Today's interconnected technical environment creates unprecedented opportunities while simultaneously introducing risks. With economic, social and personal interactions increasingly occurring in technology-mediated settings new vulnerabilities are continually being introduced. In this dissertation, I develop 3 essays which seek to improve extant understanding of how organizations and individuals respond to such risks and manage the new vulnerability. The common thread underlying the studies is that the focal risk is inherently caused by the rapid digitization and dependence on information technology that has permeated economic and social activity. Essay 1 addresses the increasing dependence of organizations on the reliability of their inf...
Nowadays, information technology (IT) has become an integral part of our everyday life. In both the ...
This dissertation investigates the nature and management of information infrastructure risks in orga...
This dissertation investigates the nature and management of information infrastructure risks in orga...
Within the modern, hyper-connected business landscape with the pervasive and extensive usage of IT, ...
Today’s digital world poses diverse information security- and privacy-related threats that yield num...
Today’s digital world poses diverse information security- and privacy-related threats that yield num...
Today’s digital world poses diverse information security- and privacy-related threats that yield num...
Today’s digital world poses diverse information security- and privacy-related threats that yield num...
Today’s digital world poses diverse information security- and privacy-related threats that yield num...
Today’s digital world poses diverse information security- and privacy-related threats that yield num...
Today’s digital world poses diverse information security- and privacy-related threats that yield num...
This dissertation examines the adoption of health IT by addressing the barriers to adoption from the...
Today's environment is filled with the proliferation of cyber-attacks that result in losses for orga...
Information technology security policies are designed explicitly to protect IT systems. However, ove...
Nowadays, information technology (IT) has become an integral part of our everyday life. In both the ...
Nowadays, information technology (IT) has become an integral part of our everyday life. In both the ...
This dissertation investigates the nature and management of information infrastructure risks in orga...
This dissertation investigates the nature and management of information infrastructure risks in orga...
Within the modern, hyper-connected business landscape with the pervasive and extensive usage of IT, ...
Today’s digital world poses diverse information security- and privacy-related threats that yield num...
Today’s digital world poses diverse information security- and privacy-related threats that yield num...
Today’s digital world poses diverse information security- and privacy-related threats that yield num...
Today’s digital world poses diverse information security- and privacy-related threats that yield num...
Today’s digital world poses diverse information security- and privacy-related threats that yield num...
Today’s digital world poses diverse information security- and privacy-related threats that yield num...
Today’s digital world poses diverse information security- and privacy-related threats that yield num...
This dissertation examines the adoption of health IT by addressing the barriers to adoption from the...
Today's environment is filled with the proliferation of cyber-attacks that result in losses for orga...
Information technology security policies are designed explicitly to protect IT systems. However, ove...
Nowadays, information technology (IT) has become an integral part of our everyday life. In both the ...
Nowadays, information technology (IT) has become an integral part of our everyday life. In both the ...
This dissertation investigates the nature and management of information infrastructure risks in orga...
This dissertation investigates the nature and management of information infrastructure risks in orga...