


default search action
Journal of Organizational Computing and Electronic Commerce, Volume 29
Volume 29, Number 1, 2019
- Dave Chatterjee:

Should executives go to jail over cybersecurity breaches? 1-3
- Habib Ullah Khan

, Khalid A. Alshare:
Violators versus non-violators of information security measures in organizations - A study of distinguishing factors. 4-23 - A. J. Burns, M. Eric Johnson

, Deanna D. Caputo:
Spear phishing in a barrel: Insights from a targeted phishing campaign. 24-39 - Aaron Zimba

, Zhaoshun Wang, Mwenge Mulenga:
Cryptojacking injection: A paradigm shift to cryptocurrency-based web-centric internet attacks. 40-59
Volume 29, Number 2, 2019
- Malte Steinbach, Jost Sieweke

, Stefan Süß:
The diffusion of e-participation in public administrations: A systematic literature review. 61-95 - Merlin Nandy, Priya Seetharaman

:
Interorganizational processes in buyer-supplier dyads: An information intensity perspective. 96-114 - Jiming Wu:

A new direction to better understand post-adoption behavior: The theory of need for information systems. 115-124 - Damon E. Campbell, Nicholas H. Roberts:

Effective use of analytic DSS and job performance: Looking beyond technology acceptance. 125-138 - Suchitra Veeravalli

, V. Vijayalakshmi:
A morphological review of enterprise social media literature. 139-162
Volume 29, Number 3, 2019
- Hsin-Lu Chang

:
Factors Affecting the Offshore Deployment of Interorganizational Systems in China: A Case Study Analysis. 163-189 - José Leao e Silva Filho

, Danielle Costa Morais
:
Negotiation protocol based on ordered weighted averaging and Fuzzy metrics. 190-208 - Pratik Tarafdar

, Indranil Bose:
Systems theoretic process analysis of information security: the case of aadhaar. 209-222 - Majharul Talukder, Sultan Alyammahi, Ali M. Quazi, Abm Abdullah

, Raechel Johns
:
Users' Sociocultural Orientation and Smart Systems Acceptance Link: do Demographics Matter? 223-247
Volume 29, Number 4, 2019
- Wu He, Zuopeng Justin Zhang

:
Enterprise cybersecurity training and awareness programs: Recommendations for success. 249-257 - Vipin Khattri

, Deepak Kumar Singh
:
Implementation of an Additional Factor for Secure Authentication in Online Transactions. 258-273 - Xue Yang, Xinwei Wang

, Wei Thoo Yue, Choon Ling Sia, Xin Robert Luo:
Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD) - A Persuasion and Cognitive Elaboration Perspective. 274-293 - Brian I. Spaid

, Bonnie S. O'Neill, Terence T. Ow
:
The upside of showrooming: How online information creates positive spill-over for the brick-and-mortar retailer. 294-315

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














