Journal: J. Org. Computing and E. Commerce

Volume 29, Issue 4

249 -- 257Wu He, Zuopeng Justin Zhang. Enterprise cybersecurity training and awareness programs: Recommendations for success
258 -- 273Vipin Khattri, Deepak Kumar Singh. Implementation of an Additional Factor for Secure Authentication in Online Transactions
274 -- 293Xue Yang, Xinwei Wang, Wei Thoo Yue, Choon-Ling Sia, Xin Robert Luo. Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD) - A Persuasion and Cognitive Elaboration Perspective
294 -- 315Brian I. Spaid, Bonnie S. O'Neill, Terence T. Ow. The upside of showrooming: How online information creates positive spill-over for the brick-and-mortar retailer

Volume 29, Issue 3

163 -- 189Hsin-Lu Chang. Factors Affecting the Offshore Deployment of Interorganizational Systems in China: A Case Study Analysis
190 -- 208José Leao e Silva Filho, Danielle Costa Morais. Negotiation protocol based on ordered weighted averaging and Fuzzy metrics
209 -- 222Pratik Tarafdar, Indranil Bose. Systems theoretic process analysis of information security: the case of aadhaar
223 -- 247Majharul Talukder, Sultan Alyammahi, Ali M. Quazi, Abm Abdullah, Raechel Johns. Users' Sociocultural Orientation and Smart Systems Acceptance Link: do Demographics Matter?

Volume 29, Issue 2

61 -- 95Malte Steinbach, Jost Sieweke, Stefan Süß. The diffusion of e-participation in public administrations: A systematic literature review
96 -- 114Merlin Nandy, Priya Seetharaman. Interorganizational processes in buyer-supplier dyads: An information intensity perspective
115 -- 124Jiming Wu. A new direction to better understand post-adoption behavior: The theory of need for information systems
125 -- 138Damon E. Campbell, Nicholas H. Roberts. Effective use of analytic DSS and job performance: Looking beyond technology acceptance
139 -- 162Suchitra Veeravalli, V. Vijayalakshmi. A morphological review of enterprise social media literature

Volume 29, Issue 1

1 -- 3Dave Chatterjee. Should executives go to jail over cybersecurity breaches?
4 -- 23Habib Ullah Khan, Khalid A. Alshare. Violators versus non-violators of information security measures in organizations - A study of distinguishing factors
24 -- 39A. J. Burns, M. Eric Johnson, Deanna D. Caputo. Spear phishing in a barrel: Insights from a targeted phishing campaign
40 -- 59Aaron Zimba, ZhaoShun Wang, Mwenge Mulenga. Cryptojacking injection: A paradigm shift to cryptocurrency-based web-centric internet attacks