//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
~isPartOf:"Information systems and e-business management : ISeB"
~isPartOf:"Journal of management information systems : JMIS"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject_exact:"Datensicherheit"
Narrow search
Delete all filters
| 2 applied filters
Year of publication
From:
To:
Subject
All
Data security
50
Datensicherheit
50
IT crime
16
IT-Kriminalität
16
information security
10
Data protection
9
Datenschutz
9
Corporate security
6
Unternehmenssicherheit
6
cybersecurity
5
Consumer behaviour
4
Information management
4
Informationsmanagement
4
Konsumentenverhalten
4
Betriebliches Informationssystem
3
Business intelligence system
3
Cloud Computing
3
Cloud computing
3
Data Mining
3
Data mining
3
E-commerce
3
Electronic Commerce
3
protection motivation theory
3
security
3
Artificial intelligence
2
Beziehungsmarketing
2
Blockchain
2
Client-Server-Architektur
2
Client-server architecture
2
Compliance management
2
Compliance-Management
2
Electronic money
2
Elektronisches Geld
2
Information security
2
Information security management
2
Information system
2
Information technology
2
Informationssystem
2
Informationstechnik
2
Internet
2
more ...
less ...
Online availability
All
Undetermined
27
Free
2
Type of publication
All
Article
49
Book / Working Paper
1
Type of publication (narrower categories)
All
Article in journal
50
Aufsatz in Zeitschrift
50
Aufsatzsammlung
1
Collection of articles of several authors
1
Sammelwerk
1
Language
All
English
50
Author
All
Chen, Hsinchun
2
Cheng, Hsing Kenneth
2
Lowry, Paul Benjamin
2
Nunamaker, Jay F.
2
Sarker, Suprateek
2
Sheldon, Frederick T.
2
Whinston, Andrew B.
2
Abercrombie, Robert K.
1
Ahangar, Mohammad S.
1
Aissa, Anis Ben
1
Alahmari, Saad
1
Anderson, Chad
1
Andronoudi, Anna
1
Archer, Norman P.
1
Barkhordari, Maryam
1
Baskerville, Richard
1
Bordonaba-Juste, Ma Victoria
1
Borle, Sharad
1
Bott, Gregory J.
1
Burke, Dustin
1
Bustos, Jaime
1
Caglayan, Alper
1
Cares, Carlos
1
Chatterjee, Sutirtha
1
Chen, Yan
1
Chinn, Ryan
1
Choi, Ben C. F.
1
Choi, Yunsik
1
Clemons, Eric K.
1
Connelly, Catherine E.
1
Cremonini, Marco
1
Crossler, Robert E.
1
Dey, Debabrata
1
Diéguez, Mauricio
1
Drapeau, Dan
1
Eaton, Gerry
1
Eggett, Dennis
1
Frank, Ulrich
1
Georgiadis, Christos K.
1
Georgiadis, Georgios
1
more ...
less ...
Published in...
All
Information systems and e-business management : ISeB
Journal of management information systems : JMIS
Information & management : the internat. journal of management processes and systems ; journal of IFIP Users Group
49
International journal of business information systems : IJBIS
45
IEEE transactions on engineering management : EM
43
The journal of information systems : JIS ; a semiannual journal of the Information Systems Section of the American Accouting Association
38
Information systems research : ISR
33
Electronic commerce research
32
Advances in information security, privacy, and ethics (AISPE) book series
31
Management information systems : mis quarterly
30
Business horizons
29
SpringerLink / Bücher
28
Springer eBook Collection
27
Technological forecasting & social change : an international journal
26
Journal of payments strategy & systems
23
International journal of networking and virtual organisations : IJNVO
22
Journal of securities operations & custody
22
HMD : Praxis der Wirtschaftsinformatik
21
Management science : journal of the Institute for Operations Research and the Management Sciences
20
Decision support systems : DSS ; the international journal
19
The secure online business handbook : a practical guide to risk management and business continuity
19
European research studies
18
Internet policy review : journal on internet regulation
18
Risks : open access journal
18
Electronic commerce research and applications
17
European journal of operational research : EJOR
17
International journal of production research
17
Information technology and management
16
Journal of business research : JBR
16
Journal of organizational computing and electronic commerce
16
Discussion papers / CEPR
15
Information systems management
15
Telecommunications policy : the international journal of digital economy, data sciences and new media
15
Electronic markets : EM ; the international journal of electronic commerce and business media
14
Electronic markets : the international journal on networked business
14
Journal of digital banking
14
Journal of internet commerce
14
NBER working paper series
14
OECD Digital Economy Papers
14
International journal of accounting information systems
13
more ...
less ...
Source
All
ECONIS (ZBW)
50
Showing
1
-
50
of
50
Sort
Relevance
Date (newest first)
Date (oldest first)
1
Information security objectives and the output legitimacy of ISO/IEC 27001 : stakeholders’ perspective on expectations in private organizations in Sweden
Kamil, Yasmin
;
Lund, Sofia
;
Islam, M. Sirajul
- In:
Information systems and e-business management : ISeB
21
(
2023
)
3
,
pp. 699-722
Persistent link: https://www.econbiz.de/10014420625
Saved in:
2
Protecting against threats to information security : an attitudinal ambivalence perspective
Ng, Ka Chung
;
Zhang, Xiaojun
;
Thong, James Y. L.
;
Tam, …
- In:
Journal of management information systems : JMIS
38
(
2021
)
3
,
pp. 732-764
Persistent link: https://www.econbiz.de/10012804171
Saved in:
3
Moving beyond cyber security awareness and training to engendering security knowledge sharing
Alahmari, Saad
;
Renaud, Karen
;
Omoronyia, Inah
- In:
Information systems and e-business management : ISeB
21
(
2023
)
1
,
pp. 123-158
Persistent link: https://www.econbiz.de/10014252219
Saved in:
4
The application of multi-server authentication scheme in internet banking transaction environments
Tsai, Chien-Hua
;
Su, Pin-Chang
- In:
Information systems and e-business management : ISeB
19
(
2021
)
1
,
pp. 77-105
Persistent link: https://www.econbiz.de/10012487936
Saved in:
5
Enterprise architecture management as a solution for addressing general data protection regulation requirements in a big data context : a systematic mapping study
Georgiadis, Georgios
;
Poels, Geert
- In:
Information systems and e-business management : ISeB
19
(
2021
)
1
,
pp. 313-362
Persistent link: https://www.econbiz.de/10012487971
Saved in:
6
What drives the adoption of the blockchain technology? : a fit-viability perspective
Liang, Ting-Peng
;
Kohli, Rajiv
;
Huang, Hang-Chang
;
Li, …
- In:
Journal of management information systems : JMIS
38
(
2021
)
2
,
pp. 314-337
Persistent link: https://www.econbiz.de/10012624126
Saved in:
7
Special Issue: Blockchain technology and applications
Cheng, Hsing Kenneth
(
ed.
);
Hu, Daning
(
ed.
); …
-
2021
Persistent link: https://www.econbiz.de/10012703132
Saved in:
8
The roles of IT strategies and security investments in reducing organizational security breaches
Li, He
;
Yoo, Sungjin
;
Kettinger, William J.
- In:
Journal of management information systems : JMIS
38
(
2021
)
1
,
pp. 222-245
Persistent link: https://www.econbiz.de/10012500164
Saved in:
9
Generational differences in valuing usefulness, privacy and security negative experiences for paying for cloud services
Bordonaba-Juste, Ma Victoria
;
Lucia-Palacios, Laura
; …
- In:
Information systems and e-business management : ISeB
18
(
2020
)
1
,
pp. 35-60
Persistent link: https://www.econbiz.de/10012226226
Saved in:
10
Understanding security vulnerability awareness, firm incentives, and ICT development in Pan-Asia
Zhuang, Yunhui
;
Choi, Yunsik
;
He, Shu
;
Leung, Alvin …
- In:
Journal of management information systems : JMIS
37
(
2020
)
3
,
pp. 668-693
Persistent link: https://www.econbiz.de/10012414487
Saved in:
11
Centralized it decision making and cybersecurity breaches : evidence from U.S. higher education institutions
Liu, Che-Wei
;
Huang, Peng
;
Lucas, Henry C.
- In:
Journal of management information systems : JMIS
37
(
2020
)
3
,
pp. 758-787
Persistent link: https://www.econbiz.de/10012414495
Saved in:
12
Secure Privacy Conserving Provable Data Possession (SPC-PDP) framework
Jayaraman, Indumathi
;
Mohammed, Mokhtar
- In:
Information systems and e-business management : ISeB
18
(
2020
)
3
,
pp. 351-377
Persistent link: https://www.econbiz.de/10012416431
Saved in:
13
Three stage hybrid encryption of cloud data with penta-layer security for online business users
Subashanthini, S.
;
Pounambal, M.
- In:
Information systems and e-business management : ISeB
18
(
2020
)
3
,
pp. 379-404
Persistent link: https://www.econbiz.de/10012416434
Saved in:
14
Research on the information security of sharing economy customers based on block chain technology
Xiao, Shuyang
- In:
Information systems and e-business management : ISeB
18
(
2020
)
4
,
pp. 487-496
Persistent link: https://www.econbiz.de/10012416448
Saved in:
15
Mapping the variations for implementing information security controls to their operational research solutions
Diéguez, Mauricio
;
Bustos, Jaime
;
Cares, Carlos
- In:
Information systems and e-business management : ISeB
18
(
2020
)
2
,
pp. 157-186
Persistent link: https://www.econbiz.de/10012292384
Saved in:
16
Regulating cryptocurrencies : a supervised machine learning approach to de-anonymizing the Bitcoin Blockchain
Yin, Hao Hua Sun
;
Langenheldt, Klaus
;
Harlev, Mikkel
; …
- In:
Journal of management information systems : JMIS
36
(
2019
)
1
,
pp. 37-73
Persistent link: https://www.econbiz.de/10012198552
Saved in:
17
Ranking information security controls by using fuzzy analytic hierarchy process
Khajouei, Hamid
;
Kazemi, Mehdi
;
Moosavirad, Seyed Hamed
- In:
Information systems and e-business management : ISeB
15
(
2017
)
1
,
pp. 1-19
Persistent link: https://www.econbiz.de/10011711662
Saved in:
18
Factors influencing adoption of e-payment systems : an empirical study on Iraninan customers
Barkhordari, Maryam
;
Nourollah, Zahra
;
Mashayekhi, Hoda
; …
- In:
Information systems and e-business management : ISeB
15
(
2017
)
1
,
pp. 89-116
Persistent link: https://www.econbiz.de/10011711675
Saved in:
19
Enabling effective operational risk management in a financial institution : an action research study
Yang, Shirley Ou
;
Hsu, Carol
;
Sarker, Suprateek
;
Lee, …
- In:
Journal of management information systems : JMIS
34
(
2017
)
3
,
pp. 727-753
Persistent link: https://www.econbiz.de/10011803045
Saved in:
20
Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence
Samtani, Sagar
;
Chinn, Ryan
;
Chen, Hsinchun
;
Nunamaker, …
- In:
Journal of management information systems : JMIS
34
(
2017
)
4
,
pp. 1023-1053
Persistent link: https://www.econbiz.de/10011803432
Saved in:
21
Information security control theory : achieving a sustainable reconciliation between sharing and protecting the privacy of information
Anderson, Chad
;
Baskerville, Richard
;
Kaul, Mala
- In:
Journal of management information systems : JMIS
34
(
2017
)
4
,
pp. 1082-1112
Persistent link: https://www.econbiz.de/10011803440
Saved in:
22
User motivations in protecting information security : protection motivation theory versus self-determination theory
Menard, Philip
;
Bott, Gregory J.
;
Crossler, Robert E.
- In:
Journal of management information systems : JMIS
34
(
2017
)
4
,
pp. 1203-1230
Persistent link: https://www.econbiz.de/10011803446
Saved in:
23
Perverse effects in defense of computer systems : when more is less
Wolff, Josephine
- In:
Journal of management information systems : JMIS
33
(
2016
)
2
,
pp. 597-620
Persistent link: https://www.econbiz.de/10011616142
Saved in:
24
Impact of network structure on malware propagation : a growth curve perspective
Guo, Hong
;
Cheng, Hsing Kenneth
;
Kelley, Ken
;
Tan, Yong
- In:
Journal of management information systems : JMIS
33
(
2016
)
1
,
pp. 296-325
Persistent link: https://www.econbiz.de/10011560760
Saved in:
25
Identifying and profiling key sellers in cyber carding community : AZSecure text mining system
Li, Weifeng
;
Chen, Hsinchun
;
Nunamaker, Jay F.
- In:
Journal of management information systems : JMIS
33
(
2016
)
4
,
pp. 1059-1086
Persistent link: https://www.econbiz.de/10011664638
Saved in:
26
Components of a multi-perspective modeling method for designing and managing IT security systems
Goldstein, Anat
;
Frank, Ulrich
- In:
Information systems and e-business management : ISeB
14
(
2016
)
1
,
pp. 101-140
Persistent link: https://www.econbiz.de/10011672243
Saved in:
27
Users' perceptions about mobile security breaches
Stiakakis, Emmanouil
;
Georgiadis, Christos K.
; …
- In:
Information systems and e-business management : ISeB
14
(
2016
)
4
,
pp. 857-882
Persistent link: https://www.econbiz.de/10011673350
Saved in:
28
Influence of firm's recovery endeavors upon privacy breach on online customer behavior
Choi, Ben C. F.
;
Kim, Sung S.
;
Jiang, Zhenhui
- In:
Journal of management information systems : JMIS
33
(
2016
)
3
,
pp. 904-933
Persistent link: https://www.econbiz.de/10011635410
Saved in:
29
Family preferences concerning online privacy, data mining, and targeted ads : regulatory implications
Clemons, Eric K.
;
Wilson, Joshua S.
- In:
Journal of management information systems : JMIS
32
(
2015
)
2
,
pp. 40-70
Persistent link: https://www.econbiz.de/10011409364
Saved in:
30
Estimating the contextual risk of data breach : an empirical approach
Sen, Ravi
;
Borle, Sharad
- In:
Journal of management information systems : JMIS
32
(
2015
)
2
,
pp. 314-341
Persistent link: https://www.econbiz.de/10011409457
Saved in:
31
The impact of organizational commitment on insiders’ motivation to protect organizational information assets
Posey, Clay
;
Roberts, Tom L.
;
Lowry, Paul Benjamin
- In:
Journal of management information systems : JMIS
32
(
2015
)
4
,
pp. 179-214
Persistent link: https://www.econbiz.de/10011491439
Saved in:
32
The role of self-control in information security violations : insights from a cognitive neuroscience perspective
Hu, Qing
;
West, Robert
;
Smarandescu, Laura
- In:
Journal of management information systems : JMIS
31
(
2014/15
)
4
,
pp. 6-48
Persistent link: https://www.econbiz.de/10011385694
Saved in:
33
The behavioral roots of information systems security : exploring key factors related to unethical IT use
Chatterjee, Sutirtha
;
Sarker, Suprateek
;
Valacich, Joseph S.
- In:
Journal of management information systems : JMIS
31
(
2014/15
)
4
,
pp. 49-87
Persistent link: https://www.econbiz.de/10011385708
Saved in:
34
Using accountability to reduce access policy violations in information systems
Vance, Anthony
;
Lowry, Paul Benjamin
;
Eggett, Dennis
- In:
Journal of management information systems : JMIS
29
(
2012/13
)
4
,
pp. 263-289
Persistent link: https://www.econbiz.de/10009764526
Saved in:
35
Managing interdependent information security risks : cyberinsurance, managed security services, and risk pooling arrangements
Zhao, Xia
;
Xue, Ling
;
Whinston, Andrew B.
- In:
Journal of management information systems : JMIS
30
(
2013/14
)
1
,
pp. 123-152
Persistent link: https://www.econbiz.de/10010195897
Saved in:
36
Health-care security strategies for data protection and regulatory compliance
Kwon, Juhee
;
Johnson, M. Eric
- In:
Journal of management information systems : JMIS
30
(
2013/14
)
2
,
pp. 41-65
Persistent link: https://www.econbiz.de/10010243635
Saved in:
37
Secure mobile sales force automation : the case of independent sales agencies
Kokemüller, Jochen
;
Roßnagel, Heiko
- In:
Information systems and e-business management : ISeB
10
(
2012
)
1
,
pp. 117-133
Persistent link: https://www.econbiz.de/10009531422
Saved in:
38
Hacker behavior, network effects, and the security software market
Dey, Debabrata
;
Lahiri, Atanu
;
Zhang, Guoying
- In:
Journal of management information systems : JMIS
29
(
2012/13
)
2
,
pp. 77-108
Persistent link: https://www.econbiz.de/10009710976
Saved in:
39
Organizations' information security policy compliance : stick or carrot approach?
Chen, Yan
;
Ramamurthy, K.
;
Wen, Kuang-wei
- In:
Journal of management information systems : JMIS
29
(
2012/13
)
3
,
pp. 157-188
Persistent link: https://www.econbiz.de/10009740982
Saved in:
40
Information security outsourcing with system interdependency and mandatory security requirement
Hui, Kai-lung
;
Hui, Wendy
;
Yue, Wei Thoo
- In:
Journal of management information systems : JMIS
29
(
2012/13
)
3
,
pp. 117-156
Persistent link: https://www.econbiz.de/10009740983
Saved in:
41
Special issue on cyber security and management
In:
Information systems and e-business management : ISeB
10
(
2012
)
4
,
pp. 529-548
Persistent link: https://www.econbiz.de/10009673921
Saved in:
42
Management and security of remote sensor networks in hazardous environments using over the air programming
Parthasarathy, Rashmi
;
Shirazi, Behrooz A.
;
Peterson, Nina
- In:
Information systems and e-business management : ISeB
10
(
2012
)
4
,
pp. 521-548
Persistent link: https://www.econbiz.de/10009673947
Saved in:
43
Behavioral analysis of botnets for threat intelligence
Caglayan, Alper
;
Toothaker, Mike
;
Drapeau, Dan
;
Burke, …
- In:
Information systems and e-business management : ISeB
10
(
2012
)
4
,
pp. 491-519
Persistent link: https://www.econbiz.de/10009673948
Saved in:
44
Measuring and ranking attacks based on vulnerability analysis
Wang, Ju An
;
Guo, Minzhe
;
Wang, Hao
;
Zhou, Linfeng
- In:
Information systems and e-business management : ISeB
10
(
2012
)
4
,
pp. 455-490
Persistent link: https://www.econbiz.de/10009673952
Saved in:
45
Defining and computing a value based cyber-security measure
Aissa, Anis Ben
;
Abercrombie, Robert K.
;
Sheldon, …
- In:
Information systems and e-business management : ISeB
10
(
2012
)
4
,
pp. 433-453
Persistent link: https://www.econbiz.de/10009673962
Saved in:
46
Introduction to the special issue on cyber security and management
Sheldon, Frederick T.
;
McDonald, J. Todd
- In:
Information systems and e-business management : ISeB
10
(
2012
)
4
,
pp. 429-431
Persistent link: https://www.econbiz.de/10009673964
Saved in:
47
Understanding nonmalicious security violations in the workplace : a composite behavior model
Guo, Ken H.
;
Yuan, Yufei
;
Archer, Norman P.
;
Connelly, …
- In:
Journal of management information systems : JMIS
28
(
2011/12
)
2
,
pp. 203-236
Persistent link: https://www.econbiz.de/10009622032
Saved in:
48
The influence of experiential and dispositional factors in phishing : an empirical investigation of the deceived
Wright, Ryan T.
;
Marett, Kent
- In:
Journal of management information systems : JMIS
27
(
2010/11
)
1
,
pp. 273-303
Persistent link: https://www.econbiz.de/10008653561
Saved in:
49
Information security : facilitating user precautions vis-à-vis enforcement against attackers
Png, Ivan
;
Wang, Qiu-hong
- In:
Journal of management information systems : JMIS
26
(
2009/10
)
2
,
pp. 97-121
Persistent link: https://www.econbiz.de/10003903924
Saved in:
50
Risks and benefits of signaling information system characteristics to strategic attackers
Cremonini, Marco
;
Nizovtsev, Dmitri
- In:
Journal of management information systems : JMIS
26
(
2009/10
)
3
,
pp. 241-274
Persistent link: https://www.econbiz.de/10003956641
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->