Search for: security information systems
- Related search terms
- information systems'nvOpzp; AND 1=1 OR (<'">iKO)),
- INFORMATION TECHNOLOGY IDENTITY: A KEY DETERMINANT OF IT FEATURE AND EXPLORATORY USAGE.'nvOpzp; AND 1=1 OR (<'">iKO)),
- information consumption,risk preference, and portfolio adjustment: a machine learning-enabled empirical investigation
- information systems'nvOpzp; AND 1=1 OR (<'">iKO)),'
- information systems'nvOpzp; AND 1=1 OR (<'">iKO)),'[0]
-
User Participation in Information Systems Security Risk Management
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Improving Employees’ Compliance Through Information Systems Security Training: An Action Research Study
Year: 2010 / Volume: 34 / Issue: 4
$15.00 -
Circuits of Power in Creating de jure Standards: Shaping an International Information Systems Security Standard
Year: 2006 / Volume: 30 / Issue: SI
$15.00 -
Coping With Systems Risk: Security Planning Models for Management Decision Making
Year: 1998 / Volume: 22 / Issue: 4
$15.00 -
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Toward a Unified Model of Information Security Policy Compliance
Year: 2018 / Volume: 42 / Issue: 1
$15.00 -
*SIM Competition Paper:* Measuring Information Systems Performance: Experience with the Management By Results System at Security Pacific Bank
Year: 1988 / Volume: 12 / Issue: 2
$15.00 -
Circuits of Power: A Study of Mandated Compliance to an Information Systems Security De Jure Standard in a Government Organization
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Fear Appeals and Information Security Behaviors: An Empirical Study
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations
Year: 2010 / Volume: 34 / Issue: 3
$15.00