关注
John Windsor
John Windsor
在 unt.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
User's willingness to pay on social network sites
BO Han, J Windsor
Journal of computer information systems 51 (4), 31-40, 2011
2422011
Ethical decision making: A comparison of computer-supported and face-to-face group
JJ Cappel, JC Windsor
Journal of Business Ethics 28, 95-107, 2000
992000
Knowledge management and the creation of business value
M Mousavizadeh, S Ryan, G Harden, J Windsor
Journal of Computer Information Systems 55 (4), 35-45, 2015
842015
Organizational practices that foster knowledge sharing: Validation across distinct national cultures
SD Ryan, JC Windsor, B Ibragimova, VR Prybutok
Informing Science 13, 139, 2010
842010
Understanding the antecedents of knowledge sharing: An organizational justice perspective
B Ibragimova, SD Ryan, JC Windsor, VR Prybutok
Informing Science 15, 183, 2012
772012
Building a knowledge base for MIS research: A meta-analysis of a systems success model
MI Hwang, JC Windsor, A Pryor
Information Resources Management Journal (IRMJ) 13 (2), 26-32, 2000
702000
An investigation of the smartphone user's in–game purchase intention
B Han, J Windsor
International Journal of Mobile Communications 11 (6), 617-635, 2013
532013
User's adoption of free third-party security apps
B Han, YA Wu, J Windsor
Journal of Computer Information Systems 54 (3), 77-86, 2014
482014
A comparative investigation of ethical decision making: Information systems professionals versus students
JJ Cappel, JC Windsor
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 29 (2 …, 1998
481998
Risks and effects of IS/IT outsourcing: a securities market assessment
DA Peak, JC Windsor, C James
Journal of Information Technology Case and Application Research 4 (1), 6-33, 2002
462002
Definition and multidimensionality of security awareness: Close encounters of the second order
B Hanus, JC Windsor, Y Wu
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 49 (SI …, 2018
372018
A comparative study of moral reasoning
JC WINDSOR, JJ CAPPEL
College Student Journal 33 (2), 281-281, 1999
361999
Empirical evaluation of information security planning and integration
RF Young, J Windsor
Communications of the Association for Information Systems 26 (1), 13, 2010
342010
Factors affecting the adoption of knowledge management technologies: An international perspective
SD Ryan, GR Abitia, JC Windsor
AMCIS 2000 proceedings, 197, 2000
342000
An empirical assessment of a multimedia executive support system
AH Huang, JC Windsor
Information & Management 33 (5), 251-262, 1998
341998
Influence of social context and affect on individuals' implementation of information security safeguards
Y Wu
ICIS 2009 Proceedings, 70, 2009
232009
Security awareness programs
CS Guynes, J Windsor
The Review of Business Information Systems (Online) 16 (4), 165, 2012
212012
Maintaining quality in information systems
TL Fox, CS Guynes, VR Prybutok, J Windsor
Journal of Computer Information Systems 40 (1), 76-80, 1999
201999
Determinants of software volatility: a field study
X Zhang, J Windsor, R Pavur
Journal of Software Maintenance and Evolution: Research and Practice 15 (3 …, 2003
152003
E-commerce/network security considerations
CS Guynes, YA Wu, J Windsor
International Journal of Management & Information Systems (IJMIS) 15 (2), 1-8, 2011
122011
系统目前无法执行此操作,请稍后再试。
文章 1–20