Works matching Information Security Analyst
1
- Transformations in Business & Economics, 2022, v. 21, n. 2A, p. 514
- Yiqian Peng;
- Mengke Zhang;
- Xiaosong Zheng
- Article
2
- Journal of Accounting Research (Wiley-Blackwell), 1970, v. 8, n. 3, p. 49, doi. 10.2307/2674691
- Article
3
- Elementary STEM Journal, 2020, v. 25, n. 2, p. 35
- Article
4
- Elementary STEM Journal, 2020, v. 24, n. 4, p. 18
- Article
5
- SAGE Open, 2021, v. 11, n. 4, p. 1, doi. 10.1177/21582440211067218
- Lu, Ping;
- Li, Zhihong;
- Liu, Jianhui;
- Wang, Yunxuan
- Article
6
- Accounting Review, 2020, v. 95, n. 3, p. 59, doi. 10.2308/accr-52524
- Bhagwat, Vineet;
- Liu, Xiaoding
- Article
7
- Management Science, 2021, v. 67, n. 1, p. 617, doi. 10.1287/mnsc.2019.3435
- Mao, Connie X.;
- Song, Wei-Ling
- Article
8
- HOLOS, 2015, v. 31, n. 3, p. 354, doi. 10.15628/holos.2015.2719
- RODRIGUES, S. V.;
- GARCIA, E. A. R.;
- XIMENES, P. K. M.;
- MOURA, H. J.
- Article
9
- Southwestern Economic Review, 2018, v. 45, p. 33
- Article
10
- Journal of Accounting Research (Wiley-Blackwell), 1994, v. 32, n. 2, p. 290, doi. 10.2307/2491287
- Elgers, Pieter T.;
- Lo, May H.
- Article
11
- International Journal of Information Security & Cybercrime, 2014, v. 3, n. 1, p. 29, doi. 10.19107/ijisc.2014.01.03
- BARBU, Ionuţ-Daniel;
- PASCARIU, Cristian
- Article
12
- Journal of Financial Research, 1994, v. 17, n. 3, p. 387, doi. 10.1111/j.1475-6803.1994.tb00200.x
- Ackert, Lucy F.;
- Hunter, William C.
- Article
13
- European Accounting Review, 2021, v. 30, n. 4, p. 767, doi. 10.1080/09638180.2020.1791725
- Han, Hongwen;
- Tang, Jiali Jenna;
- Tang, Qingquan
- Article
14
- ISSA Journal, 2016, v. 14, n. 10, p. 31
- Article
15
- Accounting Review, 1977, v. 52, n. 2, p. 513
- Article
16
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 3, p. 518, doi. 10.3390/jcp4030025
- Bratsas, Charalampos;
- Anastasiadis, Efstathios Konstantinos;
- Angelidis, Alexandros K.;
- Ioannidis, Lazaros;
- Kotsakis, Rigas;
- Ougiaroglou, Stefanos
- Article
17
- Journal of Accounting Research (Wiley-Blackwell), 1970, v. 8, n. 3, p. 55, doi. 10.2307/2674692
- Article
18
- Financial Management (Wiley-Blackwell), 2000, v. 29, n. 1, p. 78, doi. 10.2307/3666363
- D'Mello, Ranjan;
- Ferris, Stephen P.
- Article
19
- Financial Analysts Journal, 1982, v. 38, n. 6, p. 7
- Article
20
- Financial Analysts Journal, 1981, v. 37, n. 3, p. 17
- Article
21
- Financial Analysts Journal, 1977, v. 33, n. 2, p. 77
- Lilley, Theodore R.;
- Herman, Mildred M.
- Article
22
- Financial Analysts Journal, 1974, v. 30, n. 1, p. 20
- Article
23
- Financial Analysts Journal, 1966, v. 22, n. 4, p. 19, doi. 10.2469/faj.v22.n4.19
- Article
24
- International Journal of Network Management, 2019, v. 29, n. 3, p. N.PAG, doi. 10.1002/nem.2065
- Lagraa, Sofiane;
- Chen, Yutian;
- François, Jérôme
- Article
25
- Abacus, 1977, v. 13, n. 2, p. 141, doi. 10.1111/j.1467-6281.1977.tb00306.x
- Chandra, Gyan;
- Greenball, Melvin N.
- Article
26
- Review of Finance, 2008, v. 12, n. 3, p. 533, doi. 10.1093/rof/rfm028
- Article
27
- Journal of Contemporary China, 2004, v. 13, n. 38, p. 129, doi. 10.1080/1067056032000151373
- Bolt, Paul J.;
- Brenner *, Carl N.
- Article
28
- Review of Accounting Studies, 2023, v. 28, n. 3, p. 1250, doi. 10.1007/s11142-023-09798-1
- Article
29
- International Journal of Information Security Science, 2013, v. 2, n. 2, p. 64
- Spathoulas, Georgios P.;
- Katsikas, Sokratis K.
- Article
30
- Regulation, 2005, v. 28, n. 2, p. 48
- Article
31
- Management Science, 2016, v. 62, n. 6, p. 1610, doi. 10.1287/mnsc.2015.2205
- Baum, Joel A. C.;
- Bowers, Anne;
- Mohanram, Partha
- Article
32
- Management Science, 2016, v. 62, n. 3, p. 682, doi. 10.1287/mnsc.2014.2145
- Gurun, Umit G.;
- Johnston, Rick;
- Markov, Stanimir
- Article
33
- Computers, Materials & Continua, 2023, v. 76, n. 2, p. 1423, doi. 10.32604/cmc.2023.035741
- Mohammad, Farah;
- Al-Ahmadi, Saad;
- Al-Muhtadi, Jalal
- Article
34
- Computers, Materials & Continua, 2023, v. 76, n. 2, p. 1423, doi. 10.32604/cmc.2023.035741
- Mohammad, Farah;
- Al-Ahmadi, Saad;
- Al-Muhtadi, Jalal
- Article
35
- Journal of Accounting, Auditing & Finance, 1994, v. 9, n. 3, p. 411, doi. 10.1177/0148558X9400900302
- Article
36
- Journal of Accounting, Auditing & Finance, 1992, v. 7, n. 1, p. 45, doi. 10.1177/0148558X9200700104
- Article
37
- Financial Analysts Journal, 1986, v. 42, n. 5, p. 9
- Article
38
- Financial Markets, Institutions & Instruments, 2023, v. 32, n. 4, p. 195, doi. 10.1111/fmii.12180
- Jiang, Yu;
- Lei, Adrian C. H.
- Article
39
- Wireless Networks (10220038), 2024, v. 30, n. 9, p. 7239, doi. 10.1007/s11276-023-03582-4
- Shakya, Vandana;
- Choudhary, Jaytrilok;
- Singh, Dhirendra Pratap
- Article
40
- Sociological Review, 2007, v. 55, n. 2, p. 13, doi. 10.1111/j.1467-954X.2007.00728.x
- Beunza, Daniel;
- Garud, Raghu
- Article
41
- Multimedia Tools & Applications, 2017, v. 76, n. 21, p. 22823, doi. 10.1007/s11042-017-4681-2
- Alnusair, Awny;
- Zhong, Chen;
- Rawashdeh, Majdi;
- Hossain, M.;
- Alamri, Atif
- Article
42
- International Journal of Micrographics & Optical Technology, 2008, v. 26, n. 1/2, p. 7
- Article
43
- International Journal of Micrographics & Optical Technology, 2007, v. 25, n. 1/2, p. 7
- Article
44
- Journal of Financial & Quantitative Analysis, 1996, v. 31, n. 4, p. 493, doi. 10.2307/2331357
- Article
45
- Journal of Financial & Quantitative Analysis, 1993, v. 28, n. 2, p. 273, doi. 10.2307/2331290
- Barber, Brad M.;
- Loeffler, Douglas
- Article
47
- Internal Auditor, 2020, v. 77, n. 5, p. 13
- Article
48
- Journal of Information Systems Education, 2022, v. 33, n. 3, p. 300
- Article
49
- Advances in Consumer Research, 1986, v. 13, n. 1, p. 469
- Jacoby, Jacob;
- Troutman, Tracy;
- Kuss, Alfred;
- Mazursky, David
- Article
50
- International Review of Finance, 2022, v. 22, n. 4, p. 669, doi. 10.1111/irfi.12364
- Article