| Article ID | Journal | Published Year | Pages | File Type |
|---|---|---|---|---|
| 7429159 | International Journal of Information Management | 2012 | 12 Pages |
Abstract
⺠Researchers are often unaware of how data can be lost or stolen from Internet-connected servers. ⺠Many researchers do not have the time or ability to read complex technical manuals or documentation, and thus do not implement basic security practices (i.e. strong, non-shared passwords). ⺠Ignorance of data security leading to a breech can have serious consequences including removal of grant funding and IRB inquiries.
Related Topics
Social Sciences and Humanities
Business, Management and Accounting
Management Information Systems
Authors
Jonathan E. Westfall, Cindy M. Kim, Annie Y. Ma,
