Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Anand S Kunnathur"'
Autor:
Sindhuja P N, Anand S. Kunnathur
Publikováno v:
Information & Computer Security, 2015, Vol. 23, Issue 5, pp. 476-496.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-07-2014-0050
Publikováno v:
Journal of Database Management. 31:21-41
Past behavior research overwhelmingly focused on information security policy compliance and under explored the role of organizational context in shaping information security behaviors. To address this research gap, this study integrated two threads o
Publikováno v:
International Journal of Accounting & Information Management. 28:205-222
Purpose The purpose of this paper is to provide a conceptual understanding of Big Data practices in organizations, which will enable exploring the operational and strategic roles of Big Data in organizational performance. Design/methodology/approach
Autor:
Anand S. Kunnathur, Canchu Lin
Publikováno v:
Journal of Business Research. 105:49-60
Prior research articulated the importance of developing a big data analytics capability but did not show how to cultivate this development. Drawing on the literature on this topic, this study develops the concept of Big Data capability, which enhance
Publikováno v:
Research Anthology on Privatizing and Securing Data ISBN: 9781799889540
Past behavior research overwhelmingly focused on information security policy compliance and under explored the role of organizational context in shaping information security behaviors. To address this research gap, this study integrated two threads o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d81e02ac3dad425b2157f1bfc4dd6b2e
https://doi.org/10.4018/978-1-7998-8954-0.ch024
https://doi.org/10.4018/978-1-7998-8954-0.ch024
Autor:
Anand S. Kunnathur, Sindhuja P N
Publikováno v:
Information & Computer Security. 23:476-496
Purpose– This paper aims to discuss the need for management control system for information security management that encapsulates the technical, formal and informal systems. This motivated the conceptualization of supply chain information security f
Publikováno v:
Journal of International Management Studies. 13:87-96
Publikováno v:
Omega. 38:12-19
Consider the problem of granting boarding clearance for a large population of air travelers while ferreting out any potential terrorists and denying them entry, in a short time. It is assumed that the probability of having a terrorist in the group is
Publikováno v:
Information & Management. 46:357-363
While expected benefits have been seen as one of the main drivers of RFID adoption, there is little understanding of what benefits should be considered when exploring RFID adoption. Further, the relationships between expected benefits and the type of
IS outsourcing management competence dimensions: instrument development and relationship exploration
Publikováno v:
Information & Management. 42:901-919
In this paper, we discuss our investigation of IS outsourcing management competences, their relationships and measurement. First, three theoretical perspectives were applied to explain the nature of the IS outsourcing phenomenon. Second, IS outsourci