69
Views
7
CrossRef citations to date
0
Altmetric
Original Articles

Customer Information: Protecting the Organization’s Most Critical Asset from Misappropriation and Identity Theft

&
Pages 3-15 | Published online: 10 Sep 2014

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (4)

Clay Posey, Uzma Raja, Robert E. Crossler & A. J. Burns. (2017) Taking stock of organisations’ protection of privacy: categorising and assessing threats to personally identifiable information in the USA. European Journal of Information Systems 26:6, pages 585-604.
Read now
Abubakar Bello Garba, Jocelyn Armarego, David Murray & William Kenworthy. (2015) Review of the Information Security and Privacy Challenges in Bring Your Own Device (BYOD) Environments. Journal of Information Privacy and Security 11:1, pages 38-54.
Read now
Jan Gayness Clark, Nicole Lang Beebe, Karen Williams & Linda Shepherd. (2009) Security and Privacy Governance: Criteria for Systems Design. Journal of Information Privacy and Security 5:4, pages 3-30.
Read now
William H. Ross, Christopher J. Meyer, Jeng-Chung V. Chen & Paul Keaton. (2009) Information Protection at Telecommunications Firms: Human Resource Management Strategies and their Impact on Organizational Justice. Journal of Information Privacy and Security 5:1, pages 49-77.
Read now

Articles from other publishers (3)

Karen Renaud, Basie Von Solms & Rossouw Von Solms. (2019) How does intellectual capital align with cyber security?. Journal of Intellectual Capital 20:5, pages 621-641.
Crossref
May Fen Gan, Hui Na Chua & Siew Fan Wong. (2019) Privacy Enhancing Technologies implementation: An investigation of its impact on work processes and employee perception. Telematics and Informatics 38, pages 13-29.
Crossref
Amitava Dutta & Rahul Roy. (2008) Dynamics of organizational information security. System Dynamics Review 24:3, pages 349-375.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.