共 26 条
- [1] Saeidi P., Saeidi S.P., Sofian S., Saeidi S.P., Nilashi M., Mardani A., The impact of enterprise risk management on competitive advantage by moderating role of information technology, Computer Standards & Interfaces, 63, pp. 67-82, (2019)
- [2] Melian-Alzola L., Fernandez-Monroy M., Hidalgo-Penate M., Information technology capability and organisational agility: A study in the Canary Islands hotel industry, Tourism Management Perspectives, 33, pp. 1-9, (2020)
- [3] Deb K., Banerjee S., Chatterjee R.P., Das A., Bag R., Educational website ranking using fuzzy logic and k-means clustering based hybrid method, Ingénierie des Systèmes d'Information, 24, pp. 497-506, (2019)
- [4] Angraini Alias R.A., Okfalisa, Information Security Policy Compliance: Systematic Literature Review, Procedia Computer Science, 161, pp. 1216-1224, (2019)
- [5] Haqaf H., Koyuncu M., Understanding key skills for information security managers, International Journal of Information Management, 43, pp. 165-172, (2018)
- [6] Melamed T., An active man-in-the-middle attack on bluetooth smart devices, International Journal of Safety and Security Engineering, 8, 2, pp. 200-211, (2018)
- [7] Jacobs R.J., Caballero J., Parmar J., Kane M.N., The role of self-efficacy, flexibility, and gender in pharmacy students' health information technology readiness, Currents in Pharmacy Teaching and Learning, 11, 11, pp. 1103-1110, (2019)
- [8] Bongiovanni I., The least secure places in the universe? A systematic literature review on information security management in higher education, Computers & Security, 86, pp. 350-357, (2019)
- [9] Cao T.J., Guo Y., Teaching research and practice of new information security technology under the background of professional accreditation, China Modern Educational Equipmentn, 11, pp. 76-79, (2019)
- [10] Rajab M., Eydgahi A., Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education, Computers & Security, 8, pp. 211-223, (2019)