researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: J. Org. Computing and E. Commerce
Home
Index
Info
Volume
Volume
29
, Issue
4
249
--
257
Wu He
,
Zuopeng Justin Zhang
.
Enterprise cybersecurity training and awareness programs: Recommendations for success
258
--
273
Vipin Khattri
,
Deepak Kumar Singh
.
Implementation of an Additional Factor for Secure Authentication in Online Transactions
274
--
293
Xue Yang
,
Xinwei Wang
,
Wei Thoo Yue
,
Choon-Ling Sia
,
Xin Robert Luo
.
Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD) - A Persuasion and Cognitive Elaboration Perspective
294
--
315
Brian I. Spaid
,
Bonnie S. O'Neill
,
Terence T. Ow
.
The upside of showrooming: How online information creates positive spill-over for the brick-and-mortar retailer
Volume
29
, Issue
3
163
--
189
Hsin-Lu Chang
.
Factors Affecting the Offshore Deployment of Interorganizational Systems in China: A Case Study Analysis
190
--
208
José Leao e Silva Filho
,
Danielle Costa Morais
.
Negotiation protocol based on ordered weighted averaging and Fuzzy metrics
209
--
222
Pratik Tarafdar
,
Indranil Bose
.
Systems theoretic process analysis of information security: the case of aadhaar
223
--
247
Majharul Talukder
,
Sultan Alyammahi
,
Ali M. Quazi
,
Abm Abdullah
,
Raechel Johns
.
Users' Sociocultural Orientation and Smart Systems Acceptance Link: do Demographics Matter?
Volume
29
, Issue
2
61
--
95
Malte Steinbach
,
Jost Sieweke
,
Stefan Süß
.
The diffusion of e-participation in public administrations: A systematic literature review
96
--
114
Merlin Nandy
,
Priya Seetharaman
.
Interorganizational processes in buyer-supplier dyads: An information intensity perspective
115
--
124
Jiming Wu
.
A new direction to better understand post-adoption behavior: The theory of need for information systems
125
--
138
Damon E. Campbell
,
Nicholas H. Roberts
.
Effective use of analytic DSS and job performance: Looking beyond technology acceptance
139
--
162
Suchitra Veeravalli
,
V. Vijayalakshmi
.
A morphological review of enterprise social media literature
Volume
29
, Issue
1
1
--
3
Dave Chatterjee
.
Should executives go to jail over cybersecurity breaches?
4
--
23
Habib Ullah Khan
,
Khalid A. Alshare
.
Violators versus non-violators of information security measures in organizations - A study of distinguishing factors
24
--
39
A. J. Burns
,
M. Eric Johnson
,
Deanna D. Caputo
.
Spear phishing in a barrel: Insights from a targeted phishing campaign
40
--
59
Aaron Zimba
,
ZhaoShun Wang
,
Mwenge Mulenga
.
Cryptojacking injection: A paradigm shift to cryptocurrency-based web-centric internet attacks