Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
  • Dennis A and Minas R. (2018). Security on Autopilot. ACM SIGMIS Database: the DATABASE for Advances in Information Systems. 49:SI. (15-38). Online publication date: 25-Apr-2018.

    https://doi.org/10.1145/3210530.3210533

  • Piao C, Li X, Pan X and Zhang C. (2016). User privacy protection for a mobile commerce alliance. Electronic Commerce Research and Applications. 18:C. (58-70). Online publication date: 1-Jul-2016.

    https://doi.org/10.1016/j.elerap.2016.03.005

  • Greenaway K, Chan Y and Crossler R. (2015). Company information privacy orientation. Information Systems Journal. 25:6. (579-606). Online publication date: 1-Nov-2015.

    https://doi.org/10.1111/isj.12080

  • Posey C, Roberts T, Lowry P, Bennett R and Courtney J. (2013). Insiders' protection of organizational information assets. MIS Quarterly. 37:4. (1189-1210). Online publication date: 1-Dec-2013.

    https://doi.org/10.25300/MISQ/2013/37.4.09

  • McRobb S and Stahl B. (2007). Privacy as a shared feature of the e-phenomenon: a comparison of privacy policies in e-government, e-commerce and e-teaching. International Journal of Information Technology and Management. 6:2-4. (232-249). Online publication date: 1-Jun-2007.

    https://doi.org/10.1504/IJITM.2007.014002

  • Djekic P and Loebbecke C. (2007). Preventing application software piracy. The Journal of Strategic Information Systems. 16:2. (173-186). Online publication date: 1-Jun-2007.

    https://doi.org/10.1016/j.jsis.2007.05.005

  • Peace A, Galletta D and Thong J. (2003). Software Piracy in the Workplace. Journal of Management Information Systems. 20:1. (153-177). Online publication date: 1-Jul-2003.

    /doi/10.5555/1289800.1289806

  • Smith H. (2002). Ethics and information systems. ACM SIGMIS Database: the DATABASE for Advances in Information Systems. 33:3. (8-22). Online publication date: 29-Aug-2002.

    https://doi.org/10.1145/569905.569908

  • Lending D and Slaughter S. Research in progress. Proceedings of the 2001 ACM SIGCPR conference on Computer personnel research. (198-200).

    https://doi.org/10.1145/371209.371235

  • Lending D and Slaughter S. Understanding differences in ethical beliefs and behaviors toward software copying. Proceedings of the 1999 ACM SIGCPR conference on Computer personnel research. (253-260).

    https://doi.org/10.1145/299513.299699

  • Smith H and Hasnas J. (1999). Ethics and information systems. MIS Quarterly. 23:1. (109-127). Online publication date: 1-Mar-1999.

    https://doi.org/10.2307/249412

  • Thong J and Yap C. (1998). Testing an ethical decision-making theory. Journal of Management Information Systems. 15:1. (213-237). Online publication date: 1-Jun-1998.

    https://doi.org/10.1080/07421222.1998.11518203

  • Straub D, Limayem M and Karahanna-Evaristo E. (1995). Measuring System Usage. Management Science. 41:8. (1328-1342). Online publication date: 1-Aug-1995.

    https://doi.org/10.1287/mnsc.41.8.1328

  • Conger S, Loch K and Helft B. Information technology and ethics. Proceedings of the conference on Ethics in the computer age. (22-27).

    https://doi.org/10.1145/199544.199556

  • Jarvenpaa S and Ives B. (1994). The global network organization of the future. Journal of Management Information Systems. 10:4. (25-57). Online publication date: 1-Mar-1994.

    https://doi.org/10.1080/07421222.1994.11518019

  • Culnan M. (1993). "How did they get my name?". MIS Quarterly. 17:3. (341-363). Online publication date: 1-Sep-1993.

    https://doi.org/10.2307/249775