skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index
Show only
Refined by: language: Ndongo remove
Result Number Material Type Add to My Shelf Action Record Details and Options
1
AI Boosts Performance but Affects Employee Emotions
Material Type:
Article
Add to My Research

AI Boosts Performance but Affects Employee Emotions

Information resources management journal, 2022-11, Vol.35 (1), p.1-18 [Peer Reviewed Journal]

COPYRIGHT 2022 IGI Global ;ISSN: 1040-1628 ;EISSN: 1533-7979 ;DOI: 10.4018/irmj.314220

Digital Resources/Online E-Resources

2
End-User Perceptions on Information Security: Pragmatic Lessons on Social Engineering Attacks in the Workplace in Gauteng, South Africa
Material Type:
Article
Add to My Research

End-User Perceptions on Information Security: Pragmatic Lessons on Social Engineering Attacks in the Workplace in Gauteng, South Africa

Journal of global information management, 2021-11, Vol.29 (6), p.1-16 [Peer Reviewed Journal]

COPYRIGHT 2021 IGI Global ;ISSN: 1062-7375 ;EISSN: 1533-7995 ;DOI: 10.4018/JGIM.293290

Digital Resources/Online E-Resources

3
Roles of Organizational Climate, Social Bonds, and Perceptions of Security Threats on IS Security Policy Compliance Intentions
Material Type:
Article
Add to My Research

Roles of Organizational Climate, Social Bonds, and Perceptions of Security Threats on IS Security Policy Compliance Intentions

Information resources management journal, 2018-01, Vol.31 (1), p.53-82 [Peer Reviewed Journal]

COPYRIGHT 2018 IGI Global ;Copyright © 2018, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. ;ISSN: 1040-1628 ;EISSN: 1533-7979 ;DOI: 10.4018/IRMJ.2018010103

Digital Resources/Online E-Resources

4
Experience Matters: The Role of Vicarious Experience in Secure Actions
Material Type:
Article
Add to My Research

Experience Matters: The Role of Vicarious Experience in Secure Actions

Journal of database management, 2020-04, Vol.31 (2), p.1-20 [Peer Reviewed Journal]

COPYRIGHT 2020 IGI Global ;Copyright © 2020, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. ;ISSN: 1063-8016 ;EISSN: 1533-8010 ;DOI: 10.4018/JDM.2020040101

Digital Resources/Online E-Resources

5
Autonomous Motivation and Information Security Policy Compliance: Role of Job Satisfaction, Responsibility, and Deterrence
Material Type:
Article
Add to My Research

Autonomous Motivation and Information Security Policy Compliance: Role of Job Satisfaction, Responsibility, and Deterrence

Journal of organizational and end user computing, 2021-11, Vol.33 (6), p.1-17 [Peer Reviewed Journal]

COPYRIGHT 2021 IGI Global ;Copyright © 2021, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. ;ISSN: 1546-2234 ;EISSN: 1546-5012 ;DOI: 10.4018/JOEUC.20211101.oa9

Digital Resources/Online E-Resources

6
Using Belief Functions in Software Agents to Test the Strength of Application Controls: A Conceptual Framework
Material Type:
Article
Add to My Research

Using Belief Functions in Software Agents to Test the Strength of Application Controls: A Conceptual Framework

International journal of intelligent information technologies, 2016-07, Vol.12 (3), p.1-19 [Peer Reviewed Journal]

COPYRIGHT 2016 IGI Global ;Copyright © 2016, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. ;ISSN: 1548-3657 ;EISSN: 1548-3665 ;DOI: 10.4018/IJIIT.2016070101

Digital Resources/Online E-Resources

7
Audit Firms, Deferred Taxation and Financial Reporting: The Case of The Athens Stock Exchange
Material Type:
Article
Add to My Research

Audit Firms, Deferred Taxation and Financial Reporting: The Case of The Athens Stock Exchange

International journal of corporate finance and accounting, 2016-01, Vol.3 (1), p.1-21

Copyright © 2016, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. ;ISSN: 2334-4628 ;EISSN: 2334-4636 ;DOI: 10.4018/IJCFA.2016010101

Digital Resources/Online E-Resources

8
Online Social Networking: A Source of Intelligence for Advanced Persistent Threats
Material Type:
Article
Add to My Research

Online Social Networking: A Source of Intelligence for Advanced Persistent Threats

International journal of cyber warfare and terrorism, 2012-01, Vol.2 (1), p.1-13 [Peer Reviewed Journal]

COPYRIGHT 2012 IGI Global ;Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. ;ISSN: 1947-3435 ;EISSN: 1947-3443 ;DOI: 10.4018/ijcwt.2012010101

Digital Resources/Online E-Resources

Searching Remote Databases, Please Wait