Name
Affiliation
Papers
JAN GUYNES CLARK
Al Akhawayan Univ., Ifrane
29
Collaborators
Citations 
PageRank 
22
381
27.36
Referers 
Referees 
References 
771
957
524
Search Limit
100957
Title
Citations
PageRank
Year
Security Risk Management In Healthcare: A Case Study00.342014
A Multilevel Investigation Of Participation Within Virtual Health Communities30.382014
Knowledge sharing in open source software project teams: A transactive memory system perspective.150.612013
Security Risk Management Can Be Investigated! Presenting the Relation Between Research Rigor and an Effective Study.10.362012
Investigating the Reciprocal Relationships Within Health Virtual Communities.30.392012
Matrix Passwords: A Proposed Methodology of Password Authentication.00.342012
Assessing Researcher Publication Productivity In The Leading Information Systems Journals: A 2005-2009 Update30.452011
Critical Success Factors for an Effective Security Risk Management Program: An Exploratory Case Study at a Fortune 500 Firm.00.342011
Post-retrieval search hit clustering to improve information retrieval effectiveness: Two digital forensics case studies150.872011
A method to measure the accounting abnormal returns of largescale information technology investments: the case of enterprise systems.00.342010
Using Stakeholder Analysis To Identify Users In Healthcare Information Systems Research: Who Is The Real User?80.732009
Current State Of Information Security Research In Is250.942009
Understanding the Information Technology Innovation Impact on Firm Performance: An Empirical Investigation.00.342008
Using Biometric Authentication to Improve Fire Ground Accountability: An Assessment of Firefighter Privacy Concerns.20.372008
Measuring Success In Interorganizational Information Systems: A Case Study40.412008
The Impact Of Information Systems On End User Performance: Examining The Effects Of Cognitive Style Using Learning Curves In An Electronic Medical Record Implementation10.352008
Carnegie Classifications And Institution Productivity In Information Systems Research: A Scientometric Study60.452007
Identifying the User in Healthcare Information Systems Resear00.342007
Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results392.182007
In Search Of The Primary Suppliers Of Is Research: Who Are They And Where Did They Come From?150.792006
A Model for Predicting Hacker Behavior.10.342006
Digital Forensics Curriculum Development: Identification of Knowledge Domains Learning Objectives and Core Concepts.00.342006
A hierarchical, objectives-based framework for the digital investigations process856.742005
Dealing with Terabyte Datasets in Digital Investigations30.532005
Integrating Security and Privacy Issues in System Design00.342004
Why there aren't more information security research studies1284.502004
Identifying Exceptional Application Software Developers: A Comparison of Students and Professionals170.752003
Network evolution towards ISDN services: a management perspective00.341998
Internet comes to Morocco72.191998