//--> //--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Academic Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: isPartOf:"Information and Computer Security"
Narrow search
Narrow search
Year of publication
From:
To:
Online availability
All
Undetermined
38
Type of publication
All
Article
38
Language
All
English
38
Author
All
Clarke, Nathan
2
Da Veiga, Adéle
2
Dhillon, Gurpreet
2
Furnell, Steven
2
Karlsson, Martin
2
Abdelhamid, Mohamed
1
Agrawal, Vinayak
1
Ahmad, Zauwiyah
1
Alghasham, Noorah
1
Alkhudhayr, Fatimah
1
Almushyti, Muna
1
Alohali, Manal
1
Alotaibi, Mutlaq Jalimid
1
Alshare, Khaled A.
1
Alsuhibany, Suliman A.
1
Alzamil, Zakarya A.
1
Anand, Rashmi
1
Arachchilage, Nalin Asanka Gamagedara
1
Archer, Norm
1
Ashenden, Debi
1
Atsu, Francis
1
Aurigemma, Salvatore
1
Baltatzis, Dimitrios
1
Banwet, D.K.
1
Benbasat, Izak
1
Berndtsson, Joakim
1
Buchanan, William
1
Butavicius, Marcus
1
Calic, Dragana
1
Carlton, Melissa
1
Cavusoglu, Hasan
1
Connelly, Catherine E.
1
Coss, David Lewis
1
Daud, Maslina
1
Denk, Thomas
1
Drevin, Lynette
1
Fenz, Stefan
1
Haftor, Darek
1
Hedström, Karin
1
Ilioudis, Christos
1
more ...
less ...
Published in...
All
Information and Computer Security
38
Source
All
Other ZBW resources
38
Showing
31
-
38
of
38
Sort
relevance
articles prioritized
date (newest first)
date (oldest first)
31
An approach to information security culture change combining ADKAR and the ISCA questionnaire to aid transition to the desired culture
Da Veiga, Adéle
- In:
Information and Computer Security
26
(
2018
)
5
,
pp. 584-612
Persistent link: https://www.econbiz.de/10012068642
Saved in:
32
Value conflicts and non-compliance
Berndtsson, Joakim
;
Johansson, Peter
;
Karlsson, Martin
- In:
Information and Computer Security
26
(
2018
)
2
,
pp. 246-258
Persistent link: https://www.econbiz.de/10012068643
Saved in:
33
Perceptions of organizational culture and value conflicts in information security management
Karlsson, Martin
;
Denk, Thomas
;
Åström, Joachim
- In:
Information and Computer Security
26
(
2018
)
2
,
pp. 213-229
Persistent link: https://www.econbiz.de/10012068644
Saved in:
34
Reconciling value-based objectives for security and identity management
Smith, Kane J.
;
Dhillon, Gurpreet
;
Hedström, Karin
- In:
Information and Computer Security
26
(
2018
)
2
,
pp. 194-212
Persistent link: https://www.econbiz.de/10012068645
Saved in:
35
Information security policies and value conflict in multinational companies
Yayla, Alper
;
Lei, Yu
- In:
Information and Computer Security
26
(
2018
)
2
,
pp. 230-245
Persistent link: https://www.econbiz.de/10012068646
Saved in:
36
Information security policy compliance: a higher education case study
Alshare, Khaled A.
;
Lane, Peggy L.
;
Lane, Michael R.
- In:
Information and Computer Security
26
(
2018
)
1
,
pp. 91-108
Persistent link: https://www.econbiz.de/10012068648
Saved in:
37
Escalation of commitment as an antecedent to noncompliance with information security policy
Kajtazi, Miranda
;
Cavusoglu, Hasan
;
Benbasat, Izak
; …
- In:
Information and Computer Security
26
(
2018
)
2
,
pp. 171-193
Persistent link: https://www.econbiz.de/10012068651
Saved in:
38
Transforming information security governance in India (A SAP-LAP based case study of security, IT policy and e-governance)
Anand, Rashmi
;
Medhavi, Sanjay
;
Soni, Vivek
;
Malhotra, …
- In:
Information and Computer Security
26
(
2018
)
1
,
pp. 58-90
Persistent link: https://www.econbiz.de/10012068664
Saved in:
First
Prev
1
2
3
4
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->