


default search action
Journal of Organizational and End User Computing, Volume 25
Volume 25, Number 1, 2013
- Allen C. Johnston, Barbara Wech, Eric Jack:

Engaging Remote Employees: The Moderating Role of "Remote" Status in Determining Employee Information Security Policy Awareness. 1-23 - Gianluca Dini

, Pierfrancesco Foglia
, Cosimo Antonio Prete, Michele Zanda:
A Social-Feedback Enriched Interface for Software Download. 24-42 - Derek Flood, Rachel Harrison, Claudia Iacob

, Ann Nosseir, Kevin McDaid:
Are Mobile Spreadsheet Applications Usable? 43-63
Volume 25, Number 2, 2013
- John R. Carlson, Dawn S. Carlson

, Emily M. Hunter, Randal L. Vaughn, Joey F. George
:
Virtual Team Effectiveness: Investigating the Moderating Role of Experience with Computer-Mediated Communication on the Impact of Team Cohesion and Openness. 1-18 - Clive Sanford:

An Artifact Switching Model for User Acceptance of eBooks. 19-40 - Sabine Matook

, Hans van der Heijden
:
Goal Abstraction, Goal Linkage Dependency, and Perceived Utilitarian Value of Information Systems: A Mixed-Method Study. 41-58 - Timothy Paul Cronan, David E. Douglas:

Assessing ERP Learning (Management, Business Process, and Skills) and Attitudes. 59-74
Volume 25, Number 3, 2013
- Raymond R. Panko, Daniel Port:

End User Computing: The Dark Matter (and Dark Energy) of Corporate IT. 1-19 - Simon R. Thorne

:
The Misuse of Spreadsheets in the Nuclear Fuel Industry: The Falsification of Safety Critical Data Using Spreadsheets at British Nuclear Fuels Limited (BNFL). 20-31 - Salvatore Aurigemma:

A Composite Framework for Behavioral Compliance with Information Security Policies. 32-51 - Jeffrey L. Jenkins

, Alexandra Durcikova, Mary B. Burns:
Simplicity is Bliss: Controlling Extraneous Cognitive Load in Online Security Training to Promote Secure Behavior. 52-66 - Chintan Amrit

, Jos van Hillegersberg, Bart van Diest:
Involving End Users to Mitigate Risk in IS Development Projects. 67-82
Volume 25, Number 4, 2013
- Semina Halilovic, Muris Cicic:

Segmentation of Information Systems Users: The Finite Mixture Partial Least Squares Method. 1-26 - Benjamin Ngugi, Arnold Kamis:

Modeling the Impact of Biometric Security on Millennials' Protection Motivation. 27-49 - Brandis Phillips:

Information Technology Management Practice: Impacts upon Effectiveness. 50-74 - Tonia San Nicolas-Rocca, Lorne Olfman

:
End User Security Training for Identification and Access Management. 75-103

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














