default search action
Search dblp for Publications
export results for "toc:db/journals/joeuc/joeuc25.bht:"
@article{DBLP:journals/joeuc/AmritHD13, author = {Chintan Amrit and Jos van Hillegersberg and Bart van Diest}, title = {Involving End Users to Mitigate Risk in {IS} Development Projects}, journal = {J. Organ. End User Comput.}, volume = {25}, number = {3}, pages = {67--82}, year = {2013}, url = {https://doi.org/10.4018/joeuc.2013070105}, doi = {10.4018/JOEUC.2013070105}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joeuc/AmritHD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/Aurigemma13, author = {Salvatore Aurigemma}, title = {A Composite Framework for Behavioral Compliance with Information Security Policies}, journal = {J. Organ. End User Comput.}, volume = {25}, number = {3}, pages = {32--51}, year = {2013}, url = {https://doi.org/10.4018/joeuc.2013070103}, doi = {10.4018/JOEUC.2013070103}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joeuc/Aurigemma13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/CarlsonCHVG13, author = {John R. Carlson and Dawn S. Carlson and Emily M. Hunter and Randal L. Vaughn and Joey F. George}, title = {Virtual Team Effectiveness: Investigating the Moderating Role of Experience with Computer-Mediated Communication on the Impact of Team Cohesion and Openness}, journal = {J. Organ. End User Comput.}, volume = {25}, number = {2}, pages = {1--18}, year = {2013}, url = {https://doi.org/10.4018/joeuc.2013040101}, doi = {10.4018/JOEUC.2013040101}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joeuc/CarlsonCHVG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/CronanD13, author = {Timothy Paul Cronan and David E. Douglas}, title = {Assessing {ERP} Learning (Management, Business Process, and Skills) and Attitudes}, journal = {J. Organ. End User Comput.}, volume = {25}, number = {2}, pages = {59--74}, year = {2013}, url = {https://doi.org/10.4018/joeuc.2013040104}, doi = {10.4018/JOEUC.2013040104}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joeuc/CronanD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/DiniFPZ13, author = {Gianluca Dini and Pierfrancesco Foglia and Cosimo Antonio Prete and Michele Zanda}, title = {A Social-Feedback Enriched Interface for Software Download}, journal = {J. Organ. End User Comput.}, volume = {25}, number = {1}, pages = {24--42}, year = {2013}, url = {https://doi.org/10.4018/joeuc.2013010102}, doi = {10.4018/JOEUC.2013010102}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joeuc/DiniFPZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/FloodHINM13, author = {Derek Flood and Rachel Harrison and Claudia Iacob and Ann Nosseir and Kevin McDaid}, title = {Are Mobile Spreadsheet Applications Usable?}, journal = {J. Organ. End User Comput.}, volume = {25}, number = {1}, pages = {43--63}, year = {2013}, url = {https://doi.org/10.4018/joeuc.2013010103}, doi = {10.4018/JOEUC.2013010103}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joeuc/FloodHINM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/HalilovicC13, author = {Semina Halilovic and Muris Cicic}, title = {Segmentation of Information Systems Users: The Finite Mixture Partial Least Squares Method}, journal = {J. Organ. End User Comput.}, volume = {25}, number = {4}, pages = {1--26}, year = {2013}, url = {https://doi.org/10.4018/joeuc.2013100101}, doi = {10.4018/JOEUC.2013100101}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joeuc/HalilovicC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/JenkinsDB13, author = {Jeffrey L. Jenkins and Alexandra Durcikova and Mary B. Burns}, title = {Simplicity is Bliss: Controlling Extraneous Cognitive Load in Online Security Training to Promote Secure Behavior}, journal = {J. Organ. End User Comput.}, volume = {25}, number = {3}, pages = {52--66}, year = {2013}, url = {https://doi.org/10.4018/joeuc.2013070104}, doi = {10.4018/JOEUC.2013070104}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joeuc/JenkinsDB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/JohnstonWJ13, author = {Allen C. Johnston and Barbara Wech and Eric Jack}, title = {Engaging Remote Employees: The Moderating Role of "Remote" Status in Determining Employee Information Security Policy Awareness}, journal = {J. Organ. End User Comput.}, volume = {25}, number = {1}, pages = {1--23}, year = {2013}, url = {https://doi.org/10.4018/joeuc.2013010101}, doi = {10.4018/JOEUC.2013010101}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joeuc/JohnstonWJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/MatookH13, author = {Sabine Matook and Hans van der Heijden}, title = {Goal Abstraction, Goal Linkage Dependency, and Perceived Utilitarian Value of Information Systems: {A} Mixed-Method Study}, journal = {J. Organ. End User Comput.}, volume = {25}, number = {2}, pages = {41--58}, year = {2013}, url = {https://doi.org/10.4018/joeuc.2013040103}, doi = {10.4018/JOEUC.2013040103}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joeuc/MatookH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/NgugiK13, author = {Benjamin Ngugi and Arnold Kamis}, title = {Modeling the Impact of Biometric Security on Millennials' Protection Motivation}, journal = {J. Organ. End User Comput.}, volume = {25}, number = {4}, pages = {27--49}, year = {2013}, url = {https://doi.org/10.4018/joeuc.2013100102}, doi = {10.4018/JOEUC.2013100102}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joeuc/NgugiK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/Nicolas-RoccaO13, author = {Tonia San Nicolas{-}Rocca and Lorne Olfman}, title = {End User Security Training for Identification and Access Management}, journal = {J. Organ. End User Comput.}, volume = {25}, number = {4}, pages = {75--103}, year = {2013}, url = {https://doi.org/10.4018/joeuc.2013100104}, doi = {10.4018/JOEUC.2013100104}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joeuc/Nicolas-RoccaO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/PankoP13, author = {Raymond R. Panko and Daniel Port}, title = {End User Computing: The Dark Matter (and Dark Energy) of Corporate {IT}}, journal = {J. Organ. End User Comput.}, volume = {25}, number = {3}, pages = {1--19}, year = {2013}, url = {https://doi.org/10.4018/joeuc.2013070101}, doi = {10.4018/JOEUC.2013070101}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joeuc/PankoP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/Phillips13, author = {Brandis Phillips}, title = {Information Technology Management Practice: Impacts upon Effectiveness}, journal = {J. Organ. End User Comput.}, volume = {25}, number = {4}, pages = {50--74}, year = {2013}, url = {https://doi.org/10.4018/joeuc.2013100103}, doi = {10.4018/JOEUC.2013100103}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joeuc/Phillips13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/Sanford13, author = {Clive Sanford}, title = {An Artifact Switching Model for User Acceptance of eBooks}, journal = {J. Organ. End User Comput.}, volume = {25}, number = {2}, pages = {19--40}, year = {2013}, url = {https://doi.org/10.4018/joeuc.2013040102}, doi = {10.4018/JOEUC.2013040102}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joeuc/Sanford13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/Thorne13, author = {Simon R. Thorne}, title = {The Misuse of Spreadsheets in the Nuclear Fuel Industry: The Falsification of Safety Critical Data Using Spreadsheets at British Nuclear Fuels Limited {(BNFL)}}, journal = {J. Organ. End User Comput.}, volume = {25}, number = {3}, pages = {20--31}, year = {2013}, url = {https://doi.org/10.4018/joeuc.2013070102}, doi = {10.4018/JOEUC.2013070102}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joeuc/Thorne13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.