Search for: Security+in+information
-
The Consequences of Information Technology Control Weaknesses on Management Information Systems: The Case of Sarbanes-Oxley Internal Control Reports
Year: 2012 / Volume: 36 / Issue: 1
$15.00 -
The Impact of Malicious Agents on the Enterprise Software Industry
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
The Evolution of Risk in Information Systems Offshoring: The Impact of Home Country Risk, Firm Learning, and Competitive Dynamics
Year: 2009 / Volume: 33 / Issue: 3
$15.00 -
Beyond Deterrence: An Expanded View of Employee Computer Abuse
Year: 2013 / Volume: 37 / Issue: 1
$15.00 -
(Un)Structured Creativity in Information Systems Organizations
Year: 1993 / Volume: 17 / Issue: 4
$15.00 -
Inducing Sensitivity to Deception in Order to Improve Decision Making Performance: A Field Study
Year: 2002 / Volume: 26 / Issue: 2
$15.00 -
A Longitudinal Study of Unauthorized Access Attempts on Information Systems: The Role of Opportunity Contexts
Year: 2019 / Volume: 43 / Issue: 2
$15.00 -
Design and Evaluation of Auto-ID Enabled Shopping Assistance Artifacts in Customers' Mobile Phones: Two Retail Store Laboratory Experiments
Year: 2017 / Volume: 41 / Issue: 1
$15.00 -
The Implementation of Strategic Information Systems Planning Methodologies
Year: 1988 / Volume: 12 / Issue: 3
$15.00 -
Avoidance of Information Technology Threats: A Theoretical Perspective
Year: 2009 / Volume: 33 / Issue: 1
$15.00