Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Virginia Commonwealth University" +contributor:("Gurpreet Dhillon"). Showing records 1 – 13 of 13 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Virginia Commonwealth University

1. Nasution, Muhamad Faisal Fariduddin Attar. Institutionalization of Information Security: Case of the Indonesian Banking Sector.

Degree: PhD, Information Systems, 2012, Virginia Commonwealth University

 This study focuses on the institutionalization of information security in the banking sector. This study is important to pursue since it explicates the internalization of… (more)

Subjects/Keywords: Information Systems Security; Information Security Governance; Institutionalization; Institutional Theory; Structuration Theory; Banking Sector; Business; Management Information Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nasution, M. F. F. A. (2012). Institutionalization of Information Security: Case of the Indonesian Banking Sector. (Doctoral Dissertation). Virginia Commonwealth University. Retrieved from https://doi.org/10.25772/X39B-JC68 ; https://scholarscompass.vcu.edu/etd/2825

Chicago Manual of Style (16th Edition):

Nasution, Muhamad Faisal Fariduddin Attar. “Institutionalization of Information Security: Case of the Indonesian Banking Sector.” 2012. Doctoral Dissertation, Virginia Commonwealth University. Accessed August 08, 2020. https://doi.org/10.25772/X39B-JC68 ; https://scholarscompass.vcu.edu/etd/2825.

MLA Handbook (7th Edition):

Nasution, Muhamad Faisal Fariduddin Attar. “Institutionalization of Information Security: Case of the Indonesian Banking Sector.” 2012. Web. 08 Aug 2020.

Vancouver:

Nasution MFFA. Institutionalization of Information Security: Case of the Indonesian Banking Sector. [Internet] [Doctoral dissertation]. Virginia Commonwealth University; 2012. [cited 2020 Aug 08]. Available from: https://doi.org/10.25772/X39B-JC68 ; https://scholarscompass.vcu.edu/etd/2825.

Council of Science Editors:

Nasution MFFA. Institutionalization of Information Security: Case of the Indonesian Banking Sector. [Doctoral Dissertation]. Virginia Commonwealth University; 2012. Available from: https://doi.org/10.25772/X39B-JC68 ; https://scholarscompass.vcu.edu/etd/2825


Virginia Commonwealth University

2. Susarapu, Santa Ram. ALIGNING SECURITY AND USABILITY OBJECTIVES FOR COMPUTER BASED INFORMATION SYSTEMS.

Degree: PhD, Information Systems, 2012, Virginia Commonwealth University

 With extensive use of information systems in day-to-day business operations, many organizations are facing challenges to develop robust computer-based information systems that are secure and… (more)

Subjects/Keywords: Security; Usability; Value; VFT; Keeney; Dhillon; Objectives; Means Objectives; Fundamental Objectives; Value Theory; Business; Management Information Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Susarapu, S. R. (2012). ALIGNING SECURITY AND USABILITY OBJECTIVES FOR COMPUTER BASED INFORMATION SYSTEMS. (Doctoral Dissertation). Virginia Commonwealth University. Retrieved from https://doi.org/10.25772/QPMT-0A73 ; https://scholarscompass.vcu.edu/etd/2866

Chicago Manual of Style (16th Edition):

Susarapu, Santa Ram. “ALIGNING SECURITY AND USABILITY OBJECTIVES FOR COMPUTER BASED INFORMATION SYSTEMS.” 2012. Doctoral Dissertation, Virginia Commonwealth University. Accessed August 08, 2020. https://doi.org/10.25772/QPMT-0A73 ; https://scholarscompass.vcu.edu/etd/2866.

MLA Handbook (7th Edition):

Susarapu, Santa Ram. “ALIGNING SECURITY AND USABILITY OBJECTIVES FOR COMPUTER BASED INFORMATION SYSTEMS.” 2012. Web. 08 Aug 2020.

Vancouver:

Susarapu SR. ALIGNING SECURITY AND USABILITY OBJECTIVES FOR COMPUTER BASED INFORMATION SYSTEMS. [Internet] [Doctoral dissertation]. Virginia Commonwealth University; 2012. [cited 2020 Aug 08]. Available from: https://doi.org/10.25772/QPMT-0A73 ; https://scholarscompass.vcu.edu/etd/2866.

Council of Science Editors:

Susarapu SR. ALIGNING SECURITY AND USABILITY OBJECTIVES FOR COMPUTER BASED INFORMATION SYSTEMS. [Doctoral Dissertation]. Virginia Commonwealth University; 2012. Available from: https://doi.org/10.25772/QPMT-0A73 ; https://scholarscompass.vcu.edu/etd/2866

3. Coss, David. Cloud Privacy Audit Framework: A Value-Based Design.

Degree: PhD, Business, 2013, Virginia Commonwealth University

  The rapid expansion of cloud technology provides enormous capacity, which allows for the collection, dissemination and re-identification of personal information. It is the cloud’s… (more)

Subjects/Keywords: Cloud Computing; Design Science; Privacy; Privacy Audit; Privacy Objectives; Value Focused Thinking; Business; Technology and Innovation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Coss, D. (2013). Cloud Privacy Audit Framework: A Value-Based Design. (Doctoral Dissertation). Virginia Commonwealth University. Retrieved from https://doi.org/10.25772/PB8G-KW38 ; https://scholarscompass.vcu.edu/etd/3106

Chicago Manual of Style (16th Edition):

Coss, David. “Cloud Privacy Audit Framework: A Value-Based Design.” 2013. Doctoral Dissertation, Virginia Commonwealth University. Accessed August 08, 2020. https://doi.org/10.25772/PB8G-KW38 ; https://scholarscompass.vcu.edu/etd/3106.

MLA Handbook (7th Edition):

Coss, David. “Cloud Privacy Audit Framework: A Value-Based Design.” 2013. Web. 08 Aug 2020.

Vancouver:

Coss D. Cloud Privacy Audit Framework: A Value-Based Design. [Internet] [Doctoral dissertation]. Virginia Commonwealth University; 2013. [cited 2020 Aug 08]. Available from: https://doi.org/10.25772/PB8G-KW38 ; https://scholarscompass.vcu.edu/etd/3106.

Council of Science Editors:

Coss D. Cloud Privacy Audit Framework: A Value-Based Design. [Doctoral Dissertation]. Virginia Commonwealth University; 2013. Available from: https://doi.org/10.25772/PB8G-KW38 ; https://scholarscompass.vcu.edu/etd/3106


Virginia Commonwealth University

4. Walton, Joseph B. Why We Use a New Currency: The Role of Trust and Control in Explaining the Perception and Usage of Bitcoin.

Degree: PhD, Public Policy & Administration, 2020, Virginia Commonwealth University

  Social media, e-commerce, global peer-to-peer technologies, and the near ubiquity of computers and smartphones allow people to interact, trust, and exchange value across traditional… (more)

Subjects/Keywords: bitcoin; cryptocurrency; trust; control; socio-economics; behavioral science; Behavioral Economics; Economic Theory; Public Policy; Technology and Innovation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Walton, J. B. (2020). Why We Use a New Currency: The Role of Trust and Control in Explaining the Perception and Usage of Bitcoin. (Doctoral Dissertation). Virginia Commonwealth University. Retrieved from https://scholarscompass.vcu.edu/etd/6348

Chicago Manual of Style (16th Edition):

Walton, Joseph B. “Why We Use a New Currency: The Role of Trust and Control in Explaining the Perception and Usage of Bitcoin.” 2020. Doctoral Dissertation, Virginia Commonwealth University. Accessed August 08, 2020. https://scholarscompass.vcu.edu/etd/6348.

MLA Handbook (7th Edition):

Walton, Joseph B. “Why We Use a New Currency: The Role of Trust and Control in Explaining the Perception and Usage of Bitcoin.” 2020. Web. 08 Aug 2020.

Vancouver:

Walton JB. Why We Use a New Currency: The Role of Trust and Control in Explaining the Perception and Usage of Bitcoin. [Internet] [Doctoral dissertation]. Virginia Commonwealth University; 2020. [cited 2020 Aug 08]. Available from: https://scholarscompass.vcu.edu/etd/6348.

Council of Science Editors:

Walton JB. Why We Use a New Currency: The Role of Trust and Control in Explaining the Perception and Usage of Bitcoin. [Doctoral Dissertation]. Virginia Commonwealth University; 2020. Available from: https://scholarscompass.vcu.edu/etd/6348


Virginia Commonwealth University

5. Tejay, Gurvirender. Shaping Strategic Information Systems Security Initiatives in Organizations.

Degree: PhD, Information Systems, 2008, Virginia Commonwealth University

 Strategic information systems security initiatives have seldom been successful. The increasing complexity of the business environment in which organizational security must be operationalized presents challenges.… (more)

Subjects/Keywords: Information systems security; Cultural analysis; Contextualism; Interpretive case study; Structuration theory; Action analysis; Business; Management Information Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tejay, G. (2008). Shaping Strategic Information Systems Security Initiatives in Organizations. (Doctoral Dissertation). Virginia Commonwealth University. Retrieved from https://doi.org/10.25772/WCJ0-9N95 ; https://scholarscompass.vcu.edu/etd/1576

Chicago Manual of Style (16th Edition):

Tejay, Gurvirender. “Shaping Strategic Information Systems Security Initiatives in Organizations.” 2008. Doctoral Dissertation, Virginia Commonwealth University. Accessed August 08, 2020. https://doi.org/10.25772/WCJ0-9N95 ; https://scholarscompass.vcu.edu/etd/1576.

MLA Handbook (7th Edition):

Tejay, Gurvirender. “Shaping Strategic Information Systems Security Initiatives in Organizations.” 2008. Web. 08 Aug 2020.

Vancouver:

Tejay G. Shaping Strategic Information Systems Security Initiatives in Organizations. [Internet] [Doctoral dissertation]. Virginia Commonwealth University; 2008. [cited 2020 Aug 08]. Available from: https://doi.org/10.25772/WCJ0-9N95 ; https://scholarscompass.vcu.edu/etd/1576.

Council of Science Editors:

Tejay G. Shaping Strategic Information Systems Security Initiatives in Organizations. [Doctoral Dissertation]. Virginia Commonwealth University; 2008. Available from: https://doi.org/10.25772/WCJ0-9N95 ; https://scholarscompass.vcu.edu/etd/1576


Virginia Commonwealth University

6. Mishra, Sushma. DEFINING VALUE BASED INFORMATION SECURITY GOVERNANCE OBJECTIVES.

Degree: PhD, Information Systems, 2008, Virginia Commonwealth University

 This research argues that the information security governance objectives should be grounded in the values of organizational members. Research literature in decision sciences suggest that… (more)

Subjects/Keywords: information security governance; value theory; value focussed approach; internal control; case study; Business; Management Information Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mishra, S. (2008). DEFINING VALUE BASED INFORMATION SECURITY GOVERNANCE OBJECTIVES. (Doctoral Dissertation). Virginia Commonwealth University. Retrieved from https://doi.org/10.25772/8S3W-ZD67 ; https://scholarscompass.vcu.edu/etd/1755

Chicago Manual of Style (16th Edition):

Mishra, Sushma. “DEFINING VALUE BASED INFORMATION SECURITY GOVERNANCE OBJECTIVES.” 2008. Doctoral Dissertation, Virginia Commonwealth University. Accessed August 08, 2020. https://doi.org/10.25772/8S3W-ZD67 ; https://scholarscompass.vcu.edu/etd/1755.

MLA Handbook (7th Edition):

Mishra, Sushma. “DEFINING VALUE BASED INFORMATION SECURITY GOVERNANCE OBJECTIVES.” 2008. Web. 08 Aug 2020.

Vancouver:

Mishra S. DEFINING VALUE BASED INFORMATION SECURITY GOVERNANCE OBJECTIVES. [Internet] [Doctoral dissertation]. Virginia Commonwealth University; 2008. [cited 2020 Aug 08]. Available from: https://doi.org/10.25772/8S3W-ZD67 ; https://scholarscompass.vcu.edu/etd/1755.

Council of Science Editors:

Mishra S. DEFINING VALUE BASED INFORMATION SECURITY GOVERNANCE OBJECTIVES. [Doctoral Dissertation]. Virginia Commonwealth University; 2008. Available from: https://doi.org/10.25772/8S3W-ZD67 ; https://scholarscompass.vcu.edu/etd/1755


Virginia Commonwealth University

7. Chasalow, Lewis. A MODEL OF ORGANIZATIONAL COMPETENCIES FOR BUSINESS INTELLIGENCE SUCCESS.

Degree: PhD, Information Systems, 2009, Virginia Commonwealth University

 Business intelligence (BI) systems comprise one of the largest and fastest growing areas of IT expenditure in companies today. Companies’ experiences with deriving benefits from… (more)

Subjects/Keywords: Information Systems; Business Intelligence; Business; Management Information Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chasalow, L. (2009). A MODEL OF ORGANIZATIONAL COMPETENCIES FOR BUSINESS INTELLIGENCE SUCCESS. (Doctoral Dissertation). Virginia Commonwealth University. Retrieved from https://doi.org/10.25772/HQMZ-Y627 ; https://scholarscompass.vcu.edu/etd/1723

Chicago Manual of Style (16th Edition):

Chasalow, Lewis. “A MODEL OF ORGANIZATIONAL COMPETENCIES FOR BUSINESS INTELLIGENCE SUCCESS.” 2009. Doctoral Dissertation, Virginia Commonwealth University. Accessed August 08, 2020. https://doi.org/10.25772/HQMZ-Y627 ; https://scholarscompass.vcu.edu/etd/1723.

MLA Handbook (7th Edition):

Chasalow, Lewis. “A MODEL OF ORGANIZATIONAL COMPETENCIES FOR BUSINESS INTELLIGENCE SUCCESS.” 2009. Web. 08 Aug 2020.

Vancouver:

Chasalow L. A MODEL OF ORGANIZATIONAL COMPETENCIES FOR BUSINESS INTELLIGENCE SUCCESS. [Internet] [Doctoral dissertation]. Virginia Commonwealth University; 2009. [cited 2020 Aug 08]. Available from: https://doi.org/10.25772/HQMZ-Y627 ; https://scholarscompass.vcu.edu/etd/1723.

Council of Science Editors:

Chasalow L. A MODEL OF ORGANIZATIONAL COMPETENCIES FOR BUSINESS INTELLIGENCE SUCCESS. [Doctoral Dissertation]. Virginia Commonwealth University; 2009. Available from: https://doi.org/10.25772/HQMZ-Y627 ; https://scholarscompass.vcu.edu/etd/1723


Virginia Commonwealth University

8. Harris, Mark. THE SHAPING OF MANAGERS’ SECURITY OBJECTIVES THROUGH INFORMATION SECURITY AWARENESS TRAINING.

Degree: PhD, Information Systems, 2010, Virginia Commonwealth University

 Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a… (more)

Subjects/Keywords: Awareness Training; Security Policy; Information Systems; Delphi; Value-focused Thinking; Business; Management Information Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Harris, M. (2010). THE SHAPING OF MANAGERS’ SECURITY OBJECTIVES THROUGH INFORMATION SECURITY AWARENESS TRAINING. (Doctoral Dissertation). Virginia Commonwealth University. Retrieved from https://doi.org/10.25772/YWXF-6B47 ; https://scholarscompass.vcu.edu/etd/2208

Chicago Manual of Style (16th Edition):

Harris, Mark. “THE SHAPING OF MANAGERS’ SECURITY OBJECTIVES THROUGH INFORMATION SECURITY AWARENESS TRAINING.” 2010. Doctoral Dissertation, Virginia Commonwealth University. Accessed August 08, 2020. https://doi.org/10.25772/YWXF-6B47 ; https://scholarscompass.vcu.edu/etd/2208.

MLA Handbook (7th Edition):

Harris, Mark. “THE SHAPING OF MANAGERS’ SECURITY OBJECTIVES THROUGH INFORMATION SECURITY AWARENESS TRAINING.” 2010. Web. 08 Aug 2020.

Vancouver:

Harris M. THE SHAPING OF MANAGERS’ SECURITY OBJECTIVES THROUGH INFORMATION SECURITY AWARENESS TRAINING. [Internet] [Doctoral dissertation]. Virginia Commonwealth University; 2010. [cited 2020 Aug 08]. Available from: https://doi.org/10.25772/YWXF-6B47 ; https://scholarscompass.vcu.edu/etd/2208.

Council of Science Editors:

Harris M. THE SHAPING OF MANAGERS’ SECURITY OBJECTIVES THROUGH INFORMATION SECURITY AWARENESS TRAINING. [Doctoral Dissertation]. Virginia Commonwealth University; 2010. Available from: https://doi.org/10.25772/YWXF-6B47 ; https://scholarscompass.vcu.edu/etd/2208

9. Abdul Talib, Yurita Yakimin. Intrinsic Motivation and Information Systems Security Policy Compliance in Organizations.

Degree: PhD, Information Systems, 2015, Virginia Commonwealth University

  Incidents of computer abuse, proprietary information leaks and other security lapses have been on the increase. Most often, such security lapses are attributed to… (more)

Subjects/Keywords: IS security policy compliance; intrinsic motivation; psychological empowerment; structural empowerment; Business; Management Information Systems

Virginia Commonwealth University, 2015 Chair: Professor Gurpreet Dhillon Department of… …requirements for the degree of Doctoral of Philosophy in Business at Virginia Commonwealth University… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abdul Talib, Y. Y. (2015). Intrinsic Motivation and Information Systems Security Policy Compliance in Organizations. (Doctoral Dissertation). Virginia Commonwealth University. Retrieved from https://doi.org/10.25772/BTYA-VK54 ; https://scholarscompass.vcu.edu/etd/3710

Chicago Manual of Style (16th Edition):

Abdul Talib, Yurita Yakimin. “Intrinsic Motivation and Information Systems Security Policy Compliance in Organizations.” 2015. Doctoral Dissertation, Virginia Commonwealth University. Accessed August 08, 2020. https://doi.org/10.25772/BTYA-VK54 ; https://scholarscompass.vcu.edu/etd/3710.

MLA Handbook (7th Edition):

Abdul Talib, Yurita Yakimin. “Intrinsic Motivation and Information Systems Security Policy Compliance in Organizations.” 2015. Web. 08 Aug 2020.

Vancouver:

Abdul Talib YY. Intrinsic Motivation and Information Systems Security Policy Compliance in Organizations. [Internet] [Doctoral dissertation]. Virginia Commonwealth University; 2015. [cited 2020 Aug 08]. Available from: https://doi.org/10.25772/BTYA-VK54 ; https://scholarscompass.vcu.edu/etd/3710.

Council of Science Editors:

Abdul Talib YY. Intrinsic Motivation and Information Systems Security Policy Compliance in Organizations. [Doctoral Dissertation]. Virginia Commonwealth University; 2015. Available from: https://doi.org/10.25772/BTYA-VK54 ; https://scholarscompass.vcu.edu/etd/3710


Virginia Commonwealth University

10. Lapke, Michael Stephen. Power Relationships in Information Systems Security Policy Formulation and Implementation.

Degree: PhD, Information Systems, 2008, Virginia Commonwealth University

 This thesis argues that organizational power impacts the development and implementation of Information Systems (IS) Security policy. The motivation for this research stems from the… (more)

Subjects/Keywords: information systems; security policy; power structure; organizational power; Business; Management Information Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lapke, M. S. (2008). Power Relationships in Information Systems Security Policy Formulation and Implementation. (Doctoral Dissertation). Virginia Commonwealth University. Retrieved from https://doi.org/10.25772/ZYF6-2F24 ; https://scholarscompass.vcu.edu/etd/1239

Chicago Manual of Style (16th Edition):

Lapke, Michael Stephen. “Power Relationships in Information Systems Security Policy Formulation and Implementation.” 2008. Doctoral Dissertation, Virginia Commonwealth University. Accessed August 08, 2020. https://doi.org/10.25772/ZYF6-2F24 ; https://scholarscompass.vcu.edu/etd/1239.

MLA Handbook (7th Edition):

Lapke, Michael Stephen. “Power Relationships in Information Systems Security Policy Formulation and Implementation.” 2008. Web. 08 Aug 2020.

Vancouver:

Lapke MS. Power Relationships in Information Systems Security Policy Formulation and Implementation. [Internet] [Doctoral dissertation]. Virginia Commonwealth University; 2008. [cited 2020 Aug 08]. Available from: https://doi.org/10.25772/ZYF6-2F24 ; https://scholarscompass.vcu.edu/etd/1239.

Council of Science Editors:

Lapke MS. Power Relationships in Information Systems Security Policy Formulation and Implementation. [Doctoral Dissertation]. Virginia Commonwealth University; 2008. Available from: https://doi.org/10.25772/ZYF6-2F24 ; https://scholarscompass.vcu.edu/etd/1239


Virginia Commonwealth University

11. May, Jeffrey Lee. Developing a Multi-Objective Decision Model for Maximizing IS Security within an Organization.

Degree: PhD, Information Systems, 2008, Virginia Commonwealth University

 Numerous IS researchers have argued that IS Security can be more effectively managed if the emphasis goes beyond the technical means of protecting information resources.… (more)

Subjects/Keywords: multi-objective decision analysis; IS security; value-focused thinking; Business; Management Information Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

May, J. L. (2008). Developing a Multi-Objective Decision Model for Maximizing IS Security within an Organization. (Doctoral Dissertation). Virginia Commonwealth University. Retrieved from https://doi.org/10.25772/8Z57-7B56 ; https://scholarscompass.vcu.edu/etd/914

Chicago Manual of Style (16th Edition):

May, Jeffrey Lee. “Developing a Multi-Objective Decision Model for Maximizing IS Security within an Organization.” 2008. Doctoral Dissertation, Virginia Commonwealth University. Accessed August 08, 2020. https://doi.org/10.25772/8Z57-7B56 ; https://scholarscompass.vcu.edu/etd/914.

MLA Handbook (7th Edition):

May, Jeffrey Lee. “Developing a Multi-Objective Decision Model for Maximizing IS Security within an Organization.” 2008. Web. 08 Aug 2020.

Vancouver:

May JL. Developing a Multi-Objective Decision Model for Maximizing IS Security within an Organization. [Internet] [Doctoral dissertation]. Virginia Commonwealth University; 2008. [cited 2020 Aug 08]. Available from: https://doi.org/10.25772/8Z57-7B56 ; https://scholarscompass.vcu.edu/etd/914.

Council of Science Editors:

May JL. Developing a Multi-Objective Decision Model for Maximizing IS Security within an Organization. [Doctoral Dissertation]. Virginia Commonwealth University; 2008. Available from: https://doi.org/10.25772/8Z57-7B56 ; https://scholarscompass.vcu.edu/etd/914


Virginia Commonwealth University

12. Blue, Jon T. Rebuilding Theories of Technology Acceptance: A Qualitative Case Study of Physicians' Acceptance of Technology.

Degree: PhD, Information Systems, 2006, Virginia Commonwealth University

 The Technology Acceptance Model has been widely applied and has been quite successful at explaining the behavioral intention to use technology in many organizations. One… (more)

Subjects/Keywords: organizational case study; PDA; electronic medical record; clinical system; informatics; telemedicine; natural-science model; health care; Business; Management Information Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Blue, J. T. (2006). Rebuilding Theories of Technology Acceptance: A Qualitative Case Study of Physicians' Acceptance of Technology. (Doctoral Dissertation). Virginia Commonwealth University. Retrieved from https://doi.org/10.25772/4FQN-2216 ; https://scholarscompass.vcu.edu/etd/884

Chicago Manual of Style (16th Edition):

Blue, Jon T. “Rebuilding Theories of Technology Acceptance: A Qualitative Case Study of Physicians' Acceptance of Technology.” 2006. Doctoral Dissertation, Virginia Commonwealth University. Accessed August 08, 2020. https://doi.org/10.25772/4FQN-2216 ; https://scholarscompass.vcu.edu/etd/884.

MLA Handbook (7th Edition):

Blue, Jon T. “Rebuilding Theories of Technology Acceptance: A Qualitative Case Study of Physicians' Acceptance of Technology.” 2006. Web. 08 Aug 2020.

Vancouver:

Blue JT. Rebuilding Theories of Technology Acceptance: A Qualitative Case Study of Physicians' Acceptance of Technology. [Internet] [Doctoral dissertation]. Virginia Commonwealth University; 2006. [cited 2020 Aug 08]. Available from: https://doi.org/10.25772/4FQN-2216 ; https://scholarscompass.vcu.edu/etd/884.

Council of Science Editors:

Blue JT. Rebuilding Theories of Technology Acceptance: A Qualitative Case Study of Physicians' Acceptance of Technology. [Doctoral Dissertation]. Virginia Commonwealth University; 2006. Available from: https://doi.org/10.25772/4FQN-2216 ; https://scholarscompass.vcu.edu/etd/884


Virginia Commonwealth University

13. Wenger, Mitchell. Building and Testing Theory on the Role of IT in the Relationship between Power and Performance: Implementing Enterprise Performance Management in the Organization.

Degree: PhD, Information Systems, 2009, Virginia Commonwealth University

 This research builds on the literature about power and performance, offering new theory that extends the literature by accounting for the transformational effects of information… (more)

Subjects/Keywords: information systems (IS); information technology (IT); business/corporate/enterprise performance management (EPM); business intelligence; implementation theory; case study; power; performance measures; enterprise systems; Business; Management Information Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wenger, M. (2009). Building and Testing Theory on the Role of IT in the Relationship between Power and Performance: Implementing Enterprise Performance Management in the Organization. (Doctoral Dissertation). Virginia Commonwealth University. Retrieved from https://doi.org/10.25772/C3J0-YZ55 ; https://scholarscompass.vcu.edu/etd/1784

Chicago Manual of Style (16th Edition):

Wenger, Mitchell. “Building and Testing Theory on the Role of IT in the Relationship between Power and Performance: Implementing Enterprise Performance Management in the Organization.” 2009. Doctoral Dissertation, Virginia Commonwealth University. Accessed August 08, 2020. https://doi.org/10.25772/C3J0-YZ55 ; https://scholarscompass.vcu.edu/etd/1784.

MLA Handbook (7th Edition):

Wenger, Mitchell. “Building and Testing Theory on the Role of IT in the Relationship between Power and Performance: Implementing Enterprise Performance Management in the Organization.” 2009. Web. 08 Aug 2020.

Vancouver:

Wenger M. Building and Testing Theory on the Role of IT in the Relationship between Power and Performance: Implementing Enterprise Performance Management in the Organization. [Internet] [Doctoral dissertation]. Virginia Commonwealth University; 2009. [cited 2020 Aug 08]. Available from: https://doi.org/10.25772/C3J0-YZ55 ; https://scholarscompass.vcu.edu/etd/1784.

Council of Science Editors:

Wenger M. Building and Testing Theory on the Role of IT in the Relationship between Power and Performance: Implementing Enterprise Performance Management in the Organization. [Doctoral Dissertation]. Virginia Commonwealth University; 2009. Available from: https://doi.org/10.25772/C3J0-YZ55 ; https://scholarscompass.vcu.edu/etd/1784

.