114 results on '"Hovav, Anat"'
Search Results
2. Protecting intellectual property from insider threats : A management information security intelligence perspective
3. Benchmarking Methodology for Information Security Policy (BMISP): Artifact Development and Evaluation
4. This is my device! Why should I follow your rules? Employees’ compliance with BYOD security policy
5. Methods for Studying the Information Systems Future
6. To bridge or to bond? Diverse social connections in an IS project team
7. The effects of cyber regulations and security policies on organizational outcomes: a knowledge management perspective.
8. Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea
9. Process Redesign in Education: The Case of Documents
10. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
11. Does One Size Fit All? Examining the Differential Effects of Is Security Countermeasures
12. Determinants of Internet standards adoption: The case of South Korea
13. Using scenarios to understand the frontiers of IS: Fifteen years later (a postscript)
14. Using scenarios to understand the frontiers of IS
15. Adapting business process redesign concepts to learning processes
16. Strategic value and drivers behind organizational adoption of enterprise DRM: The korean case
17. Does One Size Fit All? Examining the Differential Effects of IS Security Countermeasures
18. The socially driven life cycle of academic scholarship: a longitudinal study of six electronic journals
19. Future Penetration of Academic Electronic Journals: Four Scenarios
20. Academic Electronic Journals: Past, Present, and Future
21. Using Scenarios to Understand the Frontiers of IS
22. Deterring internal information systems misuse
23. The IS organization of the future: four scenarios for 2020
24. Capital market reaction to defective IT products: The case of computer viruses
25. Managing academic e-journals
26. Confucian Values, Social Fear, and Knowledge Sharing in Korean Organizations
27. Adoption Leadership and Early Planners: Comcast's IP Upgrade Strategy.
28. Expert assessment of organizational cybersecurity programs and development of vignettes to measure cybersecurity countermeasures awareness.
29. Empowerment or Control: Reconsidering Employee Security Policy Compliance in Terms of Authorization.
30. The influence of information security on the adoption of web-based integrated information systems: an e-government study in Peru.
31. Dimensionality of Social Capital and Organizational Citizenship Behavior in Information Systems Project Teams
32. Using a Dairy Management Information System to Facilitate Precision Agriculture: The Case of the AfiMilk® System.
33. Social behavior in professional meetings.
34. Redesigning the questioning, discussion, and document processes.
35. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach.
36. A model of Internet standards adoption: the case of IPv6.
37. The Impact of Denial-of-Service Attack Announcements on the Market Value of Firms.
38. The Impact of Virus Attack Announcements on the Market Value of Firms.
39. Determinants of IP Version 6 Adoption.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.