A conceptual foundation for organizational information security awareness | 2000/03/01 | English | 220 |
The importance of perceived trust, security and privacy in online trading systems | 2009/06/05 | English | 184 |
Competency based management: a review of systems and approaches | 2006/01/01 | English | 162 |
An empirical study of the effect of perceived risk upon intention to use online applications | 2005/04/01 | English | 123 |
Interpretive structural modeling (ISM) of IT‐enablers for Indian manufacturing SMEs | 2008/06/06 | English | 118 |
Quantifying the financial impact of IT security breaches | 2003/05/01 | English | 115 |
What went wrong? Unsuccessful information technology projects | 1999/03/01 | English | 107 |
Real time business intelligence in supply chain analytics | 2008/03/21 | English | 98 |
Information security: management's effect on culture and policy | 2006/01/01 | English | 88 |
Information security awareness: educating your users effectively | 1998/10/01 | English | 81 |
E‐commerce usage and business performance in the Malaysian tourism sector: empirical analysis | 2009/06/05 | English | 77 |
Strategies for successful CRM implementation | 2007/05/01 | English | 76 |
Information priority‐setting for better resource allocation using analytic hierarchy process (AHP) | 2001/05/01 | English | 72 |
A holistic model of computer abuse within organizations | 2002/05/01 | English | 70 |
Exploring radio frequency identification technology and its impact on business systems | 2005/02/01 | English | 66 |
Impact of perceived technical protection on security behaviors | 2009/10/09 | English | 60 |
Implementation and effectiveness of organizational information security measures | 2008/10/10 | English | 57 |
Why do some people manage phishing e‐mails better than others? | 2012/03/16 | English | 56 |
Private key generation from on‐line handwritten signatures | 2002/10/01 | English | 52 |
Phishing counter measures and their effectiveness – literature review | 2012/11/23 | English | 51 |
An integrated view of human, organizational, and technological challenges of IT security management | 2009/03/20 | English | 49 |
An integrated system theory of information security management | 2003/12/01 | English | 45 |
Information security management: why standards are important | 1999/03/01 | English | 44 |
Consumer motivations in taking action against spyware: an empirical investigation | 2009/07/17 | English | 41 |
Strategic use of information technology for increased innovation and performance | 1999/03/01 | English | 41 |
Web technology and supply chain management | 2004/09/01 | English | 41 |
Auditing in the e‐commerce era | 2004/12/01 | English | 39 |
Developing e‐business; a strategic approach | 2002/10/01 | English | 39 |
Application service providers (ASP): moving downstream to enhance competitive advantage | 2002/05/01 | English | 38 |
E‐commerce Web site design: strategies and models | 2001/03/01 | English | 37 |