Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Positioning the institutional perspective in information systems research
M Mignerat, S Rivard - Journal of information technology, 2009 - journals.sagepub.com
In recent years, a number of studies have adopted institutional theory as a perspective for
examining Information Systems (IS)/Information Technology (IT)-related phenomena such as …
examining Information Systems (IS)/Information Technology (IT)-related phenomena such as …
A review of IT governance: A taxonomy to inform accounting information systems
CL Wilkin, RH Chenhall - Journal of Information Systems, 2010 - publications.aaahq.org
This paper reviews Information Systems (IS) literature that is relevant to Information
Technology Governance (ITG) and examines how it informs Accounting Information Systems …
Technology Governance (ITG) and examines how it informs Accounting Information Systems …
The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities
This paper investigates the role of general cybersecurity and cybersecurity policy awareness
in enhancing supply chain cyber resilience reactive capabilities. Theorizing from the …
in enhancing supply chain cyber resilience reactive capabilities. Theorizing from the …
[PDF][PDF] How information technology matters in societal change: An affordance-based institutional logics perspective.
While there has been much work on the relationship between information technology (IT)
and organizational change, there has been limited research that theorizes the relationship …
and organizational change, there has been limited research that theorizes the relationship …
Understanding SaaS adoption: The moderating impact of the environment context
In the information management literature, Software-as-a-Service (SaaS) is recognized as a
technology capable of providing operational and financial benefits to firms, and it is rising as …
technology capable of providing operational and financial benefits to firms, and it is rising as …
Assessing common method bias: Problems with the ULMC technique
Recent work, in journals such as MIS Quarterly and Management Science, has highlighted
the importance of evaluating the influence of common method bias (CMB) on the results of …
the importance of evaluating the influence of common method bias (CMB) on the results of …
An empirical analysis to assess the determinants of SaaS diffusion in firms
We propose a conceptual model for assessing the determinants of SaaS diffusion process
(ie intention, adoption, and routinization). The conceptual model is based on three important …
(ie intention, adoption, and routinization). The conceptual model is based on three important …
If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security
SR Boss, LJ Kirsch, I Angermeier… - European Journal of …, 2009 - Taylor & Francis
Abstract Information security has become increasingly important to organizations. Despite
the prevalence of technical security measures, individual employees remain the key link …
the prevalence of technical security measures, individual employees remain the key link …
Investigating the security divide between SME and large companies: How SME characteristics influence organizational IT security investments
M Heidt, JP Gerlach, P Buxmann - Information Systems Frontiers, 2019 - Springer
Lagging IT security investments in small and medium-sized enterprises (SME) point towards
a security divide between SME and large enterprises, yet our structured literature review …
a security divide between SME and large enterprises, yet our structured literature review …
Fostering information security compliance as organizational citizenship behavior
Abstract Information security is heightened when employees develop a strong sense of
information stewardship for information assets, a form of organizational citizenship behavior …
information stewardship for information assets, a form of organizational citizenship behavior …