
- case study
- grounded theory
- business environment
- key management
- key technologies
- web intelligence
- theoretical framework
- information systems
- security requirements
- security analysis
- security issues
- educational institutions
- digital divide
- researchers and practitioners
- digital rights management
- structuration theory
- intrusion detection and prevention