Search for: security by design information
- Related search terms
- Design and Evaluation of Auto-ID Enabled Shopping Assistance Artifacts in Customers' Mobile Phones: Two Retail Store Laboratory
- information systems'nvOpzp; AND 1=1 OR (<'">iKO)),
- INFORMATION TECHNOLOGY IDENTITY: A KEY DETERMINANT OF IT FEATURE AND EXPLORATORY USAGE.'nvOpzp; AND 1=1 OR (<'">iKO)),
- information consumption,risk preference, and portfolio adjustment: a machine learning-enabled empirical investigation
- information systems'nvOpzp; AND 1=1 OR (<'">iKO)),'[0]
-
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
User Participation in Information Systems Security Risk Management
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Market Value of Voluntary Disclosures Concerning Information Security
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Toward a Unified Model of Information Security Policy Compliance
Year: 2018 / Volume: 42 / Issue: 1
$15.00 -
Where is IT in Information Security? The Interrelationship Among IT Investment, Security Awareness, and Data Breaches
Year: 0 / Volume: Forthcoming / Issue: Forthcoming
$0.00Out of stock -
Fear Appeals and Information Security Behaviors: An Empirical Study
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Meaningful Healthcare Security: Does Meaningful-Use Attestation Improve Information Security Performance?
Year: 2018 / Volume: 42 / Issue: 4
$15.00 -
Improving Employees’ Compliance Through Information Systems Security Training: An Action Research Study
Year: 2010 / Volume: 34 / Issue: 4
$15.00 -
Is Cybersecurity a Team Sport? A Multilevel Examination of Workgroup Information Security Effectiveness
Year: 2020 / Volume: 44 / Issue: 2
$15.00 -
Correlated Failures, Diversification, and Information Security Risk Management
Year: 2011 / Volume: 35 / Issue: 2
$15.00