//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
isPartOf:"Journal of management information systems : JMIS"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject_exact:"Verschlüsselung von Daten"
Narrow search
Delete all filters
| 1 applied filter
Year of publication
From:
To:
Subject
All
Data security
29
Datensicherheit
29
IT crime
11
IT-Kriminalität
11
information security
10
Data protection
6
Datenschutz
6
cybersecurity
5
Betriebliches Informationssystem
3
Business intelligence system
3
Data Mining
3
Data mining
3
protection motivation theory
3
security
3
Artificial intelligence
2
Compliance management
2
Compliance-Management
2
Consumer behaviour
2
Corporate security
2
Information system
2
Informationssystem
2
Internet
2
Konsumentenverhalten
2
Künstliche Intelligenz
2
Legal compliance
2
Leistungsmotivation
2
Motivation
2
Normbefolgung
2
Regulation
2
Regulierung
2
Risikomanagement
2
Risk management
2
Social Web
2
Social network
2
Social web
2
Soziales Netzwerk
2
Structural equation model
2
Strukturgleichungsmodell
2
Unternehmenssicherheit
2
Virtual currency
2
more ...
less ...
Online availability
All
Undetermined
14
Free
1
Type of publication
All
Article
29
Type of publication (narrower categories)
All
Article in journal
29
Aufsatz in Zeitschrift
29
Language
All
English
29
Author
All
Chen, Hsinchun
2
Lowry, Paul Benjamin
2
Nunamaker, Jay F.
2
Sarker, Suprateek
2
Whinston, Andrew B.
2
Anderson, Chad
1
Archer, Norman P.
1
Baskerville, Richard
1
Borle, Sharad
1
Bott, Gregory J.
1
Chatterjee, Sutirtha
1
Chen, Yan
1
Cheng, Hsing Kenneth
1
Chinn, Ryan
1
Choi, Ben C. F.
1
Choi, Yunsik
1
Clemons, Eric K.
1
Connelly, Catherine E.
1
Cremonini, Marco
1
Crossler, Robert E.
1
Dey, Debabrata
1
Eggett, Dennis
1
Guo, Hong
1
Guo, Ken H.
1
Harlev, Mikkel
1
He, Shu
1
Hsu, Carol
1
Hu, Qing
1
Huang, Hang-Chang
1
Huang, Peng
1
Hui, Kai-lung
1
Hui, Wendy
1
Jiang, Zhenhui
1
Johnson, M. Eric
1
Kaul, Mala
1
Kelley, Ken
1
Kettinger, William J.
1
Kim, Sung S.
1
Kohli, Rajiv
1
Kwon, Juhee
1
more ...
less ...
Published in...
All
Journal of management information systems : JMIS
Information & management : the internat. journal of management processes and systems ; journal of IFIP Users Group
49
International journal of business information systems : IJBIS
45
IEEE transactions on engineering management : EM
43
The journal of information systems : JIS ; a semiannual journal of the Information Systems Section of the American Accouting Association
38
Information systems research : ISR
33
Electronic commerce research
32
Advances in information security, privacy, and ethics (AISPE) book series
31
Management information systems : mis quarterly
30
Business horizons
29
Technological forecasting & social change : an international journal
26
Springer eBook Collection
24
Journal of payments strategy & systems
23
International journal of networking and virtual organisations : IJNVO
22
Journal of securities operations & custody
22
Information systems and e-business management : ISeB
21
Management science : journal of the Institute for Operations Research and the Management Sciences
20
SpringerLink / Bücher
20
Decision support systems : DSS ; the international journal
19
The secure online business handbook : a practical guide to risk management and business continuity
19
European research studies
18
Internet policy review : journal on internet regulation
18
Risks : open access journal
18
Electronic commerce research and applications
17
European journal of operational research : EJOR
17
International journal of production research
17
Information technology and management
16
Journal of business research : JBR
16
Journal of organizational computing and electronic commerce
16
Discussion papers / CEPR
15
Information systems management
15
Telecommunications policy : the international journal of digital economy, data sciences and new media
15
Electronic markets : EM ; the international journal of electronic commerce and business media
14
Electronic markets : the international journal on networked business
14
HMD : Praxis der Wirtschaftsinformatik
14
Journal of digital banking
14
Journal of internet commerce
14
NBER working paper series
14
OECD Digital Economy Papers
14
International journal of accounting information systems
13
more ...
less ...
Source
All
ECONIS (ZBW)
29
Showing
1
-
29
of
29
Sort
Relevance
Date (newest first)
Date (oldest first)
1
Protecting against threats to information security : an attitudinal ambivalence perspective
Ng, Ka Chung
;
Zhang, Xiaojun
;
Thong, James Y. L.
;
Tam, …
- In:
Journal of management information systems : JMIS
38
(
2021
)
3
,
pp. 732-764
Persistent link: https://www.econbiz.de/10012804171
Saved in:
2
The roles of IT strategies and security investments in reducing organizational security breaches
Li, He
;
Yoo, Sungjin
;
Kettinger, William J.
- In:
Journal of management information systems : JMIS
38
(
2021
)
1
,
pp. 222-245
Persistent link: https://www.econbiz.de/10012500164
Saved in:
3
What drives the adoption of the blockchain technology? : a fit-viability perspective
Liang, Ting-Peng
;
Kohli, Rajiv
;
Huang, Hang-Chang
;
Li, …
- In:
Journal of management information systems : JMIS
38
(
2021
)
2
,
pp. 314-337
Persistent link: https://www.econbiz.de/10012624126
Saved in:
4
Understanding security vulnerability awareness, firm incentives, and ICT development in Pan-Asia
Zhuang, Yunhui
;
Choi, Yunsik
;
He, Shu
;
Leung, Alvin …
- In:
Journal of management information systems : JMIS
37
(
2020
)
3
,
pp. 668-693
Persistent link: https://www.econbiz.de/10012414487
Saved in:
5
Centralized it decision making and cybersecurity breaches : evidence from U.S. higher education institutions
Liu, Che-Wei
;
Huang, Peng
;
Lucas, Henry C.
- In:
Journal of management information systems : JMIS
37
(
2020
)
3
,
pp. 758-787
Persistent link: https://www.econbiz.de/10012414495
Saved in:
6
Regulating cryptocurrencies : a supervised machine learning approach to de-anonymizing the Bitcoin Blockchain
Yin, Hao Hua Sun
;
Langenheldt, Klaus
;
Harlev, Mikkel
; …
- In:
Journal of management information systems : JMIS
36
(
2019
)
1
,
pp. 37-73
Persistent link: https://www.econbiz.de/10012198552
Saved in:
7
User motivations in protecting information security : protection motivation theory versus self-determination theory
Menard, Philip
;
Bott, Gregory J.
;
Crossler, Robert E.
- In:
Journal of management information systems : JMIS
34
(
2017
)
4
,
pp. 1203-1230
Persistent link: https://www.econbiz.de/10011803446
Saved in:
8
Enabling effective operational risk management in a financial institution : an action research study
Yang, Shirley Ou
;
Hsu, Carol
;
Sarker, Suprateek
;
Lee, …
- In:
Journal of management information systems : JMIS
34
(
2017
)
3
,
pp. 727-753
Persistent link: https://www.econbiz.de/10011803045
Saved in:
9
Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence
Samtani, Sagar
;
Chinn, Ryan
;
Chen, Hsinchun
;
Nunamaker, …
- In:
Journal of management information systems : JMIS
34
(
2017
)
4
,
pp. 1023-1053
Persistent link: https://www.econbiz.de/10011803432
Saved in:
10
Information security control theory : achieving a sustainable reconciliation between sharing and protecting the privacy of information
Anderson, Chad
;
Baskerville, Richard
;
Kaul, Mala
- In:
Journal of management information systems : JMIS
34
(
2017
)
4
,
pp. 1082-1112
Persistent link: https://www.econbiz.de/10011803440
Saved in:
11
Impact of network structure on malware propagation : a growth curve perspective
Guo, Hong
;
Cheng, Hsing Kenneth
;
Kelley, Ken
;
Tan, Yong
- In:
Journal of management information systems : JMIS
33
(
2016
)
1
,
pp. 296-325
Persistent link: https://www.econbiz.de/10011560760
Saved in:
12
Influence of firm's recovery endeavors upon privacy breach on online customer behavior
Choi, Ben C. F.
;
Kim, Sung S.
;
Jiang, Zhenhui
- In:
Journal of management information systems : JMIS
33
(
2016
)
3
,
pp. 904-933
Persistent link: https://www.econbiz.de/10011635410
Saved in:
13
Perverse effects in defense of computer systems : when more is less
Wolff, Josephine
- In:
Journal of management information systems : JMIS
33
(
2016
)
2
,
pp. 597-620
Persistent link: https://www.econbiz.de/10011616142
Saved in:
14
Identifying and profiling key sellers in cyber carding community : AZSecure text mining system
Li, Weifeng
;
Chen, Hsinchun
;
Nunamaker, Jay F.
- In:
Journal of management information systems : JMIS
33
(
2016
)
4
,
pp. 1059-1086
Persistent link: https://www.econbiz.de/10011664638
Saved in:
15
The role of self-control in information security violations : insights from a cognitive neuroscience perspective
Hu, Qing
;
West, Robert
;
Smarandescu, Laura
- In:
Journal of management information systems : JMIS
31
(
2014/15
)
4
,
pp. 6-48
Persistent link: https://www.econbiz.de/10011385694
Saved in:
16
The behavioral roots of information systems security : exploring key factors related to unethical IT use
Chatterjee, Sutirtha
;
Sarker, Suprateek
;
Valacich, Joseph S.
- In:
Journal of management information systems : JMIS
31
(
2014/15
)
4
,
pp. 49-87
Persistent link: https://www.econbiz.de/10011385708
Saved in:
17
The impact of organizational commitment on insiders’ motivation to protect organizational information assets
Posey, Clay
;
Roberts, Tom L.
;
Lowry, Paul Benjamin
- In:
Journal of management information systems : JMIS
32
(
2015
)
4
,
pp. 179-214
Persistent link: https://www.econbiz.de/10011491439
Saved in:
18
Family preferences concerning online privacy, data mining, and targeted ads : regulatory implications
Clemons, Eric K.
;
Wilson, Joshua S.
- In:
Journal of management information systems : JMIS
32
(
2015
)
2
,
pp. 40-70
Persistent link: https://www.econbiz.de/10011409364
Saved in:
19
Estimating the contextual risk of data breach : an empirical approach
Sen, Ravi
;
Borle, Sharad
- In:
Journal of management information systems : JMIS
32
(
2015
)
2
,
pp. 314-341
Persistent link: https://www.econbiz.de/10011409457
Saved in:
20
Health-care security strategies for data protection and regulatory compliance
Kwon, Juhee
;
Johnson, M. Eric
- In:
Journal of management information systems : JMIS
30
(
2013/14
)
2
,
pp. 41-65
Persistent link: https://www.econbiz.de/10010243635
Saved in:
21
Managing interdependent information security risks : cyberinsurance, managed security services, and risk pooling arrangements
Zhao, Xia
;
Xue, Ling
;
Whinston, Andrew B.
- In:
Journal of management information systems : JMIS
30
(
2013/14
)
1
,
pp. 123-152
Persistent link: https://www.econbiz.de/10010195897
Saved in:
22
Using accountability to reduce access policy violations in information systems
Vance, Anthony
;
Lowry, Paul Benjamin
;
Eggett, Dennis
- In:
Journal of management information systems : JMIS
29
(
2012/13
)
4
,
pp. 263-289
Persistent link: https://www.econbiz.de/10009764526
Saved in:
23
Organizations' information security policy compliance : stick or carrot approach?
Chen, Yan
;
Ramamurthy, K.
;
Wen, Kuang-wei
- In:
Journal of management information systems : JMIS
29
(
2012/13
)
3
,
pp. 157-188
Persistent link: https://www.econbiz.de/10009740982
Saved in:
24
Information security outsourcing with system interdependency and mandatory security requirement
Hui, Kai-lung
;
Hui, Wendy
;
Yue, Wei Thoo
- In:
Journal of management information systems : JMIS
29
(
2012/13
)
3
,
pp. 117-156
Persistent link: https://www.econbiz.de/10009740983
Saved in:
25
Hacker behavior, network effects, and the security software market
Dey, Debabrata
;
Lahiri, Atanu
;
Zhang, Guoying
- In:
Journal of management information systems : JMIS
29
(
2012/13
)
2
,
pp. 77-108
Persistent link: https://www.econbiz.de/10009710976
Saved in:
26
Understanding nonmalicious security violations in the workplace : a composite behavior model
Guo, Ken H.
;
Yuan, Yufei
;
Archer, Norman P.
;
Connelly, …
- In:
Journal of management information systems : JMIS
28
(
2011/12
)
2
,
pp. 203-236
Persistent link: https://www.econbiz.de/10009622032
Saved in:
27
The influence of experiential and dispositional factors in phishing : an empirical investigation of the deceived
Wright, Ryan T.
;
Marett, Kent
- In:
Journal of management information systems : JMIS
27
(
2010/11
)
1
,
pp. 273-303
Persistent link: https://www.econbiz.de/10008653561
Saved in:
28
Risks and benefits of signaling information system characteristics to strategic attackers
Cremonini, Marco
;
Nizovtsev, Dmitri
- In:
Journal of management information systems : JMIS
26
(
2009/10
)
3
,
pp. 241-274
Persistent link: https://www.econbiz.de/10003956641
Saved in:
29
Information security : facilitating user precautions vis-à-vis enforcement against attackers
Png, Ivan
;
Wang, Qiu-hong
- In:
Journal of management information systems : JMIS
26
(
2009/10
)
2
,
pp. 97-121
Persistent link: https://www.econbiz.de/10003903924
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->