EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Computer users"
Narrow search

Narrow search

Year of publication
Subject
All
Computer users 18 Computer security 4 Computer systems 4 Information technology 4 Computer Users 3 Management 3 Authentication 2 Computers 2 Information security 2 Security 2 Training 2 USA 2 computer use 2 computer users 2 information and communication technologies 2 information technologies 2 internet 2 internet users 2 personal computer 2 personal computers 2 technological change 2 technologies 2 Artificial Intelligence 1 Communications technology 1 Companies 1 Computer Systems 1 Computer maintenance 1 Computer management 1 Computer software 1 Computer users--Himalaya Mountains Region. 1 Computers Education 1 Costs 1 Data protection 1 Data security 1 Decentralization 1 Decision making 1 Developing countries 1 Economic growth 1 Economic models 1 Education--Effect of technological innovations on--Himalaya Mountains Region. 1
more ... less ...
Online availability
All
Undetermined 21 Free 2
Type of publication
All
Article 21 Book / Working Paper 3
Type of publication (narrower categories)
All
research-article 16 review-article 3 conceptual-paper 1 review 1
Language
All
English 24
Author
All
Rowe, Christopher J. 2 Andrianaivo, Mihasonirina 1 Appelbaum, Steven H. 1 Arora, Payal 1 Balthazard, Pierre A. 1 Beale, Diane 1 Biddle, Robert 1 Birath, Marcus 1 Bommer, Michael R.W. 1 Camp, L. Jean 1 Chiasson, Sonia 1 Cooke, Robert A. 1 Cox, Tom 1 Das, Sanchari 1 Davis, Ann 1 Edmond, Peter 1 Erev, Ido 1 Flowerday, Stephen V. 1 Forget, Alain 1 Haruvy, Ernan 1 Kpodar, Kangni 1 Kävrestad, Joakim 1 Lennartsson, Markus 1 Ngoqo, Bukelwa 1 Nippert-Eng, Christena 1 Nohlberg, Marcus 1 O’Neil, Brian F. 1 O′Rourke, J. Tracy 1 Potter, Richard E. 1 Rees, Patricia L. 1 Rushinek, Avi 1 Rushinek, Sara 1 Sasserath, J.D. 1 Stanford, Naomi 1 Wang, Shouhong 1 Ward, Adele 1 Willcocks, Leslie 1 Wilson, Glenn T. 1 Yartey, Charles Amo 1 Yechiam, Eldad 1
more ... less ...
Institution
All
International Monetary Fund (IMF) 2
Published in...
All
Industrial Management & Data Systems 9 Information & Computer Security 4 IMF Working Papers 2 Industrial and Commercial Training 2 International Journal of Physical Distribution & Materials Management 1 International Journal of Public Sector Management 1 Journal of Managerial Psychology 1 Personnel Review 1 Team Performance Management: An International Journal 1 The TQM Magazine 1
more ... less ...
Source
All
Other ZBW resources 21 RePEc 2 USB Cologne (EcoSocSci) 1
Showing 1 - 10 of 24
Cover Image
Evaluating user susceptibility to phishing attacks
Das, Sanchari; Nippert-Eng, Christena; Camp, L. Jean - In: Information & Computer Security 30 (2022) 1, pp. 1-18
Purpose Phishing is a well-known cybersecurity attack that has rapidly increased in recent years. It poses risks to businesses, government agencies and all users due to sensitive data breaches and subsequent financial losses. To study the user side, this paper aims to conduct a literature review...
Persistent link: https://www.econbiz.de/10014754925
Saved in:
Cover Image
Constructing secure and memorable passwords
Kävrestad, Joakim; Lennartsson, Markus; Birath, Marcus; … - In: Information & Computer Security 28 (2020) 5, pp. 701-717
are encouraged by research studies and practitioners alike, computer users design passwords using strategies that enable …
Persistent link: https://www.econbiz.de/10014754785
Saved in:
Cover Image
ICT, Financial Inclusion, and Growth Evidence from African Countries
Kpodar, Kangni; Andrianaivo, Mihasonirina - International Monetary Fund (IMF) - 2011
This paper studies the impact of information and communication technologies (ICT), especially mobile phone rollout, on economic growth in a sample of African countries from 1988 to 2007. Further, we investigate whether financial inclusion is one of the channels through which mobile phone...
Persistent link: https://www.econbiz.de/10009019587
Saved in:
Cover Image
User-centred authentication feature framework
Forget, Alain; Chiasson, Sonia; Biddle, Robert - In: Information & Computer Security 23 (2015) 5, pp. 497-515
Purpose – This paper aims to propose that more useful novel schemes could develop from a more principled examination and application of promising authentication features. Text passwords persist despite several decades of evidence of their security and usability challenges. It seems extremely...
Persistent link: https://www.econbiz.de/10014754805
Saved in:
Cover Image
Exploring the relationship between student mobile information security awareness and behavioural intent
Ngoqo, Bukelwa; Flowerday, Stephen V. - In: Information & Computer Security 23 (2015) 4, pp. 406-420
Purpose – The purpose of this paper was to analyse existing theories from the social sciences to gain a better understanding of factors which contribute to student mobile phone users’ poor information security behaviour. Two key aspects associated with information security behaviour were...
Persistent link: https://www.econbiz.de/10014754853
Saved in:
Cover Image
Financial Development, the Structure of Capital Markets, and the Global Digital Divide
Yartey, Charles Amo - International Monetary Fund (IMF) - 2006
This paper examines the role of financial development and financial structure in explaining cross-country diffusion of information communication technology (ICT). Using panel data for 76 emerging and advanced countries for the period 1990-2003, the paper finds that credit and stock market...
Persistent link: https://www.econbiz.de/10005263968
Saved in:
Cover Image
Dot com mantra : social computing in the central Himalayas
Arora, Payal - 2010
Persistent link: https://www.econbiz.de/10008685810
Saved in:
Cover Image
Reinforcement learning and the prevention of data catastrophes
Yechiam, Eldad; Haruvy, Ernan; Erev, Ido - In: Journal of Managerial Psychology 17 (2002) 7, pp. 599-611
three cases computer users, novices and experts, feel that they do not save enough. This feeling is consistent with the …
Persistent link: https://www.econbiz.de/10014887798
Saved in:
Cover Image
Knowledge maps for managing Web‐based business
Wang, Shouhong - In: Industrial Management & Data Systems 102 (2002) 7, pp. 357-364
Knowledge management has recently received considerable attention in the Web‐based business community. This paper discusses the key concepts of human‐computer interaction in knowledge development, and identifies new challenges of knowledge management for Web‐based business. Based on...
Persistent link: https://www.econbiz.de/10014823703
Saved in:
Cover Image
Virtual team interaction: assessment, consequences, and management
Potter, Richard E.; Cooke, Robert A.; Balthazard, Pierre A. - In: Team Performance Management: An International Journal 6 (2000) 7/8, pp. 131-137
Virtual teams are typically made up of geographically dispersed experts, supported by computer‐based communication technologies. Though increasingly popular this is still a relatively unstudied organizational form. Virtual team membership is typically based solely on needed expertise; the teams...
Persistent link: https://www.econbiz.de/10015031069
Saved in:
  • 1
  • 2
  • 3
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...