Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Organizational information security policies: a review and research framework
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …
of organizational policies that specify how users of information and technology resources …
Guest editorial: Qualitative studies in information systems: A critical review and some guiding principles
Up until the mid-1990s, for a significant proportion of mainstream IS scholars, particularly
those in North America and Asia, research meant quantitative research, and studies not …
those in North America and Asia, research meant quantitative research, and studies not …
Seeing the forest and the trees
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …
(and noncompliance) with information security policies. However, the number of competing …
Distributed tuning of boundary resources
The digital age has seen the rise of service systems involving highly distributed,
heterogeneous, and resource-integrating actors whose relationships are governed by …
heterogeneous, and resource-integrating actors whose relationships are governed by …
The digital undertow: How the corollary effects of digital transformation affect industry standards
Scholarship on digital transformation has centered on how waves of digitalization have
moved through industries, producing strategic changes within and across firms and enabling …
moved through industries, producing strategic changes within and across firms and enabling …
Relative convenience, relative advantage, perceived security, perceived privacy, and continuous use intention of China's WeChat Pay: A mixed-method two-phase …
Using a mixed-method two-phase design approach, this study explores the relative
convenience, relative advantages, perceived privacy, and perceived security of WeChat …
convenience, relative advantages, perceived privacy, and perceived security of WeChat …
[HTML][HTML] Motives to standardize: Empirical evidence from Germany
In this paper, we identify the strategic motives of German manufacturing companies in the
electrical engineering and machinery industry to be involved in standards development …
electrical engineering and machinery industry to be involved in standards development …
Positioning the institutional perspective in information systems research
In recent years, a number of studies have adopted institutional theory as a perspective for
examining Information Systems (IS)/Information Technology (IT)-related phenomena such as …
examining Information Systems (IS)/Information Technology (IT)-related phenomena such as …
Information security management standards: Problems and solutions
International information security management guidelines play a key role in managing and
certifying organizational IS. We analyzed BS7799, BS ISO/IEC17799: 2000, GASPP/GAISP …
certifying organizational IS. We analyzed BS7799, BS ISO/IEC17799: 2000, GASPP/GAISP …
A reflection on information systems strategizing: the role of power and everyday practices
We review the IS strategizing literature and highlight its main strengths and weaknesses.
Strengths include an account given to the relevance of tensions between planned and …
Strengths include an account given to the relevance of tensions between planned and …