Zobrazeno 1 - 10
of 52
pro vyhledávání: '"Siddhi Pittayachawan"'
Publikováno v:
International Journal of Technology, Vol 14, Iss 4, Pp 921-931 (2023)
Product–service systems (PSS) has become a major subject of concern for many industries because of their benefits and the possibilities to reduce negative environmental impacts and address environmental sustainability concerns. Despite the benef
Externí odkaz:
https://doaj.org/article/074962d188d64e62bb929a73b65a2511
Publikováno v:
International Journal of Operations & Production Management. 39:478-502
Purpose The purpose of this paper is to investigate how buyer–supplier social capital may help mitigate operational supply risk (OSR) of small- and medium-sized enterprises (SMEs). It empirically examines a framework that posits the direct and medi
Publikováno v:
Computers & Security. 112:102505
Organizations are increasingly prioritizing the management of information security (InfoSec) to facilitate their data-driven business. There are densely connected organizational networks in modern organizations, where both formal and informal leaders
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030335816
IRICT
IRICT
Companies increasingly recognise customer loyalty as one of the most important measures for the business of an organisation, and informed knowledge of factors underpinning customer loyalty may help managers build customer retention strategies. Teleco
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1b822483b4a2fff1ea6c1223b96bded5
https://doi.org/10.1007/978-3-030-33582-3_100
https://doi.org/10.1007/978-3-030-33582-3_100
Autor:
Xuequn Wang, Andy Weeger, Heiko Gewald, Otavio Prospero Sanchez, Siddhi Pittayachawan, Gerald Grant, Mahesh S. Raisinghani
Publikováno v:
Communications of the ACM. 60:62-69
Millennials entering the workforce ignore the risks of using privately owned devices on the job.
Publikováno v:
Information Systems Frontiers. 21:941-955
IT consumerization, or the end-user’s adoption of consumer IT for work purpose, is an emerging topic which recently attracted the attention of researchers and practitioners. This research adopted social network analysis techniques to investigate th
Publikováno v:
Computers & Security. 70:111-123
While prior research has been examining information security behaviours in mature environments with formal policies and practices, there is less attention paid to new or transforming environments that lack security controls. It is crucial to understa
Publikováno v:
International Journal of Systems and Society. 4:22-43
As modern organisations are using strategic information systems as their competitive advantage, the management of information security (IS) is regarded as a top priority. However, technical measures are no longer sufficient for protecting IS, and the
Publikováno v:
Information & Management. 54:625-637
As organisations are developing people-centric security workplaces, where proactive security behaviours are fostered, it is important to understand more about the sources of security influence. This research applied social network analysis methods to
Publikováno v:
Computers & Security. 68:1-15
The rapid digital transformation and technological disruption in modern organisations demand the development of people-centric security workplaces, whereby the employees can build up their security awareness and accountability for their actions via p