EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Information Systems Security"
Narrow search

Narrow search

Year of publication
Subject
All
Data security 16 Datensicherheit 16 Betriebliches Informationssystem 14 Business intelligence system 14 Information systems security 10 Information system 7 Informationssystem 7 information systems security 6 Arbeitsverhalten 4 Information Systems Security 4 Work behaviour 4 Information management 3 Informationsmanagement 3 Business process management 2 Challenges 2 Cognition 2 Compliance 2 Higher learning Institutions 2 Institutional theory 2 Kognition 2 Management and Internet 2 Organizational behaviour 2 Performance Indicators 2 Personality psychology 2 Persönlichkeitspsychologie 2 Prozessmanagement 2 Verhalten in Organisationen 2 behavioral information systems security 2 cybersecurity 2 survey 2 Accounting information systems 1 Antecedents of Information Security 1 Artificial intelligence 1 Assurance 1 Attitude 1 Behavioural intentions 1 Bibliometrics 1 Bibliometrie 1 Blockchain 1 Botsuana 1
more ... less ...
Online availability
All
Undetermined 13 Free 6
Type of publication
All
Article 25 Book / Working Paper 4
Type of publication (narrower categories)
All
Article in journal 17 Aufsatz in Zeitschrift 17 Thesis 2 research-article 2 Konferenzschrift 1
Language
All
English 27 Undetermined 2
Author
All
Ifinedo, Princely 4 Ochiche, Obara Brigit 2 Okibo, Bichanga Walter 2 Sarker, Suprateek 2 Siponen, Mikko 2 AlSabbagh, Bilal 1 Anderson, Bonnie Brinton 1 Barki, Henri 1 Barry, Chris 1 Barton, Russell R. 1 Boulianne, Emilio 1 Chatterjee, Sutirtha 1 Cheng, Hsing Kenneth 1 Cho, Charles H. 1 Dhillon, Gurpreet 1 Dilla, William N. 1 Dissanayaka, Indika 1 Eargle, David 1 Estima, Jacinto 1 Farahmand, Fariborz 1 Gal, Graham 1 Guo, Hong 1 Harms, P.D. 1 He, Qinghua 1 Hedström, Karin 1 Hovav, Anat 1 Hyrynsalmi, Sami 1 Häußinger, Felix 1 Jenkins, Jeffrey L. 1 John D’Arcy 1 KOSKOSAS, Ioannis 1 Karjalainen, Mari 1 Karlsson, Fredrik 1 Kaukola, Jesse 1 Kelley, Ken 1 Kirwan, C. Brock 1 Kolkowska, Ella 1 Kowalski, Stewart 1 Kuruba, Gangappa 1 Lang, Michael 1
more ... less ...
Institution
All
HAL 1 International Conference on Information Systems Development <31., 2023, Lissabon> 1
Published in...
All
Information & management : the internat. journal of management processes and systems ; journal of IFIP Users Group 3 Journal of management information systems : JMIS 3 Information & Computer Security 2 Information systems management 2 The journal of strategic information systems : incorporating International Information Systems 2 Business Excellence and Management 1 Information Resources Management Journal (IRMJ) 1 Information systems research : ISR 1 Information technology and management 1 International Journal of Systems and Society (IJSS) 1 International journal of information systems and change management : IJISCM 1 Journal of Business Ethics 1 Journal of business and psychology 1 Lecture Notes in Information Systems and Organisation 1 MIS quarterly 1 Management information systems : mis quarterly 1 Post-Print / HAL 1 The journal of information systems : JIS ; a semiannual journal of the Information Systems Section of the American Accouting Association 1
more ... less ...
Source
All
ECONIS (ZBW) 18 BASE 4 Other ZBW resources 4 RePEc 3
Showing 11 - 20 of 29
Cover Image
Roles of Organizational Climate, Social Bonds, and Perceptions of Security Threats on IS Security Policy Compliance Intentions
Ifinedo, Princely - In: Information Resources Management Journal (IRMJ) 31 (2018) 1, pp. 53-82
Persistent link: https://www.econbiz.de/10012048856
Saved in:
Cover Image
Socio-Technical SIEM (ST-SIEM): Towards Bridging the Gap in Security Incident Response
AlSabbagh, Bilal; Kowalski, Stewart - In: International Journal of Systems and Society (IJSS) 4 (2017) 2, pp. 8-21
-SIEM tackles this limitation by considering the socio-technical aspect of information systems security. This concept is achieved by …
Persistent link: https://www.econbiz.de/10012048011
Saved in:
Cover Image
Tightroping between APT and BCI in small enterprises
Kaukola, Jesse; Ruohonen, Jukka; Tuomisto, Antti; … - In: Information & Computer Security 25 (2017) 3, pp. 226-239
Purpose The contemporary internet provisions increasingly sophisticated security attacks. Besides underlining the advanced nature of these attacks, the concept of an advanced persistent threat (APT) catalyzes the important perspective of longitudinal persistence; attacks are not only carefully...
Persistent link: https://www.econbiz.de/10014754772
Saved in:
Cover Image
Towards analysing the rationale of information security non-compliance : devising a Value-Based Compliance analysis method
Kolkowska, Ella; Karlsson, Fredrik; Hedström, Karin - In: The journal of strategic information systems : … 26 (2017) 1, pp. 39-57
Persistent link: https://www.econbiz.de/10011699253
Saved in:
Cover Image
Key issues of information systems management in Botswana
Mgaya, Klodwig; Kuruba, Gangappa; Pallapolu, Vankata … - In: International journal of information systems and change … 9 (2017) 1, pp. 70-84
Persistent link: https://www.econbiz.de/10011850389
Saved in:
Cover Image
From warning to wallpaper : why the brain habituates to security warnings an what can be done about it
Anderson, Bonnie Brinton; Vance, Anthony; Kirwan, C. Brock - In: Journal of management information systems : JMIS 33 (2016) 3, pp. 713-743
Persistent link: https://www.econbiz.de/10011635342
Saved in:
Cover Image
Critical times for organizations : what should be done to curb workers' noncompliance with IS security policy guidelines?
Ifinedo, Princely - In: Information systems management 33 (2016) 1, pp. 30-41
Persistent link: https://www.econbiz.de/10011529775
Saved in:
Cover Image
Impact of network structure on malware propagation : a growth curve perspective
Guo, Hong; Cheng, Hsing Kenneth; Kelley, Ken; Tan, Yong - In: Journal of management information systems : JMIS 33 (2016) 1, pp. 296-325
Persistent link: https://www.econbiz.de/10011560760
Saved in:
Cover Image
THE RISE AND FALL OF WEBTRUST
Boulianne, Emilio; Cho, Charles H. - HAL - 2009
Despite the growth in electronic commerce (hereafter, “e-commerce”) usage, consumers are still reluctant to purchase online due to security and privacy concerns. To alleviate this issue, e-commerce vendors may sign up with an independent third-party web assurance service to obtain a seal...
Persistent link: https://www.econbiz.de/10008792120
Saved in:
Cover Image
The behavioral roots of information systems security : exploring key factors related to unethical IT use
Chatterjee, Sutirtha; Sarker, Suprateek; Valacich, Joseph S. - In: Journal of management information systems : JMIS 31 (2014/15) 4, pp. 49-87
Persistent link: https://www.econbiz.de/10011385708
Saved in:
  • First
  • Prev
  • 1
  • 2
  • 3
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...