Search for: Information security
- Related search terms
- INFORMATION TECHNOLOGY INVESTMENTS AND FIRM RISK ACROSS INDUSTRIES: EVIDENCE FROM THE BOND MARKET
- INFORMATION TECHNOLOGY IMPACTS ON FIRM PERFORMANCE: AN EXTENSION OF KOHLI AND DEVARAJ
- security+of+information
- information+systems+and+based+research
- Information+technology+and+the+performance+of+the+customer+service+process:+A+resource-based+analysis
-
Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors
Year: 2013 / Volume: 37 / Issue: 4
$15.00 -
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications
Year: 2015 / Volume: 39 / Issue: 1
$15.00 -
Are Markets for Vulnerabilities Effective?
Year: 2012 / Volume: 36 / Issue: 1
$15.00 -
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
Year: 2015 / Volume: 39 / Issue: 1
$15.00 -
Differential Effects of Prior Experience on the Malware Resolution Process
Year: 2014 / Volume: 38 / Issue: 3
$15.00 -
The Information Center Concept: A Normative Model and a Study of Six Installations
Year: 1987 / Volume: 11 / Issue: 4
$15.00 -
The Consequences of Information Technology Control Weaknesses on Management Information Systems: The Case of Sarbanes-Oxley Internal Control Reports
Year: 2012 / Volume: 36 / Issue: 1
$15.00 -
The Impact of Malicious Agents on the Enterprise Software Industry
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Discovering and Disciplining Computer Abuse in Organizations: A Field Study
Year: 1990 / Volume: 14 / Issue: 1
$15.00 -
Beyond Deterrence: An Expanded View of Employee Computer Abuse
Year: 2013 / Volume: 37 / Issue: 1
$15.00