Search dblp for Publications

export results for "toc:db/journals/joeuc/joeuc25.bht:"

 download as .bib file

@article{DBLP:journals/joeuc/AmritHD13,
  author       = {Chintan Amrit and
                  Jos van Hillegersberg and
                  Bart van Diest},
  title        = {Involving End Users to Mitigate Risk in {IS} Development Projects},
  journal      = {J. Organ. End User Comput.},
  volume       = {25},
  number       = {3},
  pages        = {67--82},
  year         = {2013},
  url          = {https://doi.org/10.4018/joeuc.2013070105},
  doi          = {10.4018/JOEUC.2013070105},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joeuc/AmritHD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/Aurigemma13,
  author       = {Salvatore Aurigemma},
  title        = {A Composite Framework for Behavioral Compliance with Information Security
                  Policies},
  journal      = {J. Organ. End User Comput.},
  volume       = {25},
  number       = {3},
  pages        = {32--51},
  year         = {2013},
  url          = {https://doi.org/10.4018/joeuc.2013070103},
  doi          = {10.4018/JOEUC.2013070103},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joeuc/Aurigemma13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/CarlsonCHVG13,
  author       = {John R. Carlson and
                  Dawn S. Carlson and
                  Emily M. Hunter and
                  Randal L. Vaughn and
                  Joey F. George},
  title        = {Virtual Team Effectiveness: Investigating the Moderating Role of Experience
                  with Computer-Mediated Communication on the Impact of Team Cohesion
                  and Openness},
  journal      = {J. Organ. End User Comput.},
  volume       = {25},
  number       = {2},
  pages        = {1--18},
  year         = {2013},
  url          = {https://doi.org/10.4018/joeuc.2013040101},
  doi          = {10.4018/JOEUC.2013040101},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joeuc/CarlsonCHVG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/CronanD13,
  author       = {Timothy Paul Cronan and
                  David E. Douglas},
  title        = {Assessing {ERP} Learning (Management, Business Process, and Skills)
                  and Attitudes},
  journal      = {J. Organ. End User Comput.},
  volume       = {25},
  number       = {2},
  pages        = {59--74},
  year         = {2013},
  url          = {https://doi.org/10.4018/joeuc.2013040104},
  doi          = {10.4018/JOEUC.2013040104},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joeuc/CronanD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/DiniFPZ13,
  author       = {Gianluca Dini and
                  Pierfrancesco Foglia and
                  Cosimo Antonio Prete and
                  Michele Zanda},
  title        = {A Social-Feedback Enriched Interface for Software Download},
  journal      = {J. Organ. End User Comput.},
  volume       = {25},
  number       = {1},
  pages        = {24--42},
  year         = {2013},
  url          = {https://doi.org/10.4018/joeuc.2013010102},
  doi          = {10.4018/JOEUC.2013010102},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joeuc/DiniFPZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/FloodHINM13,
  author       = {Derek Flood and
                  Rachel Harrison and
                  Claudia Iacob and
                  Ann Nosseir and
                  Kevin McDaid},
  title        = {Are Mobile Spreadsheet Applications Usable?},
  journal      = {J. Organ. End User Comput.},
  volume       = {25},
  number       = {1},
  pages        = {43--63},
  year         = {2013},
  url          = {https://doi.org/10.4018/joeuc.2013010103},
  doi          = {10.4018/JOEUC.2013010103},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joeuc/FloodHINM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/HalilovicC13,
  author       = {Semina Halilovic and
                  Muris Cicic},
  title        = {Segmentation of Information Systems Users: The Finite Mixture Partial
                  Least Squares Method},
  journal      = {J. Organ. End User Comput.},
  volume       = {25},
  number       = {4},
  pages        = {1--26},
  year         = {2013},
  url          = {https://doi.org/10.4018/joeuc.2013100101},
  doi          = {10.4018/JOEUC.2013100101},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joeuc/HalilovicC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/JenkinsDB13,
  author       = {Jeffrey L. Jenkins and
                  Alexandra Durcikova and
                  Mary B. Burns},
  title        = {Simplicity is Bliss: Controlling Extraneous Cognitive Load in Online
                  Security Training to Promote Secure Behavior},
  journal      = {J. Organ. End User Comput.},
  volume       = {25},
  number       = {3},
  pages        = {52--66},
  year         = {2013},
  url          = {https://doi.org/10.4018/joeuc.2013070104},
  doi          = {10.4018/JOEUC.2013070104},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joeuc/JenkinsDB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/JohnstonWJ13,
  author       = {Allen C. Johnston and
                  Barbara Wech and
                  Eric Jack},
  title        = {Engaging Remote Employees: The Moderating Role of "Remote" Status
                  in Determining Employee Information Security Policy Awareness},
  journal      = {J. Organ. End User Comput.},
  volume       = {25},
  number       = {1},
  pages        = {1--23},
  year         = {2013},
  url          = {https://doi.org/10.4018/joeuc.2013010101},
  doi          = {10.4018/JOEUC.2013010101},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joeuc/JohnstonWJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/MatookH13,
  author       = {Sabine Matook and
                  Hans van der Heijden},
  title        = {Goal Abstraction, Goal Linkage Dependency, and Perceived Utilitarian
                  Value of Information Systems: {A} Mixed-Method Study},
  journal      = {J. Organ. End User Comput.},
  volume       = {25},
  number       = {2},
  pages        = {41--58},
  year         = {2013},
  url          = {https://doi.org/10.4018/joeuc.2013040103},
  doi          = {10.4018/JOEUC.2013040103},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joeuc/MatookH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/NgugiK13,
  author       = {Benjamin Ngugi and
                  Arnold Kamis},
  title        = {Modeling the Impact of Biometric Security on Millennials' Protection
                  Motivation},
  journal      = {J. Organ. End User Comput.},
  volume       = {25},
  number       = {4},
  pages        = {27--49},
  year         = {2013},
  url          = {https://doi.org/10.4018/joeuc.2013100102},
  doi          = {10.4018/JOEUC.2013100102},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joeuc/NgugiK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/Nicolas-RoccaO13,
  author       = {Tonia San Nicolas{-}Rocca and
                  Lorne Olfman},
  title        = {End User Security Training for Identification and Access Management},
  journal      = {J. Organ. End User Comput.},
  volume       = {25},
  number       = {4},
  pages        = {75--103},
  year         = {2013},
  url          = {https://doi.org/10.4018/joeuc.2013100104},
  doi          = {10.4018/JOEUC.2013100104},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joeuc/Nicolas-RoccaO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/PankoP13,
  author       = {Raymond R. Panko and
                  Daniel Port},
  title        = {End User Computing: The Dark Matter (and Dark Energy) of Corporate
                  {IT}},
  journal      = {J. Organ. End User Comput.},
  volume       = {25},
  number       = {3},
  pages        = {1--19},
  year         = {2013},
  url          = {https://doi.org/10.4018/joeuc.2013070101},
  doi          = {10.4018/JOEUC.2013070101},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joeuc/PankoP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/Phillips13,
  author       = {Brandis Phillips},
  title        = {Information Technology Management Practice: Impacts upon Effectiveness},
  journal      = {J. Organ. End User Comput.},
  volume       = {25},
  number       = {4},
  pages        = {50--74},
  year         = {2013},
  url          = {https://doi.org/10.4018/joeuc.2013100103},
  doi          = {10.4018/JOEUC.2013100103},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joeuc/Phillips13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/Sanford13,
  author       = {Clive Sanford},
  title        = {An Artifact Switching Model for User Acceptance of eBooks},
  journal      = {J. Organ. End User Comput.},
  volume       = {25},
  number       = {2},
  pages        = {19--40},
  year         = {2013},
  url          = {https://doi.org/10.4018/joeuc.2013040102},
  doi          = {10.4018/JOEUC.2013040102},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joeuc/Sanford13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/Thorne13,
  author       = {Simon R. Thorne},
  title        = {The Misuse of Spreadsheets in the Nuclear Fuel Industry: The Falsification
                  of Safety Critical Data Using Spreadsheets at British Nuclear Fuels
                  Limited {(BNFL)}},
  journal      = {J. Organ. End User Comput.},
  volume       = {25},
  number       = {3},
  pages        = {20--31},
  year         = {2013},
  url          = {https://doi.org/10.4018/joeuc.2013070102},
  doi          = {10.4018/JOEUC.2013070102},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joeuc/Thorne13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}