Examining the intended and unintended consequences of organisational privacy safeguards
Published 2017 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Examining the intended and unintended consequences of organisational privacy safeguards
Authors
Keywords
Information privacy, privacy safeguards, healthcare, imbalance challenge, grounded theory, interpretive research, unintended consequences, intended consequences, the unintended consequences of privacy safeguard enactment (UCPSE) framework
Journal
EUROPEAN JOURNAL OF INFORMATION SYSTEMS
Volume 26, Issue 1, Pages 37-65
Publisher
Informa UK Limited
Online
2016-07-27
DOI
10.1057/s41303-016-0001-6
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- How Ethics Can Enhance Organizational Privacy: Lessons from the Choicepoint and TJX Data Breaches
- (2017) Culnan et al. MIS QUARTERLY
- Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- (2017) Bulgurcu et al. MIS QUARTERLY
- Information Privacy Research: An Interdisciplinary Review
- (2017) Smith et al. MIS QUARTERLY
- Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems
- (2017) Bélanger et al. MIS QUARTERLY
- Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations
- (2015) Anthony Vance et al. MIS QUARTERLY
- What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors
- (2015) Scott R. Boss et al. MIS QUARTERLY
- De-identification of clinical narratives through writing complexity measures
- (2014) Muqun Li et al. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS
- Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior
- (2013) Mark J. Keith et al. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES
- Using Accountability to Reduce Access Policy Violations in Information Systems
- (2013) Anthony Vance et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Future directions for behavioral information security research
- (2012) Robert E. Crossler et al. COMPUTERS & SECURITY
- Does deterrence work in reducing information security policy abuse by employees?
- (2011) Qing Hu et al. COMMUNICATIONS OF THE ACM
- Secure Management of Biomedical Data With Cryptographic Hardware
- (2011) M. Canim et al. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE
- Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures
- (2011) Paul Benjamin Lowry et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Using statistical and machine learning to help institutions detect suspicious access to electronic health records
- (2011) Aziz A Boxwala et al. JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION
- Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities
- (2010) Clay Posey et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Aspect-oriented design and implementation of adaptable access control for Electronic Medical Records
- (2010) Kung Chen et al. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS
- The MITRE Identification Scrubber Toolkit: Design, training, and assessment
- (2010) John Aberdeen et al. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS
- Determining the privacy policy deficiencies of health ICT applications through semi-formal modelling
- (2010) Peter R. Croll INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS
- Aspects of privacy for electronic health records
- (2010) Sebastian Haas et al. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS
- Enhancing Privacy and Authorization Control Scalability in the Grid Through Ontologies
- (2009) I. Blanquer et al. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE
- The health information system security threat lifecycle: An informatics theory
- (2009) Juanita I. Fernando et al. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS
- A Cryptographic Approach to Securely Share and Query Genomic Sequences
- (2008) M. Kantarcioglu et al. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE
- A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations
- (2008) Wei-Bin Lee et al. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE
- Web-based secure access from multiple patient repositories
- (2007) Jun Choe et al. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExplorePublish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn More