Found: 6
Select item for more details and to access through your institution.
Targeting Target with a 100 million dollar data breach.
- Published in:
- Journal of Information Technology Teaching Cases, 2018, v. 8, n. 1, p. 9, doi. 10.1057/s41266-017-0028-0
- By:
- Publication type:
- Article
Harvesting External Data: The Potential of Digital Data Streams.
- Published in:
- MIS Quarterly Executive, 2013, v. 12, n. 1, p. 53
- By:
- Publication type:
- Article
Conceptualization, Operationalization, and Validation of the Digital Data Stream Readiness Index.
- Published in:
- Journal of Global Information Management, 2018, v. 26, n. 4, p. 92, doi. 10.4018/JGIM.2018100106
- By:
- Publication type:
- Article
Zoorate: Certifying Online Consumer Reviews to Create Value.
- Published in:
- Communications of the Association for Information Systems, 2018, v. 43, p. 494, doi. 10.17705/1CAIS.04328
- By:
- Publication type:
- Article
Digital Data Streams: CREATING VALUE FROM THE REAL-TIME FLOW OF BIG DATA.
- Published in:
- California Management Review, 2016, v. 58, n. 3, p. 5, doi. 10.1525/cmr.2016.58.3.5
- By:
- Publication type:
- Article
Improving scale adaptation practices in information systems research: Development and validation of a cognitive validity assessment method.
- Published in:
- Information Systems Journal, 2023, v. 33, n. 4, p. 842, doi. 10.1111/isj.12428
- By:
- Publication type:
- Article