Works matching Data breach
1
- Journal of Information Policy, 2020, v. 10, p. 45, doi. 10.5325/jinfopoli.10.2020.0045
- Bisogni, Fabio;
- Asghari, Hadi
- Article
2
- Lawyer Quarterly, 2020, n. 4, p. 476
- Article
3
- Journal of International & Comparative Law, 2023, v. 10, n. 1, p. 87
- Article
4
- Journal of Management Information Systems, 2024, v. 41, n. 4, p. 1042, doi. 10.1080/07421222.2024.2415774
- Nikkhah, Hamid Reza;
- Grover, Varun
- Article
5
- Online Journal of Applied Knowledge Management, 2021, v. 9, n. 1, p. 31
- Article
6
- International Journal of Healthcare Information Systems & Informatics, 2014, v. 9, n. 1, p. 42, doi. 10.4018/ijhisi.2014010103
- Kamoun, Faouzi;
- Nicho, Mathew
- Article
7
- Applied Sciences (2076-3417), 2021, v. 11, n. 8, p. 3678, doi. 10.3390/app11083678
- Algarni, Abdullah M.;
- Thayananthan, Vijey;
- Malaiya, Yashwant K.;
- Vaccaro, Ugo
- Article
8
- 2021
- Lee, Jinhyung;
- Choi, Sung J
- journal article
9
- MIS Quarterly, 2022, v. 46, n. 4, p. 2163, doi. 10.25300/MISQ/2022/16609
- Nikkhah, Hamid Reza;
- Grover, Varun
- Article
10
- Journal of Finance & Data Science, 2022, v. 8, p. 202, doi. 10.1016/j.jfds.2022.08.001
- Ashraf, Musaib;
- (Xuefeng) Jiang, John;
- Yanyan Wang, Isabel
- Article
11
- Journal of Consumer Affairs, 2023, v. 57, n. 3, p. 1089, doi. 10.1111/joca.12554
- Markos, Ereni;
- Peña, Priscilla;
- Labrecque, Lauren I.;
- Swani, Kunal
- Article
12
- Healthcare (2227-9032), 2020, v. 8, n. 2, p. 133, doi. 10.3390/healthcare8020133
- Seh, Adil Hussain;
- Zarour, Mohammad;
- Alenezi, Mamdouh;
- Sarkar, Amal Krishna;
- Agrawal, Alka;
- Kumar, Rajeev;
- Ahmad Khan, Raees
- Article
13
- Global Strategis, 2023, v. 17, n. 1, p. 153, doi. 10.20473/jgs.17.1.2023.153-182
- Sukmawan, Denny Indra;
- Setyawan, David Putra
- Article
14
- Information (2078-2489), 2023, v. 14, n. 11, p. 600, doi. 10.3390/info14110600
- Molitor, Dominik;
- Raghupathi, Wullianallur;
- Saharia, Aditya;
- Raghupathi, Viju
- Article
15
- Electronics (2079-9292), 2025, v. 14, n. 13, p. 2727, doi. 10.3390/electronics14132727
- Almosti, Abdulqawi Mohammed;
- Rahman, M. M. Hafizur
- Article
16
- International Journal of Electrical & Computer Engineering (2088-8708), 2025, v. 15, n. 3, p. 3162, doi. 10.11591/ijece.v15i3.pp3162-3170
- Ahmad, Siti Arpah;
- Mohd Khairuddin, Muhammad Al’Imran;
- Kamal Bashah, Nor Shahniza;
- Ab Raman, Nurul Aishah
- Article
17
- International Journal of Information Technology & Decision Making, 2018, v. 17, n. 2, p. 527, doi. 10.1142/S0219622017500432
- Albeshri, Aiiad;
- Thayananthan, Vijey
- Article
18
- Malaysia Journal Syariah & Law, 2024, v. 12, n. 1, p. 135, doi. 10.33102/mjsl.vol12no1.458
- Hanisah Shahul Ikram, Nur Adlin
- Article
19
- Computation, 2022, v. 10, n. 12, p. 208, doi. 10.3390/computation10120208
- Carfora, Maria Francesca;
- Orlando, Albina
- Article
20
- Journal of Business Finance & Accounting, 2024, v. 51, n. 9/10, p. 2709, doi. 10.1111/jbfa.12794
- Obaydin, Ivan;
- Xu, Limin;
- Zurbruegg, Ralf
- Article
21
- International Journal of Social Health Information Management, 2012, v. 5, n. 11, p. 1
- Garrison, Chlotia P.;
- Guy Posey, O.
- Article
22
- International Leadership Journal, 2020, v. 12, n. 2, p. 74
- Ballaro, Julie M.;
- Tyson, Brian;
- Buckles, Billy
- Article
23
- Information Security Journal: A Global Perspective, 2022, v. 31, n. 3, p. 346, doi. 10.1080/19393555.2021.2017522
- Article
24
- Journal of the Academy of Business Education, 2018, v. 19, p. 9
- Perri, David F.;
- Perri, Erinmichelle D.
- Article
25
- Strategy Science, 2020, v. 5, n. 2, p. 117, doi. 10.1287/stsc.2020.0106
- Say, GuiDeng;
- Vasudeva, Gurneeta
- Article
27
- European Data Protection Law Review (EDPL), 2024, v. 10, n. 2, p. 193, doi. 10.21552/edpl/2024/2/10
- Article
28
- Copernican Journal of Finance & Accounting, 2017, v. 6, n. 3, p. 63, doi. 10.12775/CJFA.2017.017
- Article
29
- Control & Cybernetics, 2024, v. 53, n. 2, p. 385, doi. 10.2478/candc-2024-0017
- Harkai, Alisa;
- Ciurea, Cristian Eugen
- Article
30
- Issues in Information Systems, 2019, v. 20, n. 3, p. 165
- Kirk, George;
- Noguera, Jose
- Article
31
- Issues in Information Systems, 2019, v. 20, n. 2, p. 162
- Ping Wang;
- D'Cruze, Hubert;
- Wood, David
- Article
32
- Issues in Information Systems, 2017, v. 18, n. 2, p. 136
- Article
33
- Issues in Information Systems, 2016, v. 17, n. 1, p. 107
- Green, David T.;
- Martin, Nancy L.
- Article
34
- Issues in Information Systems, 2015, v. 16, n. 4, p. 86
- Ford, Janet C.;
- White, Barbara Jo;
- White, Kristin M.
- Article
35
- Issues in Information Systems, 2015, v. 16, n. 2, p. 185
- Stachel, Richard D.;
- DeLaHaye, Marilyn
- Article
36
- Accounting & the Public Interest, 2023, v. 23, n. 1, p. 76, doi. 10.2308/API-2023-003
- Evans, Corey A.;
- Beyer, Brooke;
- Mason, Terry W.;
- West, Ashley N.
- Article
37
- Journal of Applied Security Research, 2017, v. 12, n. 4, p. 512, doi. 10.1080/19361610.2017.1354275
- Schuessler, Joseph H.;
- Nagy, Del;
- Fulk, H. Kevin;
- Dearing, Art
- Article
38
- International Journal of Cyber Criminology, 2011, v. 5, n. 1, p. 794
- Collins, Jason D.;
- Sainato, Vincenzo A.;
- Khey, David N.
- Article
39
- Journal of Management Information Systems, 2023, v. 40, n. 4, p. 1139, doi. 10.1080/07421222.2023.2267319
- Wang, Qian;
- Ngai, Eric W. T.;
- Pienta, Daniel;
- Thatcher, Jason Bennett
- Article
40
- Journal of Management Information Systems, 2018, v. 35, n. 2, p. 683, doi. 10.1080/07421222.2018.1451962
- Gwebu, Kholekile L.;
- Wang, Jing;
- Wang, Li
- Article
41
- Journal of Management Information Systems, 2015, v. 32, n. 2, p. 314, doi. 10.1080/07421222.2015.1063315
- Article
42
- Journal of Business Ethics, 2023, v. 187, n. 1, p. 199, doi. 10.1007/s10551-022-05107-z
- Chen, Jing;
- Henry, Elaine;
- Jiang, Xi
- Article
43
- Future Internet, 2024, v. 16, n. 6, p. 201, doi. 10.3390/fi16060201
- Rodrigues, Gabriel Arquelau Pimenta;
- Serrano, André Luiz Marques;
- Vergara, Guilherme Fay;
- Albuquerque, Robson de Oliveira;
- Nze, Georges Daniel Amvame
- Article
44
- Sustainability (2071-1050), 2022, v. 14, n. 10, p. 5866, doi. 10.3390/su14105866
- Strzelecki, Artur;
- Rizun, Mariia
- Article
45
- International Journal of Information Security & Privacy, 2011, v. 5, n. 4, p. 31, doi. 10.4018/jisp.2011100103
- Ngugi, Benjamin;
- Mana, Jafar;
- Segal, Lydia
- Article
46
- Western Journal of Communication, 2014, v. 78, n. 3, p. 337, doi. 10.1080/10570314.2013.866686
- Jenkins, Alexander;
- Anandarajan, Murugan;
- D'Ovidio, Rob
- Article
47
- Marketing Science, 2024, v. 43, n. 2, p. 440, doi. 10.1287/mksc.2019.0208
- Turjeman, Dana;
- Feinberg, Fred M.
- Article
48
- Journal of Managerial Issues, 2023, v. 35, n. 2, p. 170
- Erickson, Sheri L.;
- Stone, Mary;
- Serdar, Gokce;
- Pfeffer, Brooke
- Article
49
- Journal of the Academy of Marketing Science, 2017, v. 45, n. 2, p. 208, doi. 10.1007/s11747-016-0486-5
- Kashmiri, Saim;
- Nicol, Cameron;
- Hsu, Liwu
- Article
50
- Communications for Statistical Applications & Methods, 2020, v. 27, n. 4, p. 487, doi. 10.29220/CSAM.2020.27.4.487
- Hyunoo Shim;
- Changki Kim;
- Yang Ho Choi
- Article