Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
  • N B and Mathew S. (2025). Exploring the factors influencing information security policy compliance and violations. Computers and Security. 147:C. Online publication date: 1-Dec-2024.

    https://doi.org/10.1016/j.cose.2024.104062

  • Sarfraz M, Khawaja K and Um-e-Farwah . (2024). Is the internet a double-edged sword for organizations? An empirical study on cyberloafing. Information Technology and Management. 25:4. (319-333). Online publication date: 1-Dec-2024.

    https://doi.org/10.1007/s10799-022-00385-5

  • Zahedi F, Chen Y and Zhao H. (2024). Ontology-Based Intelligent Interface Personalization for Protection Against Phishing Attacks. Information Systems Research. 35:3. (1463-1478). Online publication date: 1-Sep-2024.

    https://doi.org/10.1287/isre.2021.0065

  • Aggarwal A and Srivastava S. (2024). Exploring eustress and fear. Computers and Security. 142:C. Online publication date: 1-Jul-2024.

    https://doi.org/10.1016/j.cose.2024.103857

  • Xie Y, Siponen M, Laatikainen G, Moody G and Zheng X. (2024). Testing the dominant mediator in EPPM. Computers and Security. 140:C. Online publication date: 1-May-2024.

    https://doi.org/10.1016/j.cose.2024.103776

  • Ali R and Dominic P. (2024). Investigation of information security policy violations among oil and gas employees. Journal of Information Science. 50:1. (254-272). Online publication date: 1-Feb-2024.

    https://doi.org/10.1177/01655515221087680