• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4719667)   Today's Articles (1067)
For: Chen H, Li Y, Chen L, Yin J. Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): the roles of information security-related conflict and fatigue. JEIM 2020;34:770-92. [DOI: 10.1108/jeim-10-2019-0318] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Number Cited by Other Article(s)
1
Lyu T, Guo Y, Chen H. Understanding people's intention to use facial recognition services: the roles of network externality and privacy cynicism. INFORMATION TECHNOLOGY & PEOPLE 2023. [DOI: 10.1108/itp-10-2021-0817] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 03/18/2023]
2
Palanisamy R, Norman AA, Mat Kiah ML. Employees’ BYOD Security Policy Compliance in the Public Sector. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2023. [DOI: 10.1080/08874417.2023.2178038] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 03/06/2023]
3
Goel L, Zhang JZ, Williamson S. Work-to-Home Cybersecurity Spillover: Construct Development and Validation. INFORMATION SYSTEMS MANAGEMENT 2022. [DOI: 10.1080/10580530.2022.2128116] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
4
Chen H, Liu M, Lyu T. Understanding employees’ information security–related stress and policy compliance intention: the roles of information security fatigue and psychological capital. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-03-2022-0047] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
5
Seedoyal Doargajudhur M, Hosanoo Z. The mobile technological era: insights into the consequences of constant connectivity of personal devices by knowledge workers. INFORMATION TECHNOLOGY & PEOPLE 2022. [DOI: 10.1108/itp-08-2021-0593] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
6
BYOD Security: A Study of Human Dimensions. INFORMATICS 2022. [DOI: 10.3390/informatics9010016] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
7
Palanisamy R, Norman AA, Mat Kiah L. BYOD Security Risks and Mitigation Strategies: Insights from IT Security Experts. JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE 2022. [DOI: 10.1080/10919392.2022.2028530] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA