Browse/Search Results: 1-8 of 8

Selected(0)Clear Items/Page:    Sort:
A trustworthiness-based vehicular recruitment scheme for information collections in Distributed Networked Systems Journal article
Information Sciences,2021, volume: 545, pages: 65-81
Authors:  Li, Ting;  Liu, Anfeng;  Xiong, Neal N.;  Zhang, Shaobo;  Wang, Tian
Favorite  |  View/Download:5/0  |  Submit date:2021/12/02
The effects of moral disengagement and organizational ethical climate on insiders’ information security policy violation behavior Journal article
Information Technology and People,2019, volume: 32, issue: 4, pages: 973-992
Authors:  Chen, Hao;  Chau, Patrick Y. K.;  Li, Wenli
Favorite  |  View/Download:1/0  |  Submit date:2023/05/19
Protected Bidding Against Compromised Information Injection in IoT-Based Smart Grid Conference paper
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Niagara Falls, U.S.A., JUL 11, 2018
Authors:  Bhuiyan, Md Zakirul Alam;  Zaman, Mdaliuz;  Wang, Guojun;  Wang, Tian;  Rahman, Md Arafat
Favorite  |  View/Download:2/0  |  Submit date:2021/12/02
Web Information Systems Engineering – WISE 2017 – 18th International Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part II Book
United States:Springer, 2017
Authors:  Bouguettaya, Athman;  Gao, Yunjun;  Klimenko, Andrey;  Chen, Lu;  Zhang, Xiangliang
Favorite  |  View/Download:5/0  |  Submit date:2021/09/30
Web Information Systems Engineering – WISE 2017 – 18th International Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part I Book
United States:Springer, 2017
Authors:  Bouguettaya, Athman;  Gao, Yunjun;  Klimenko, Andrey;  Chen, Lu;  Zhang, Xiangliang
Favorite  |  View/Download:3/0  |  Submit date:2021/09/30
Developing a typological theory using a quantitative approach: A case of information security deviant behavior Journal article
Communications of the Association for Information Systems,2015, volume: 37, pages: 510-535
Authors:  Chu, Amanda M. Y.;  Chau, Patrick Y. K.;  So, Mike K. P.
Favorite  |  View/Download:2/0  |  Submit date:2023/05/19
Development and validation of instruments of information security deviant behavior Journal article
Decision Support Systems,2014, volume: 66, pages: 93-101
Authors:  Chu, Amanda M. Y.;  Chau, Patrick Y. K.
Favorite  |  View/Download:3/0  |  Submit date:2023/05/19
Enhancement of a lightweight RFID security protocol Journal article
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China,2007, volume: 36, issue: 6, pages: 1172-1178+1186
Authors:  Luo, Zongwei;  Zhou, Shijie;  Li, Jenny
Favorite  |  View/Download:4/0  |  Submit date:2021/11/25