Using trust and anonymity to expand the use of anonymizing systems that improve security across organizations

article by Anthony Vance et al published July 2017 in Security Journal

Using trust and anonymity to expand the use of anonymizing systems that improve security across organizations is …
instance of (P31):
scholarly articleQ13442814

External links are
P6179Dimensions Publication ID1009912125
P356DOI10.1057/SJ.2015.22
P2888exact matchhttps://scigraph.springernature.com/pub.10.1057/sj.2015.22

P50authorPaul Benjamin LowryQ56650255
P2093author name stringDavid W Wilson
Anthony Vance
P2860cites workThe moderator–mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerationsQ25938996
Effects of deindividuation variables on stealing among Halloween trick-or-treatersQ28314740
Trust in automation. Part II. Experimental studies of trust and human intervention in a process control simulationQ30464274
Common method biases in behavioral research: a critical review of the literature and recommended remediesQ34265850
Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detectionQ55924155
The DeLone and McLean Model of Information Systems Success: A Ten-Year UpdateQ56001836
Electronic meeting systemsQ56018354
Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information TechnologyQ56226554
A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field StudiesQ56226565
Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumersQ56865791
The Theory of Reasoned Action: A Meta-Analysis of Past Research with Recommendations for Modifications and Future ResearchQ57310400
Information Systems Success: The Quest for the Dependent VariableQ57311204
On the consequences of deindividuation manipulations for the strategic communication of self: Identifiability and the presentation of social identityQ57916225
Protecting Critical Information Infrastructure: Developing Cybersecurity PolicyQ58359103
Dimensions of Business-to-Consumer (B2C) Systems Success in KuwaitQ59108975
Is Trust Always Better than Distrust? The Potential Value of Distrust in Newer Virtual Teams Engaged in Short-Term Decision-MakingQ59108985
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trustQ59108993
Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policiesQ59109019
The Role of Extra-Role Behaviors and Social Controls in Information Security Policy EffectivenessQ59109032
A Picture is Worth a Thousand Words: Source Credibility Theory Applied to Logo and Website Design for Heightened Credibility and Consumer TrustQ59109064
Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by IndividualsQ59109081
Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use ItQ59109110
When trust and distrust collide online: The engenderment and role of consumer ambivalence in online consumer behaviorQ59109132
Future directions for behavioral information security researchQ59109155
The Drivers in the Use of Online Whistle-Blowing Reporting SystemsQ59109183
Using Accountability to Reduce Access Policy Violations in Information SystemsQ59109197
Effects of Automated and Participative Decision Support in Computer-Aided Credibility AssessmentQ59109233
Technology Dominance in Complex Decision Making: The Case of Aided Credibility AssessmentQ59109266
Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web SitesQ59109317
P433issue3
P921main subjectanonymityQ308859
P304page(s)979-999
P577publication date2017-07-01
P1433published inSecurity JournalQ15759455
P1476titleUsing trust and anonymity to expand the use of anonymizing systems that improve security across organizations
P478volume30

Search more.