Your search for 46869 returns 5037 document(s) |
Meaningful Healthcare Security: Does Meaningful-Use Attestation Improve Information Security Performance?, Page 1043-1067 |
Author: Juhee Kwon and M. Eric Johnson | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Proactive versus reactive security investments in the healthcare sector, page 451-471 |
Author: Juhee Kwon and M. Eric Johnson | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Toward Meaningful Engagement: A Framework for Design and Research of Gamified Information Systems, Page 1011-1034 |
Author: De Liu, Radhika Santhnam, and Jane Webster | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches, Page 893-916 |
Author: Corey M. Angst, Emily S. Block, John D’Arcy, and Ken Kelley | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using cause-effect relations in next to improve information retrieval precision, page 119 |
Author: Christopher S.G. Khoo | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Does pseudo-relevance feedback improve distributed information retrieval system?, page 1151 |
Author: Fernando M.S. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Built to Learn: How Work Practices Affect Employee Learning During Healthcare Information Technology Implementation, Page 645-659 |
Author: Ariel Avgar, Prasanna Tambe, and Lorin M. Hitt | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Strategic management of information systems in healthcare |
Author: Brown, Gordon D.; | Call Number: 651.5 Bro s | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Voices of innovation: fulfilling the promise of information technology in healthcare |
Author: Marx, Edward W.; | Call Number: 610.285 Mar v | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Correlated failures, diversification, and information security risk management, page 397-422 |
Author: Pei-yu Chen, Gaurav Kataria, and Ramayya Krishnan | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|