


default search action
Journal of Organizational Computing and Electronic Commerce, Volume 29
Volume 29, Number 1, 2019
- Dave Chatterjee:
Should executives go to jail over cybersecurity breaches? 1-3
- Habib Ullah Khan
, Khalid A. Alshare:
Violators versus non-violators of information security measures in organizations - A study of distinguishing factors. 4-23 - A. J. Burns, M. Eric Johnson
, Deanna D. Caputo:
Spear phishing in a barrel: Insights from a targeted phishing campaign. 24-39 - Aaron Zimba
, Zhaoshun Wang, Mwenge Mulenga:
Cryptojacking injection: A paradigm shift to cryptocurrency-based web-centric internet attacks. 40-59
Volume 29, Number 2, 2019
- Malte Steinbach, Jost Sieweke
, Stefan Süß:
The diffusion of e-participation in public administrations: A systematic literature review. 61-95 - Merlin Nandy, Priya Seetharaman:
Interorganizational processes in buyer-supplier dyads: An information intensity perspective. 96-114 - Jiming Wu:
A new direction to better understand post-adoption behavior: The theory of need for information systems. 115-124 - Damon E. Campbell, Nicholas H. Roberts:
Effective use of analytic DSS and job performance: Looking beyond technology acceptance. 125-138 - Suchitra Veeravalli
, V. Vijayalakshmi:
A morphological review of enterprise social media literature. 139-162
Volume 29, Number 3, 2019
- Hsin-Lu Chang
:
Factors Affecting the Offshore Deployment of Interorganizational Systems in China: A Case Study Analysis. 163-189 - José Leao e Silva Filho
, Danielle Costa Morais
:
Negotiation protocol based on ordered weighted averaging and Fuzzy metrics. 190-208 - Pratik Tarafdar
, Indranil Bose:
Systems theoretic process analysis of information security: the case of aadhaar. 209-222 - Majharul Talukder, Sultan Alyammahi, Ali M. Quazi, Abm Abdullah
, Raechel Johns
:
Users' Sociocultural Orientation and Smart Systems Acceptance Link: do Demographics Matter? 223-247
Volume 29, Number 4, 2019
- Wu He, Zuopeng Justin Zhang
:
Enterprise cybersecurity training and awareness programs: Recommendations for success. 249-257 - Vipin Khattri, Deepak Kumar Singh
:
Implementation of an Additional Factor for Secure Authentication in Online Transactions. 258-273 - Xue Yang, Xinwei Wang
, Wei Thoo Yue, Choon Ling Sia, Xin Robert Luo:
Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD) - A Persuasion and Cognitive Elaboration Perspective. 274-293 - Brian I. Spaid
, Bonnie S. O'Neill, Terence T. Ow
:
The upside of showrooming: How online information creates positive spill-over for the brick-and-mortar retailer. 294-315

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.