Author of the publication

Special Issue Introduction: Desperately Seeking the Information in Information Systems Research at HICSS 2019.

, and . Data Base, 51 (1): 11-13 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Tejay, Gurvirender
add a person with the name Tejay, Gurvirender
 

Other publications of authors with the same name

Special Issue Introduction: Desperately Seeking the Information in Information Systems Research at HICSS 2019., and . Data Base, 51 (1): 11-13 (2020)Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper)., , and . IICIS, volume 193 of IFIP, page 21-39. Springer, (2004)Information Systems Security Leadership: An Empirical Study of Behavioral Influences., , and . AMCIS, Association for Information Systems, (2017)Developing an Information Systems Security Success Model for eGovernment Context., and . AMCIS, page 346. Association for Information Systems, (2009)Making Sense of Information Systems Security Standards.. AMCIS, page 450. Association for Information Systems, (2005)A Confirmatory Analysis of Information Systems Security Success Factors., and . HICSS, page 1-10. IEEE Computer Society, (2011)Evaluation of Information Security Controls in Organizations by Grey Relational Analysis., , , and . Int. J. Dependable Trust. Inf. Syst., 2 (3): 36-54 (2011)Identifying Information Systems Security Requirements for Different Organizational Forms: A transactions cost approach.. AMCIS, page 412. Association for Information Systems, (2006)Cybercrime in the Digital Economy - Editorial., and . Comput. Secur., (2013)Utilizing End-user Requirements to Inform the Knowledge Supply Strategies of IT Project Teams., and . AMCIS, page 207. Association for Information Systems, (2010)