EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Information systems security"
Narrow search

Narrow search

Year of publication
Subject
All
Information systems security 3 Betriebliches Informationssystem 2 Business intelligence system 2 Data security 2 Datensicherheit 2 Accounting information systems 1 Antecedents of Information Security 1 Arbeitsverhalten 1 Business 1 Case studies 1 Cognition 1 Decision 1 Endogenous Motivation 1 Entscheidung 1 IS policy violations 1 Information Security Awareness 1 Information Security Behahavior 1 Information Systems Security 1 Information systems 1 Innovation theory 1 Institutional theory 1 Kognition 1 Management information systems Risk management 1 Management information systems Security measures 1 Managerial decision-making 1 Neuroeconomics 1 Neuroökonomie 1 Nonmalicious information security violations 1 Online purchasing 1 Organizational slack theory 1 Personality psychology 1 Persönlichkeitspsychologie 1 Positivistic-interpretivist approaches 1 Risk 1 Security 1 Web assurance seals 1 WebTrust 1 Wirtschaftswissenschaften (PPN621567140) 1 Work behaviour 1 behavioral information systems security 1
more ... less ...
Online availability
All
Free 6
Type of publication
All
Article 3 Book / Working Paper 3
Type of publication (narrower categories)
All
Article in journal 2 Aufsatz in Zeitschrift 2 Thesis 2
Language
All
English 5 Undetermined 1
Author
All
Boulianne, Emilio 1 Cho, Charles H. 1 Farahmand, Fariborz 1 He, Qinghua 1 Häußinger, Felix 1 Ifinedo, Princely 1 KOSKOSAS, Ioannis 1 Turel, Ofir 1 Wen, Yatong 1
more ... less ...
Institution
All
HAL 1
Published in...
All
Business Excellence and Management 1 Information systems management 1 MIS quarterly 1 Post-Print / HAL 1
Source
All
BASE 2 ECONIS (ZBW) 2 RePEc 2
Showing 1 - 6 of 6
Cover Image
Exploring personal and environmental factors that can reduce nonmalicious information security violations
Ifinedo, Princely - In: Information systems management 40 (2023) 4, pp. 316-336
Persistent link: https://www.econbiz.de/10014454753
Saved in:
Cover Image
Examining the neural basis of information security policy violations : a noninvasive brain stimulation approach
Turel, Ofir; He, Qinghua; Wen, Yatong - In: MIS quarterly 45 (2021) 4, pp. 1715-1744
Persistent link: https://www.econbiz.de/10012814926
Saved in:
Cover Image
Studies on Employees’ Information Security Awareness
Häußinger, Felix - 2015
Persistent link: https://www.econbiz.de/10011288106
Saved in:
Cover Image
A SHORT LITERATURE REVIEW IN INFORMATION SYSTEMS SECURITY MANAGEMENT APPROACHES
KOSKOSAS, Ioannis - In: Business Excellence and Management 3 (2013) 2, pp. 5-15
This study provides a short literature review in information systems security (ISS) approaches either technical or non …-technical in nature. Although, the benefits and uses of the technical information systems security approaches are valuable, there … information systems security in an attempt to shed some light into how these alternative approaches could be used in benefit of …
Persistent link: https://www.econbiz.de/10010672276
Saved in:
Cover Image
THE RISE AND FALL OF WEBTRUST
Boulianne, Emilio; Cho, Charles H. - HAL - 2009
Despite the growth in electronic commerce (hereafter, “e-commerce”) usage, consumers are still reluctant to purchase online due to security and privacy concerns. To alleviate this issue, e-commerce vendors may sign up with an independent third-party web assurance service to obtain a seal...
Persistent link: https://www.econbiz.de/10008792120
Saved in:
Cover Image
Developing a Risk Management System for Information Systems Security Incidents
Farahmand, Fariborz - 2004
arisk management system for information systems security incidents in five stages: 1-Resource and application value analysis …
Persistent link: https://www.econbiz.de/10009475778
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...