Government surveillance disclosures, bilateral trust and Indonesia–Australia cross-border security cooperation: Social network analysis of Twitter data Fulltext Access 11 Pages 2015
Acquisition and analysis of compromised firmware using memory forensics Fulltext Access 11 Pages 2015
SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code Fulltext Access 11 Pages 2015
Subjective well-being measurement based on Chinese grassroots blog text sentiment analysis Fulltext Access 11 Pages 2015
Citizens' engagement on local governments' Facebook sites. An empirical analysis: The impact of different media and content types in Western Europe Fulltext Access 11 Pages 2015
Variability in the use of mobile ICTs by homeworkers and its consequences for boundary management and social isolation Fulltext Access 11 Pages 2015
Handle with care: How online social network providers’ privacy policies impact users’ information sharing behavior Fulltext Access 11 Pages 2015
Learning to cope with information security risks regarding mobile device loss or theft: An empirical examination Fulltext Access 12 Pages 2015
Examining how firms leverage IT to achieve firm productivity: RBV and dynamic capabilities perspectives Fulltext Access 12 Pages 2015
Strategic opportunities (and challenges) of algorithmic decision-making: A call for action on the long-term societal effects of ‘datification’ Fulltext Access 12 Pages 2015
Personalized recommendations based on time-weighted overlapping community detection Fulltext Access 12 Pages 2015
DFBotKiller: Domain-flux botnet detection based on the history of group activities and failures in DNS traffic Fulltext Access 12 Pages 2015
Characterization of the windows kernel version variability for accurate memory analysis Fulltext Access 12 Pages 2015
Intrinsically motivating employees’ online knowledge sharing: Understanding the effects of job design Fulltext Access 12 Pages 2015
Shill bidding: Empirical evidence of its effectiveness and likelihood of detection in online auction systems Fulltext Access 13 Pages 2015
Understanding News 2.0: A framework for explaining the number of comments from readers on online news Fulltext Access 13 Pages 2015
Customer integration and operational performance: The mediating role of information quality Fulltext Access 13 Pages 2015
How should the Chinese government provide information services for Mongol ethnic minority? Fulltext Access 13 Pages 2015
Forensic implications of System Resource Usage Monitor (SRUM) data in Windows 8 Fulltext Access 13 Pages 2015
BrowStEx: A tool to aggregate browser storage artifacts for forensic analysis Fulltext Access 13 Pages 2015
Understanding Knowledge Management System antecedents of performance impact: Extending the Task-technology Fit Model with intention to share knowledge construct Fulltext Access 13 Pages 2015
Automated event and social network extraction from digital evidence sources with ontological mapping Fulltext Access 13 Pages 2015
Public opinion on National Security Agency surveillance programs: A multi-method approach Fulltext Access 13 Pages 2015
Transferring methods to teach business administration from one cultural context to another Fulltext Access 14 Pages 2015
An investigation of anonymous and spoof SMS resources used for the purposes of cyberstalking Fulltext Access 14 Pages 2015
A study on JPEG steganalytic features: Co-occurrence matrix vs. Markov transition probability matrix Fulltext Access 14 Pages 2015
Business value of social media technologies: Evidence from online user innovation communities Fulltext Access 15 Pages 2015
The impacts of technological environments and co-creation experiences on customer participation Fulltext Access 15 Pages 2015
Resistance to crowdfunding among entrepreneurs: An impression management perspective Fulltext Access 15 Pages 2015
External reputational penalties for CEOs and CFOs following information technology material weaknesses Fulltext Access 15 Pages 2015
Communicational ambidexterity as a new capability to manage social media communication within organizations Fulltext Access 16 Pages 2015
How do firms influence open source software communities? A framework and empirical analysis of different governance modes Fulltext Access 16 Pages 2015
Testing the relationship between constraints management and capacity utilization of tea processing firms: Evidence from Kenya Fulltext Access 16 Pages 2015
Leveraging integrated information systems to enhance strategic flexibility and performance: The enabling role of enterprise risk management Fulltext Access 16 Pages 2015
Institutional pressures in security management: Direct and indirect influences on organizational investment in information security control resources Fulltext Access 16 Pages 2015
Effectiveness of corporate social media activities in increasing relational outcomes Fulltext Access 16 Pages 2015
External auditors' perceptions of cloud computing adoption in Australia Fulltext Access 17 Pages 2015
Managing potentially disruptive innovations in software companies: Transforming from On-premises to the On-demand Fulltext Access 17 Pages 2015
Design for social media engagement: Insights from elderly care assistance Fulltext Access 18 Pages 2015
Strategies and symbolism in the adoption of organizational social networking systems Fulltext Access 18 Pages 2015
The interplay between evidence and judgment in the IT project prioritization process Fulltext Access 18 Pages 2015
Massively multiplayer online game addiction: Instrument development and validation Fulltext Access 18 Pages 2015
Social innovations in outsourcing: An empirical investigation of impact sourcing companies in India Fulltext Access 19 Pages 2015
Determinants of corporate risk disclosure in large Spanish companies: a snapshot Fulltext Access 19 Pages 2015
Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information Fulltext Access 19 Pages 2015
When the world isn't always flat: The impact of psychological distance on auditors' reliance on specialists Fulltext Access 19 Pages 2015
A qualitative study of business-to-business electronic commerce adoption within the Indonesian grocery industry: A multi-theory perspective Fulltext Access 19 Pages 2015
Attitudes towards money and motivational orientation to work in Brazilian young workers Fulltext Access 20 Pages 2015
“These days will never be forgotten …”: A critical mass approach to online activism Fulltext Access 20 Pages 2015
Cloud forensics: Technical challenges, solutions and comparative analysis Fulltext Access 20 Pages 2015
An information security control assessment methodology for organizations' financial information Fulltext Access 20 Pages 2015
A minimum variance benchmark to measure the performance of pension funds in Mexico Fulltext Access 22 Pages 2015
The venues of high tech prediction: Presenting the future at industry analyst conferences Fulltext Access 22 Pages 2015
The state of case study approach in mergers and acquisitions literature: A bibliometric analysis Fulltext Access 22 Pages 2015
What’s in IT for employees? Understanding the relationship between use and performance in enterprise social software Fulltext Access 23 Pages 2015
Information technology investment governance: What is it and does it matter? Fulltext Access 25 Pages 2015
Drift and shift in the organizing vision career for personal health records: An investigation of innovation discourse dynamics Fulltext Access 31 Pages 2015
Complex stylized facts of the Mexican economy: a hirschmanian perspective (to attack the “fear of growing”, more and better) Fulltext Access 35 Pages 2015
Diffusion of e-government: A literature review and directions for future directions Fulltext Access 6 Pages 2014
Persistence of the middle mile problem for rural local exchange carriers Fulltext Access 6 Pages 2014
Patient participation in discharge planning decisions in the frame of Primary Nursing approach: A conversation analytic study Fulltext Access 7 Pages 2014
When virtual reality meets realpolitik: Social media shaping the Arab government–citizen relationship Fulltext Access 7 Pages 2014
The impact of government form on e-participation: A study of New Jersey municipalities Fulltext Access 7 Pages 2014
Transparency of Transparency: The pro-active disclosure of the rules governing Access to Information as a gauge of organisational cultural transformation. The case of the Swiss transparency regime Fulltext Access 7 Pages 2014
“Offer No Readymade Solutions”: Men's support provision in specific episodes with an upset friend Fulltext Access 7 Pages 2014
Next generation network environments in Europe — The significance of the EU as a policy actor Fulltext Access 8 Pages 2014
Cognition and interpersonal communication: The effect of voice quality on information processing and person perception Fulltext Access 8 Pages 2014
A preliminary test of a relational goal pursuit theory of obsessive relational intrusion and stalking Fulltext Access 8 Pages 2014
Intergenerational contacts online: An exploratory study of cross-generational Facebook “friendships” Fulltext Access 8 Pages 2014
Online representation of Switzerland as a tourism destination: An exploratory research on a Chinese microblogging platform Fulltext Access 8 Pages 2014
e-Government legislation: Implementation issues for programs for low-income people Fulltext Access 8 Pages 2014
Not by technology alone: The “analog” aspects of online public engagement in policymaking Fulltext Access 8 Pages 2014
A critical examination of social media adoption in government: Introducing omnipresence Fulltext Access 8 Pages 2014
Quality assessment of service bundles for governmental one-stop portals: A literature review Fulltext Access 8 Pages 2014
The strategic importance of information policy for the contemporary neoliberal state: The case of Open Government Data in the United Kingdom Fulltext Access 8 Pages 2014
Predictors of on-line services and e-participation: A cross-national comparison Fulltext Access 8 Pages 2014
Communication accommodation in a divided society: Interaction patterns between Protestants and Catholics in Northern Ireland Fulltext Access 8 Pages 2014
The Pragmatic Metamodel of Communication: A cultural approach to interaction Fulltext Access 8 Pages 2014
Web application vulnerability assessment and policy direction towards a secure smart government Fulltext Access 8 Pages 2014
The circular continuum of agencies, public libraries, and users: A model of e-government in practice Fulltext Access 8 Pages 2014
Using open government data to predict war: A case study of data and systems challenges Fulltext Access 9 Pages 2014
Understanding the e-government paradox: Learning from literature and practice on barriers to adoption Fulltext Access 9 Pages 2014