Security Risk Management In Healthcare: A Case Study | 0 | 0.34 | 2014 |
A Multilevel Investigation Of Participation Within Virtual Health Communities | 3 | 0.38 | 2014 |
Knowledge sharing in open source software project teams: A transactive memory system perspective. | 15 | 0.61 | 2013 |
Security Risk Management Can Be Investigated! Presenting the Relation Between Research Rigor and an Effective Study. | 1 | 0.36 | 2012 |
Investigating the Reciprocal Relationships Within Health Virtual Communities. | 3 | 0.39 | 2012 |
Matrix Passwords: A Proposed Methodology of Password Authentication. | 0 | 0.34 | 2012 |
Assessing Researcher Publication Productivity In The Leading Information Systems Journals: A 2005-2009 Update | 3 | 0.45 | 2011 |
Critical Success Factors for an Effective Security Risk Management Program: An Exploratory Case Study at a Fortune 500 Firm. | 0 | 0.34 | 2011 |
Post-retrieval search hit clustering to improve information retrieval effectiveness: Two digital forensics case studies | 15 | 0.87 | 2011 |
A method to measure the accounting abnormal returns of largescale information technology investments: the case of enterprise systems. | 0 | 0.34 | 2010 |
Using Stakeholder Analysis To Identify Users In Healthcare Information Systems Research: Who Is The Real User? | 8 | 0.73 | 2009 |
Current State Of Information Security Research In Is | 25 | 0.94 | 2009 |
Understanding the Information Technology Innovation Impact on Firm Performance: An Empirical Investigation. | 0 | 0.34 | 2008 |
Using Biometric Authentication to Improve Fire Ground Accountability: An Assessment of Firefighter Privacy Concerns. | 2 | 0.37 | 2008 |
Measuring Success In Interorganizational Information Systems: A Case Study | 4 | 0.41 | 2008 |
The Impact Of Information Systems On End User Performance: Examining The Effects Of Cognitive Style Using Learning Curves In An Electronic Medical Record Implementation | 1 | 0.35 | 2008 |
Carnegie Classifications And Institution Productivity In Information Systems Research: A Scientometric Study | 6 | 0.45 | 2007 |
Identifying the User in Healthcare Information Systems Resear | 0 | 0.34 | 2007 |
Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results | 39 | 2.18 | 2007 |
In Search Of The Primary Suppliers Of Is Research: Who Are They And Where Did They Come From? | 15 | 0.79 | 2006 |
A Model for Predicting Hacker Behavior. | 1 | 0.34 | 2006 |
Digital Forensics Curriculum Development: Identification of Knowledge Domains Learning Objectives and Core Concepts. | 0 | 0.34 | 2006 |
A hierarchical, objectives-based framework for the digital investigations process | 85 | 6.74 | 2005 |
Dealing with Terabyte Datasets in Digital Investigations | 3 | 0.53 | 2005 |
Integrating Security and Privacy Issues in System Design | 0 | 0.34 | 2004 |
Why there aren't more information security research studies | 128 | 4.50 | 2004 |
Identifying Exceptional Application Software Developers: A Comparison of Students and Professionals | 17 | 0.75 | 2003 |
Network evolution towards ISDN services: a management perspective | 0 | 0.34 | 1998 |
Internet comes to Morocco | 7 | 2.19 | 1998 |