Search for: security
- Related search terms
- Security+in+information
- security+of+information
- security+by+design+information
- security of information systems by design
- Security by Design in Enterprise Architecture: A Methodology Proposal
-
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
Year: 2015 / Volume: 39 / Issue: 1
$15.00 -
Discovering and Disciplining Computer Abuse in Organizations: A Field Study
Year: 1990 / Volume: 14 / Issue: 1
$15.00 -
Threats to Information Systems: Today's Reality, Yesterday's Understanding
Year: 1992 / Volume: 16 / Issue: 2
$15.00 -
Differential Effects of Prior Experience on the Malware Resolution Process
Year: 2014 / Volume: 38 / Issue: 3
$15.00 -
The Impact of Malicious Agents on the Enterprise Software Industry
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
Beyond Deterrence: An Expanded View of Employee Computer Abuse
Year: 2013 / Volume: 37 / Issue: 1
$15.00 -
Drawing a Line in the Sand: Commitment Problem in Ending Software Support
Year: 2017 / Volume: 41 / Issue: 4
$15.00 -
Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors
Year: 2013 / Volume: 37 / Issue: 4
$15.00 -
Impact of Customer Compensation Strategies on Outcomes and the Mediating Role of Justice Perceptions: A Longitudinal Study of Target’s Data Breach
Year: 2022 / Volume: 46 / Issue: 1
$15.00 -
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications
Year: 2015 / Volume: 39 / Issue: 1
$15.00