Knowledge Management and the Creation of Business Value. | 0 | 0.34 | 2015 |
Identifying and measuring the dimensions of risky IT behavior | 0 | 0.34 | 2015 |
BYOD in Practice: A Comparison of Four BYOD Programs | 0 | 0.34 | 2015 |
User's Adoption of Free Third-Party Security Apps. | 0 | 0.34 | 2014 |
The Business Value of Knowledge Management. | 2 | 0.38 | 2012 |
An Investigation on the User's Willingness to Pay on Hedonic Social Network Sites. | 2 | 0.36 | 2012 |
Understanding the Antecedents of Knowledge Sharing: An Organizational Justice Perspective. | 0 | 0.34 | 2012 |
USER'S WILLINGNESS TO PAY ON SOCIAL NETWORK SITES | 25 | 0.72 | 2011 |
Information technology literacy revisited: an exploratory assessment | 1 | 0.35 | 2011 |
Empirical Evaluation Of Information Security Planning And Integration | 6 | 0.44 | 2010 |
Organizational Practices That Foster Knowledge Sharing: Validation across Distinct National Cultures. | 6 | 0.50 | 2010 |
Influence of Social Context and Affect on Individuals' Implementation of Information Security Safeguards. | 0 | 0.34 | 2009 |
An evaluation of Fortune 500 company home pages for disability-access | 0 | 0.34 | 2005 |
An Empirical Analysis Of Software Volatility And Related Factors | 2 | 0.36 | 2003 |
Building a knowledge base for MIS research: A meta-analysis of a systems success model | 13 | 0.66 | 2000 |
A comparative investigation of ethical decision making: information systems professionals versus students | 9 | 0.88 | 1998 |
An empirical assessment of a multimedia executive support system | 9 | 0.64 | 1998 |
Tutorial on telecommunications and security | 0 | 0.34 | 1984 |