//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Academic Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject:"Security resources"
Narrow search
Narrow search
Year of publication
From:
To:
Subject
All
Cloud computing
1
Compliance burnout
1
Internal security resources
1
Job demands-resources
1
Key informants
1
Organizational mindfulness
1
Satisfaction
1
Security compliance
1
Security engagement
1
Security resources
1
Security-as-a-service
1
more ...
less ...
Online availability
All
Undetermined
2
Type of publication
All
Article
2
Type of publication (narrower categories)
All
research-article
2
Language
All
English
2
Author
All
Brooks, Nita
1
El-Den, Jamal
1
Greer, Tim
1
Pham, Hiep-Cong
1
Richardson, Joan
1
Vedadi, Ali
1
Published in...
All
Information & Computer Security
1
Journal of Enterprise Information Management
1
Source
All
Other ZBW resources
2
Showing
1
-
2
of
2
Sort
relevance
articles prioritized
date (newest first)
date (oldest first)
1
Investigating the role of internal
security
resources
in post-adoption satisfaction with the Security-as-a-Service model: an organizational mindfulness perspective
Vedadi, Ali
;
Brooks, Nita
;
Greer, Tim
- In:
Journal of Enterprise Information Management
36
(
2023
)
6
,
pp. 1583-1609
model. PLS was used for data analysis. Findings Organizations with greater extents of internal
security
resources
report …-adoption satisfaction with the SecaaS model is shaped by investigating the role of internal
security
resources
and organizational …
Persistent link: https://www.econbiz.de/10014860305
Saved in:
2
Stress-based security compliance model – an exploratory study
Pham, Hiep-Cong
;
El-Den, Jamal
;
Richardson, Joan
- In:
Information & Computer Security
24
(
2016
)
4
,
pp. 326-347
during a four-month period. Findings The study identified three security demands, three
security
resources
and two aspects of …
Persistent link: https://www.econbiz.de/10014754849
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->