//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
~accessRights:"restricted"
~person:"Breitner, Michael H."
~person:"Giudici, Paolo"
~person:"Leach, Thomas"
~person:"Lowry, Paul Benjamin"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: "Datensicherheit"
Narrow search
Delete all filters
| 5 applied filters
Year of publication
From:
To:
Subject
All
Data security
9
Datensicherheit
9
IT crime
4
IT-Kriminalität
4
Motivation
3
Risikomanagement
3
Risk management
3
information security
3
Business process management
2
Cloud Computing
2
Cloud computing
2
Financial sector
2
Finanzsektor
2
Leistungsmotivation
2
Prozessmanagement
2
Structural equation model
2
Strukturgleichungsmodell
2
Theorie
2
Theory
2
Work motivation
2
financial institutions
2
organizational security
2
protection motivation theory
2
Bank risk
1
Bankrisiko
1
Bitcoin
1
Central bank
1
Cloud services
1
Corporate security
1
Cyber cost
1
Cyber regulation
1
Cyber risk
1
Data Mining
1
Data mining
1
Dual-task interference
1
Employee retention
1
Financial institutions
1
Human-computer interaction (HCI)
1
Insider trading
1
Insiderhandel
1
more ...
less ...
Online availability
All
Undetermined
Free
11
Type of publication
All
Article
6
Book / Working Paper
3
Type of publication (narrower categories)
All
Article in journal
6
Aufsatz in Zeitschrift
6
Arbeitspapier
3
Graue Literatur
3
Non-commercial literature
3
Working Paper
3
Language
All
English
9
Author
All
Breitner, Michael H.
Giudici, Paolo
Leach, Thomas
Lowry, Paul Benjamin
Eling, Martin
9
Wang, Tawei
9
Chen, Hsinchun
7
Luo, Xin
7
Nemati, Hamid R.
6
Warkentin, Merrill
6
Dhillon, Gurpreet
5
Gambacorta, Leonardo
5
Gao, Lei
5
Gao, Xing
5
Gupta, Brij
5
Habibi Lashkari, Arash
5
Li, He
5
Vance, Anthony
5
Walton, Stephanie
5
Carayannis, Elias G.
4
Carley, Kathleen M.
4
Chatterjee, Dave
4
Chatterjee, Sheshadri
4
Chen, Yan
4
Gandal, Neil
4
Huang, Ken
4
Jawahar, M.
4
Kshetri, Nir
4
Martin, Kelly D.
4
Moody, Gregory D.
4
No, Won Gyun
4
Pinsker, Robert E.
4
Rao, H. Raghav
4
Samtani, Sagar
4
Smith, Sean Stein
4
Vrontis, Demetris
4
Alazab, Mamoun
3
Albastaki, Yousif
3
Aldasoro, Inaki
3
Aljawarneh, Shadi A.
3
Bauernhansl, Thomas
3
Calderon, Thomas G.
3
more ...
less ...
Published in...
All
Discussion papers / CEPR
3
Information systems research : ISR
2
Journal of management information systems : JMIS
2
Information & management : the internat. journal of management processes and systems ; journal of IFIP Users Group
1
Journal of financial stability
1
Source
All
ECONIS (ZBW)
9
Showing
1
-
9
of
9
Sort
relevance
articles prioritized
date (newest first)
date (oldest first)
1
Examining the differential effectiveness of fear appeals in information security management using two-stage meta-analysis
Lowry, Paul Benjamin
;
Moody, Gregory D.
;
Srikanth …
- In:
Journal of management information systems : JMIS
40
(
2023
)
4
,
pp. 1099-1138
Persistent link: https://www.econbiz.de/10014582250
Saved in:
2
Going beyond deterrence : a middle-range theory of motives and controls for insider computer abuse
Burns, A. J.
;
Roberts, Tom L.
;
Posey, Clay
;
Lowry, Paul …
- In:
Information systems research : ISR
34
(
2023
)
1
,
pp. 342-362
Persistent link: https://www.econbiz.de/10014323530
Saved in:
3
The drivers of cyber risk
Aldasoro, Iñaki
;
Gambacorta, Leonardo
;
Giudici, Paolo
; …
- In:
Journal of financial stability
60
(
2022
),
pp. 1-13
Persistent link: https://www.econbiz.de/10013455982
Saved in:
4
Cyber risk in central banking
Dörr, Sebastian
;
Gambacorta, Leonardo
;
Leach, Thomas
; …
-
2022
Persistent link: https://www.econbiz.de/10013435517
Saved in:
5
Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model
Chen, Yan
;
Galletta, Dennis
;
Lowry, Paul Benjamin
;
Luo, Xin
- In:
Information systems research : ISR
32
(
2021
)
3
,
pp. 1043-1065
Persistent link: https://www.econbiz.de/10012670537
Saved in:
6
Effects of the design of mobile security notifications and mobile app usability on users' security perceptions and continued use intention
Wu, Dezhi
;
Moody, Gregory D.
;
Zhang, Jun
;
Lowry, Paul …
- In:
Information & management : the internat. journal of …
57
(
2020
)
5
,
pp. 1-15
Persistent link: https://www.econbiz.de/10012293392
Saved in:
7
Operational and cyber risks in the financial sector
Aldasoro, Inaki
;
Gambacorta, Leonardo
;
Giudici, Paolo
; …
-
2020
Persistent link: https://www.econbiz.de/10012210493
Saved in:
8
The drivers of cyber risk
Aldasoro, Inaki
;
Gambacorta, Leonardo
;
Giudici, Paolo
; …
-
2020
Persistent link: https://www.econbiz.de/10012226285
Saved in:
9
The impact of organizational commitment on insiders’ motivation to protect organizational information assets
Posey, Clay
;
Roberts, Tom L.
;
Lowry, Paul Benjamin
- In:
Journal of management information systems : JMIS
32
(
2015
)
4
,
pp. 179-214
Persistent link: https://www.econbiz.de/10011491439
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->