Violators versus non-violators of information security measures in organizations—A study of distinguishing factors
来源期刊:Journal of Organizational Computing and Electronic CommerceDOI:10.1080/10919392.2019.1552743
Spear phishing in a barrel: Insights from a targeted phishing campaign
来源期刊:Journal of Organizational Computing and Electronic CommerceDOI:10.1080/10919392.2019.1552745
The diffusion of e-participation in public administrations: A systematic literature review
来源期刊:Journal of Organizational Computing and Electronic CommerceDOI:10.1080/10919392.2019.1552749
Cryptojacking injection: A paradigm shift to cryptocurrency-based web-centric internet attacks
来源期刊:Journal of Organizational Computing and Electronic CommerceDOI:10.1080/10919392.2019.1552747
Interorganizational processes in buyer–supplier dyads: An information intensity perspective
来源期刊:Journal of Organizational Computing and Electronic CommerceDOI:10.1080/10919392.2018.1554280
Factors Affecting the Offshore Deployment of Interorganizational Systems in China: A Case Study Analysis
来源期刊:Journal of Organizational Computing and Electronic CommerceDOI:10.1080/10919392.2019.1583811
A morphological review of enterprise social media literature
来源期刊:Journal of Organizational Computing and Electronic CommerceDOI:10.1080/10919392.2019.1583456
Enterprise cybersecurity training and awareness programs: Recommendations for success
来源期刊:Journal of Organizational Computing and Electronic CommerceDOI:10.1080/10919392.2019.1611528
Should executives go to jail over cybersecurity breaches?
来源期刊:Journal of Organizational Computing and Electronic CommerceDOI:10.1080/10919392.2019.1568713
USERS’ SOCIOCULTURAL ORIENTATION AND SMART SYSTEMS ACCEPTANCE LINK: DO DEMOGRAPHICS MATTER?
来源期刊:Journal of Organizational Computing and Electronic CommerceDOI:10.1080/10919392.2019.1611287
Effective use of analytic DSS and job performance: Looking beyond technology acceptance
来源期刊:Journal of Organizational Computing and Electronic CommerceDOI:10.1080/10919392.2019.1571756
Implementation of an Additional Factor for Secure Authentication in Online Transactions
来源期刊:Journal of Organizational Computing and Electronic CommerceDOI:10.1080/10919392.2019.1633123
Systems theoretic process analysis of information security: the case of aadhaar
来源期刊:Journal of Organizational Computing and Electronic CommerceDOI:10.1080/10919392.2019.1598608
Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD) – A Persuasion and Cognitive Elaboration Perspective
来源期刊:Journal of Organizational Computing and Electronic CommerceDOI:10.1080/10919392.2019.1639913
The upside of showrooming: How online information creates positive spill-over for the brick-and-mortar retailer
来源期刊:Journal of Organizational Computing and Electronic CommerceDOI:10.1080/10919392.2019.1671738
Negotiation protocol based on ordered weighted averaging and Fuzzy metrics
来源期刊:J. Organ. Comput. Electron. Commer.DOI:10.1080/10919392.2019.1587230
A new direction to better understand post-adoption behavior: The theory of need for information systems
来源期刊:Journal of Organizational Computing and Electronic CommerceDOI:10.1080/10919392.2019.1554281