Search for: security+of+information
-
A Longitudinal Study of Unauthorized Access Attempts on Information Systems: The Role of Opportunity Contexts
Year: 2019 / Volume: 43 / Issue: 2
$15.00 -
The Implementation of Strategic Information Systems Planning Methodologies
Year: 1988 / Volume: 12 / Issue: 3
$15.00 -
Impact of Customer Compensation Strategies on Outcomes and the Mediating Role of Justice Perceptions: A Longitudinal Study of Target’s Data Breach
Year: 2022 / Volume: 46 / Issue: 1
$15.00 -
Avoidance of Information Technology Threats: A Theoretical Perspective
Year: 2009 / Volume: 33 / Issue: 1
$15.00 -
Phishing Susceptibility in Context: A Multi-level Information Processing Perspective on Deception Detection
Year: 0 / Volume: Forthcoming / Issue: Forthcoming
$15.00Out of stock -
The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions
Year: 1996 / Volume: 20 / Issue: 3
$15.00 -
Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective
Year: 2007 / Volume: 31 / Issue: 1
$15.00 -
The Evolution of Risk in Information Systems Offshoring: The Impact of Home Country Risk, Firm Learning, and Competitive Dynamics
Year: 2009 / Volume: 33 / Issue: 3
$15.00 -
Drawing a Line in the Sand: Commitment Problem in Ending Software Support
Year: 2017 / Volume: 41 / Issue: 4
$15.00 -
A Confessional Account of an Ethnography About Knowledge Work
Year: 2000 / Volume: 24 / Issue: 1
$15.00