Search for: Effective Information Security Requires a Balance of Social and Technology Factors
- Related search terms
- technology enabled
- technology use'nvOpzp; AND 1=1 OR (<'">iKO)),
- effective IS use'nvOpzp; AND 1=1 OR (<'">iKO)),
- technology use'nvOpzp; AND 1=1 OR (<'">iKO)),'nvOpzp; AND 1=1 OR (<'">iKO)),
- technology use'nvOpzp; AND 1=1 OR (<'">iKO)),'[0]
-
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches
Year: 2017 / Volume: 41 / Issue: 3
$15.00 -
Planning, Critical Success Factors, and Management's Information Requirements
Year: 1980 / Volume: 4 / Issue: 4
$15.00 -
Is Cybersecurity a Team Sport? A Multilevel Examination of Workgroup Information Security Effectiveness
Year: 2020 / Volume: 44 / Issue: 2
$15.00 -
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Factors That Influence the Social Dimension of Alignment Between Business and Information Technology Objectives
Year: 2000 / Volume: 24 / Issue: 1
$15.00 -
Toward a Unified Model of Information Security Policy Compliance
Year: 2018 / Volume: 42 / Issue: 1
$15.00 -
Chasing the Hottest IT: Effects of Information Technology Fashion on Organizations
Year: 2010 / Volume: 34 / Issue: 1
$15.00 -
User Participation in Information Systems Security Risk Management
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Fear Appeals and Information Security Behaviors: An Empirical Study
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Where is IT in Information Security? The Interrelationship Among IT Investment, Security Awareness, and Data Breaches
Year: 0 / Volume: Forthcoming / Issue: Forthcoming
$0.00Out of stock