skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index
Refined by: language: Ndongo remove
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Super Users and Local Developers: The Organization of End-User Development in an Accounting Company
Material Type:
Article
Add to My Research

Super Users and Local Developers: The Organization of End-User Development in an Accounting Company

Journal of organizational and end user computing, 2006-10, Vol.18 (4), p.1-21 [Peer Reviewed Journal]

COPYRIGHT 2006 IGI Global ;Copyright Idea Group Inc. Oct-Dec 2006 ;Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1546-2234 ;EISSN: 1546-5012 ;DOI: 10.4018/joeuc.2006100101 ;CODEN: JEUCEZ

Full text available

2
Diffusing Management Information for Legal Compliance: The Role of the IS Organization Within the Sarbanes-Oxley Act
Material Type:
Article
Add to My Research

Diffusing Management Information for Legal Compliance: The Role of the IS Organization Within the Sarbanes-Oxley Act

Journal of organizational and end user computing, 2008-04, Vol.20 (2), p.1-24 [Peer Reviewed Journal]

COPYRIGHT 2008 IGI Global ;Copyright IGI Global Apr-Jun 2008 ;ISSN: 1546-2234 ;EISSN: 1546-5012 ;DOI: 10.4018/joeuc.2008040101 ;CODEN: JEUCEZ

Full text available

3
Online Social Networking: A Source of Intelligence for Advanced Persistent Threats
Material Type:
Article
Add to My Research

Online Social Networking: A Source of Intelligence for Advanced Persistent Threats

International journal of cyber warfare and terrorism, 2012-01, Vol.2 (1), p.1-13 [Peer Reviewed Journal]

COPYRIGHT 2012 IGI Global ;ISSN: 1947-3435 ;EISSN: 1947-3443 ;DOI: 10.4018/ijcwt.2012010101

Digital Resources/Online E-Resources

4
Using Belief Functions in Software Agents to Test the Strength of Application Controls: A Conceptual Framework
Material Type:
Article
Add to My Research

Using Belief Functions in Software Agents to Test the Strength of Application Controls: A Conceptual Framework

International journal of intelligent information technologies, 2016-07, Vol.12 (3), p.1-19 [Peer Reviewed Journal]

COPYRIGHT 2016 IGI Global ;ISSN: 1548-3657 ;EISSN: 1548-3665 ;DOI: 10.4018/IJIIT.2016070101

Digital Resources/Online E-Resources

5
Roles of Organizational Climate, Social Bonds, and Perceptions of Security Threats on IS Security Policy Compliance Intentions
Material Type:
Article
Add to My Research

Roles of Organizational Climate, Social Bonds, and Perceptions of Security Threats on IS Security Policy Compliance Intentions

Information resources management journal, 2018-01, Vol.31 (1), p.53-82 [Peer Reviewed Journal]

COPYRIGHT 2018 IGI Global ;ISSN: 1040-1628 ;EISSN: 1533-7979 ;DOI: 10.4018/IRMJ.2018010103

Digital Resources/Online E-Resources

6
Experience Matters: The Role of Vicarious Experience in Secure Actions
Material Type:
Article
Add to My Research

Experience Matters: The Role of Vicarious Experience in Secure Actions

Journal of database management, 2020-04, Vol.31 (2), p.1-20 [Peer Reviewed Journal]

COPYRIGHT 2020 IGI Global ;Copyright IGI Global 2020 ;ISSN: 1063-8016 ;EISSN: 1533-8010 ;DOI: 10.4018/JDM.2020040101

Digital Resources/Online E-Resources

7
Using Deming's Cycle for Improvement in a Course: A Case Study
Material Type:
Article
Add to My Research

Using Deming's Cycle for Improvement in a Course: A Case Study

International journal of web-based learning and teaching technologies, 2020-07, Vol.15 (3), p.31-45 [Peer Reviewed Journal]

COPYRIGHT 2020 IGI Global ;ISSN: 1548-1093 ;EISSN: 1548-1107 ;DOI: 10.4018/IJWLTT.2020070103

Digital Resources/Online E-Resources

8
Autonomous Motivation and Information Security Policy Compliance: Role of Job Satisfaction, Responsibility, and Deterrence
Material Type:
Article
Add to My Research

Autonomous Motivation and Information Security Policy Compliance: Role of Job Satisfaction, Responsibility, and Deterrence

Journal of organizational and end user computing, 2021-11, Vol.33 (6), p.1-17 [Peer Reviewed Journal]

COPYRIGHT 2021 IGI Global ;Copyright IGI Global 2021 ;Copyright © 2021, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. ;ISSN: 1546-2234 ;EISSN: 1546-5012 ;DOI: 10.4018/JOEUC.20211101.oa9

Digital Resources/Online E-Resources

9
End-User Perceptions on Information Security: Pragmatic Lessons on Social Engineering Attacks in the Workplace in Gauteng, South Africa
Material Type:
Article
Add to My Research

End-User Perceptions on Information Security: Pragmatic Lessons on Social Engineering Attacks in the Workplace in Gauteng, South Africa

Journal of global information management, 2021-12, Vol.29 (6), p.1-16 [Peer Reviewed Journal]

COPYRIGHT 2021 IGI Global ;Copyright © 2021, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. ;ISSN: 1062-7375 ;EISSN: 1533-7995 ;DOI: 10.4018/JGIM.293290

Digital Resources/Online E-Resources

10
AI Boosts Performance but Affects Employee Emotions
Material Type:
Article
Add to My Research

AI Boosts Performance but Affects Employee Emotions

Information resources management journal, 2022-11, Vol.35 (1), p.1-18 [Peer Reviewed Journal]

COPYRIGHT 2022 IGI Global ;ISSN: 1040-1628 ;EISSN: 1533-7979 ;DOI: 10.4018/irmj.314220

Digital Resources/Online E-Resources

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Searching Remote Databases, Please Wait