111 – 120 of 135
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2016
-
Mark
Executing Boolean queries on an encrypted Bitmap index
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Information security management : ANP based approach for risk analysis and decision making
(
- Contribution to journal › Article
-
Mark
Why companies change privacy policies : A principal-agent perspective
2016) 49th Annual Hawaii International Conference on System Sciences, HICSS 2016 2016-March. p.4849-4858(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Community engagement : The ‘last mile’ challenge for European research e-infrastructures
(
- Contribution to journal › Article
-
Mark
Bridging the gap between theory and practice : Socio-technical toolbox
(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Netsourcing strategies for vendors : A resource-based and transaction cost economics perspective
(
- Contribution to journal › Article
-
Mark
Using grounded theory method in information systems : The researcher as blank slate and other myths
2016) p.129-156(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Grounded Theory
2016) In The Wiley Blackwell-ICA international encyclopedias of communication(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Improving the customer experience in retail locations: The Game of Towns
2016)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2015
-
Mark
Understanding Security Practices Deficiencies: A Contextual Analysis
2015) Ninth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2015 p.151-160(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding