共 50 条
- [1] Applying Action Research in the Formulation of Information Security Policies [J]. NEW CONTRIBUTIONS IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, PT 1, 2015, 353 : 513 - 522
- [2] INSTITUTIONALIZATION OF INFORMATION SYSTEMS SECURITY POLICIES ADOPTION: FACTORS AND GUIDELINES [J]. IADIS-INTERNATIONAL JOURNAL ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 9 (02): : 82 - 95
- [3] Implementation of an Information Systems Security Policy: Action Research [J]. PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON RESEARCH METHODOLOGY FOR BUSINESS AND MANAGEMENT STUDIES (ECRM 2014), 2014, : 244 - 252
- [4] Definition of Information Systems Security Policies [J]. RECENT ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 3, 2017, 571 : 225 - 234
- [5] Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems [J]. FUTURE INTERNET, 2016, 8 (03):
- [6] Evaluation of the Adoption of an Information Systems Security Policy [J]. 2015 10TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2015,
- [7] Identifying Influences to Information Security Framework Adoption: Applying a Modified UTAUT [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 2605 - 2609
- [9] Research on User Adoption of Information Systems [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS AND INFORMATION TECHNOLOGY PROCESSING (AMITP 2016), 2016, 60 : 300 - 303
- [10] Applying composable security properties to assessment of information systems [J]. TWENTIETH ANNUAL INTERNATIONAL COMPUTER SOFTWARE & APPLICATIONS CONFERENCE (COMPSAC'96), PROCEEDINGS, 1996, 20 : 118 - 123