Zobrazeno 1 - 10
of 44
pro vyhledávání: '"Kent Marett"'
Publikováno v:
Proceedings of the Annual Hawaii International Conference on System Sciences.
Publikováno v:
Journal of Small Business Management. 58:390-408
Family firm leaders are often faced with conflicting pressures and goals. One such situation occurs when deciding whether to pursue professionalized management of a business function as opp...
Publikováno v:
Journal of Information Systems. 34:135-149
Computer abuse by employees has increased the potential for security vulnerabilities for organizations. Organizations have established various security countermeasures to prevent computer abuse and protect organizational information. However, these p
Autor:
Kent Marett, Tim Barnett
Publikováno v:
Information Resources Management Journal. 32:76-93
Small to medium-sized enterprises (SMEs) in North America do not always adequately address security. Based on responses from 232 SME owners and managers, the authors found that the adoption of security recommendations made by experts appear to be sig
Publikováno v:
Computers & Security. 80:25-35
Much research attention has been given to the behavioral outcomes of warning computer users about potential threats to their information security, primarily through the use of fear appeal messaging. This study explores not only the use of other types
Virtual Lies and Digital Truths: A Review of Research on Deception in Online Communication reviews previous research that lies at the intersection of deception and computer-mediated communication and examines future directions that this research may
Autor:
Kent Marett, Tim Barnett
Publikováno v:
Research Anthology on Privatizing and Securing Data ISBN: 9781799889540
Research Anthology on Small Business Strategies for Success and Survival ISBN: 9781799891550
Research Anthology on Small Business Strategies for Success and Survival ISBN: 9781799891550
Small to medium-sized enterprises (SMEs) in North America do not always adequately address security. Based on responses from 232 SME owners and managers, the authors found that the adoption of security recommendations made by experts appear to be sig
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7b0c0f3a1108a57148d3fe1c15a75898
https://doi.org/10.4018/978-1-7998-8954-0.ch099
https://doi.org/10.4018/978-1-7998-8954-0.ch099
Publikováno v:
Journal of Family Business Management. 8:22-37
PurposeOne of the key characteristics that distinguishes the family business from other firms is the importance of accruing and maintaining socioemotional wealth (SEW). Using an experimental design, this exploratory study investigates the communicati
Autor:
Kent Marett, Misty Nabors
Publikováno v:
Information & Management. 58:103482
The prevalence of security threats like ransomware continues to increase and victimize a wide range of targets, which includes municipal information systems. These attacks are commonly reported in media outlets available in attacked communities. This
Publikováno v:
Computers in Human Behavior. 75:834-844
Deceptive communication is a part of everyday life, regardless of one's geographical location or method of communication. Very little research has examined the role of espoused cultural values in the preferences that individuals hold when considering