Found: 17
Select item for more details and to access through your institution.
Using Sustainability Reports as a Method of Cause- Related Marketing for Competitive Advantage.
- Published in:
- International Journal of Social Ecology & Sustainable Development, 2013, v. 4, n. 2, p. 16, doi. 10.4018/jsesd.2013040102
- By:
- Publication type:
- Article
The Business Value of Green IT in Price Premiums.
- Published in:
- Journal of Strategic Innovation & Sustainability, 2010, v. 6, n. 4, p. 9
- By:
- Publication type:
- Article
Sharing information and building trust through value congruence.
- Published in:
- Information Systems Frontiers, 2007, v. 9, n. 5, p. 515, doi. 10.1007/s10796-007-9051-6
- By:
- Publication type:
- Article
The Impact of Consumer Perceptions of Information Privacy and Security Risks on the Adoption of Residual RFID Technologies.
- Published in:
- Communications of the Association for Information Systems, 2008, v. 23, p. 235, doi. 10.17705/1CAIS.02314
- By:
- Publication type:
- Article
A practical validation study of a commercial accelerometer using good and poor sleepers.
- Published in:
- Health Psychology Open, 2016, v. 3, n. 2, p. 1, doi. 10.1177/2055102916679012
- By:
- Publication type:
- Article
Results of an International Survey for Risk Assessment of Honey Bee Health Concerning Varroa Management.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 1, p. 62, doi. 10.3390/app13010062
- By:
- Publication type:
- Article
A Study of Hard Drive Forensics on Consumers' PCs: Data Recovery and Exploitation.
- Published in:
- Journal of Management Policy & Practice, 2011, v. 12, n. 1, p. 27
- By:
- Publication type:
- Article
Stories of Breast Cancer: Using Textual Analysis and Analytics to Understand Better the Illness Experience.
- Published in:
- International Journal of Multiple Research Approaches, 2020, v. 12, n. 2, p. 202, doi. 10.29034/ijmra.v12n2a3
- By:
- Publication type:
- Article
A Comprehensive Analysis of Beekeeping Risks and Validation of Biosecurity Measures against Major Infectious Diseases in Apis mellifera in Europe.
- Published in:
- Agriculture; Basel, 2024, v. 14, n. 3, p. 393, doi. 10.3390/agriculture14030393
- By:
- Publication type:
- Article
Data Analytics in the Hardwood Industry: The Impact of Automation and Optimization on Profits, Quality, and the Environment.
- Published in:
- International Journal of Business Analytics, 2014, v. 1, n. 4, p. 16, doi. 10.4018/ijban.2014100102
- By:
- Publication type:
- Article
Sustainability Reporting: Will Consumers Pay More to Purchase from Technology Companies Who Issue Sustainability Reports?
- Published in:
- Journal of Information Science & Technology, 2011, v. 8, n. 1, p. 1
- By:
- Publication type:
- Article
Password Collection through Social Engineering: An Analysis of a Simulated Attack.
- Published in:
- Journal of Information System Security, 2010, v. 6, n. 4, p. 53
- By:
- Publication type:
- Article
Moving from Forecast to Prediction: How Honors Programs Can Use Easily Accessible Predictive Analytics to Improve Enrollment Management.
- Published in:
- Journal of the National Collegiate Honors Council, 2017, v. 18, n. 2, p. 213
- By:
- Publication type:
- Article
Analyzing the Vulnerability of U.S. Hospitals to Social Engineering Attacks: How Many of Your Employees Would Share Their Password?
- Published in:
- International Journal of Information Security & Privacy, 2008, v. 2, n. 3, p. 71, doi. 10.4018/jisp.2008070106
- By:
- Publication type:
- Article
The Influence of Media Trust and Internet Trust on Privacy-Risking Uses of E-Health.
- Published in:
- International Journal of Information Security & Privacy, 2008, v. 2, n. 3, p. 84, doi. 10.4018/jisp.2008070107
- By:
- Publication type:
- Article
The Role of Privacy Risk in IT Acceptance: An Empirical Study.
- Published in:
- International Journal of Information Security & Privacy, 2007, v. 1, n. 2, p. 61, doi. 10.4018/jisp.2007040104
- By:
- Publication type:
- Article
An Empirical Investigation: Health Care Employee Passwords and Their Crack Times in Relationship to HIPAA Security Standards.
- Published in:
- International Journal of Healthcare Information Systems & Informatics, 2007, v. 2, n. 3, p. 39, doi. 10.4018/jhisi.2007070104
- By:
- Publication type:
- Article