Publisher: Emerald Group Publishing Limited

Related content
Volume 21, Number 3, 2013

< previous issue | all issues | next issue >

Favourites:Add to Favourites

A research framework for social commerce adoption
pp. 144-154(11)
Author: Hajli, Mahmood

Favourites:Add to Favourites

Push and pull effects of homeland information security incentives
pp. 155-176(22)
Authors: Koong, Kai S.; Merhi, Mohammad I.; Sun, Jun

Favourites:Add to Favourites

Democracy, culture and information security: a case study in Zanzibar
pp. 191-201(11)
Authors: Shaaban, Hussein; Conrad, Marc

Favourites:Add to Favourites

Resolving vulnerability identification errors using security requirements on business process models
pp. 202-223(22)
Authors: Taubenberger, Stefan; J├╝rjens, Jan; Yu, Yijun; Nuseibeh, Bashar

Share Content

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
Cookie Policy
ingentaconnect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more