82 results on '"Silic, Mario"'
Search Results
2. Health Belief Model and Organizational Employee Computer Abuse
3. Ten years of conflict management research 2007-2017 : An update on themes, concepts and relationships
4. Understanding Color Risk Appropriateness: Influence of Color on a User’s Decision to Comply with the IT Security Policy—Evidence from the U.S. and India
5. Ambidextrous organization and agility in big data era : The role of business process management systems
6. The effects of the elaboration likelihood model on initial trust formation in financial advisory services
7. Colour Arousal Effect on Users’ Decision-Making Processes in the Warning Message Context
8. Factors driving unified communications and collaboration adoption and use in organizations
9. Health Belief Model and Organizational Employee Computer Abuse
10. Information Security and Open Source Dual Use Security Software: Trust Paradox
11. Shadow IT – A view from behind the curtain
12. Information security : Critical review and future directions for research
13. Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance.
14. Dual-use open source security software in organizations – Dilemma: Help or hinder?
15. Factors impacting information governance in the mobile device dual-use context
16. Colour Arousal Effect on Users’ Decision-Making Processes in the Warning Message Context
17. Information Security and Open Source Dual Use Security Software: Trust Paradox
18. The effects of a gamified human resource management system on job satisfaction and engagement
19. Novel Approach to Learn to Code Using Gamification
20. Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes
21. Impact of Gamification on User’s Knowledge-Sharing Practices:Relationships between Work Motivation, Performance Expectancy and Work Engagement
22. THE EFFECTS OF COLOUR ON USERS’ COMPLIANCE WITH WARNING BANNER MESSAGES ACROSS CULTURES
23. A new perspective on neutralization and deterrence: Predicting shadow IT usage
24. Effects of Color Appeal, Perceived Risk and Culture on Users Decision in Presence of Warning Banner Message
25. Impact of Gamification on Users Knowledge-Sharing Practices: Relationships between Work Motivation, Performance Expectancy and Work Engagement
26. Explaining Organizational Employee Computer Abuse Through an Extended Health Belief Model
27. Deterrent Effects of Warnings on Users Behavior in Preventing Malicious Software Use
28. Open Source Software Adoption: Lessons from Linux in Munich
29. Warning! A Comprehensive Model of the Effects of Digital Information Security Warning Messages
30. Identification and importance of the technological risks of open source software in the enterprise adoption context
31. Humanosecuritus: Information Security is 90% about people
32. Mobile contactless payments adoption challenge in the complex network actor ecosystem
33. Influence of Shadow IT on Innovation in Organizations
34. What are the Keys to a Successful Mobile Payment System? Case of Cytizi
35. The dark side of social networking sites:Understanding phishing risks
36. Understanding Colour Impact on Warning Messages
37. Information Security: From Shadow it to Open Source Software Risks, Benefits and Opportunities for Organizations
38. Restrictive Deterrence: Impact of Warning Banner Messages on Repeated Low-trust Software Use
39. The Influence of Risk Factors in Decision-Making Process for Open Source Software Adoption
40. Taxonomy of technological risks of open source software in the enterprise adoption context
41. Email: From Hero to Zero – the Beginning of the End?
42. The Dark Side of Social Networking Sites: Understanding Phishing Risks
43. Technological Risks of Open Source Software Adoption in the Organizational Context Linux in Munich (LiMux) Case
44. Shadow it Steroids for Innovation
45. Emerging from the Shadows: Survey Evidence of Shadow IT Use from Blissfully Ignorant Employees
46. Employee Acceptance and Use of Unified Communications and Collaboration in a Cross-Cultural Environment
47. Employee Acceptance and Use of Unified Communications and Collaboration in a Cross-Cultural Environment
48. Information security
49. Employee Acceptance and Use of Unified Communications and Collaboration in a Cross-Cultural Environment
50. 35 Years of Information Security: Information Systems vs Information Security Research Comparative Analysis
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.