nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accommodating Practices During Episodes of Disillusionment with Mobile IT
|
Zamani, Efpraxia D. |
|
|
23 |
2 |
p. 453-475 |
artikel |
2 |
Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes
|
Silic, Mario |
|
|
23 |
2 |
p. 329-341 |
artikel |
3 |
DeepRan: Attention-based BiLSTM and CRF for Ransomware Early Detection and Classification
|
Roy, Krishna Chandra |
|
|
23 |
2 |
p. 299-315 |
artikel |
4 |
Do Agile Managed Information Systems Projects Fail Due to a Lack of Emotional Intelligence?
|
Luong, Tan Trung |
|
|
23 |
2 |
p. 415-433 |
artikel |
5 |
HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks
|
Huang, Xin |
|
|
23 |
2 |
p. 269-283 |
artikel |
6 |
Incentive Mechanism for Rational Miners in Bitcoin Mining Pool
|
Xue, Gang |
|
|
23 |
2 |
p. 317-327 |
artikel |
7 |
Insiders’ Adaptations to Security-Based Demands in the Workplace: An Examination of Security Behavioral Complexity
|
Burns, A. J. |
|
|
23 |
2 |
p. 343-360 |
artikel |
8 |
LogGAN: a Log-level Generative Adversarial Network for Anomaly Detection using Permutation Event Modeling
|
Xia, Bin |
|
|
23 |
2 |
p. 285-298 |
artikel |
9 |
Managing Data Quality of the Data Warehouse: A Chance-Constrained Programming Approach
|
Liu, Qi |
|
|
23 |
2 |
p. 375-389 |
artikel |
10 |
Organizing Self-Organizing Systems: A Terminology, Taxonomy, and Reference Model for Entities in Cyber-Physical Production Systems
|
Berger, Stephan |
|
|
23 |
2 |
p. 391-414 |
artikel |
11 |
Popular News Are Relevant News! How Investor Attention Affects Algorithmic Decision-Making and Decision Support in Financial Markets
|
Clapham, Benjamin |
|
|
23 |
2 |
p. 477-494 |
artikel |
12 |
Seeking Foundations for the Science of Cyber Security
|
Xu, Shouhuai |
|
|
23 |
2 |
p. 263-267 |
artikel |
13 |
The Influence of the Centrality of Visual Website Aesthetics on Online User Responses: Measure Development and Empirical Investigation
|
Pengnate, Supavich Fone |
|
|
23 |
2 |
p. 435-452 |
artikel |
14 |
The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence
|
Kweon, Eunkyung |
|
|
23 |
2 |
p. 361-373 |
artikel |
15 |
Towards Increased Understanding of Open Data Use for Software Development
|
Grzenda, Maciej |
|
|
23 |
2 |
p. 495-513 |
artikel |