Artykuły w czasopismach na temat „Inter-organisational Information System (IOS)”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Inter-organisational Information System (IOS)”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Teryokhin, Sergei, i Gøril Hannås. "Pre-requisites of successful strategic electronic coordination: the moderation effect of the ownership mechanism of inter-organisational information systems". Engineering Management in Production and Services 9, nr 4 (20.12.2017): 34–47. http://dx.doi.org/10.1515/emj-2017-0029.
Pełny tekst źródłaBorman, Mark. "Developing, and testing, a theoretical framework for inter-organisational systems (IOS) as infrastructure to aid future IOS design". Information Systems and e-Business Management 4, nr 4 (17.05.2006): 343–60. http://dx.doi.org/10.1007/s10257-006-0033-x.
Pełny tekst źródłaTeryokhin, Sergei, i Gøril Hannås. "Impact of supplier-specific investments in inter-organisational information systems on strategic electronic coordination: the moderation effect of buyer dependence". Engineering Management in Production and Services 10, nr 1 (1.03.2018): 7–21. http://dx.doi.org/10.1515/emj-2018-0001.
Pełny tekst źródłaBahlmann, Jan, i Achim Spiller. "Inter-organizational information systems in meat chains: the linkage between supply chain organization and system requirements". Journal on Chain and Network Science 9, nr 1 (1.01.2009): 59–69. http://dx.doi.org/10.3920/jcns2009.x159.
Pełny tekst źródłaFu, Hsin-Pin, Tien-Hsiang Chang, Cheng-Yuan Ku, Tsung-Sheng Chang i Cheng-Hsin Huang. "The critical success factors affecting the adoption of inter-organization systems by SMEs". Journal of Business & Industrial Marketing 29, nr 5 (27.05.2014): 400–416. http://dx.doi.org/10.1108/jbim-04-2012-0070.
Pełny tekst źródłaAl-Busaidi, Kamla Ali. "Inter-Organizational Knowledge Sharing System in the Health Sector". International Journal of Knowledge Management 11, nr 3 (lipiec 2015): 37–54. http://dx.doi.org/10.4018/ijkm.2015070103.
Pełny tekst źródłaSholihah, Sita Aniisah, T. M. A. Ari Samadhi, Andi Cakravastia i Senator Nur Bahagia. "Coordination model in Hinterland chain of hub-and-spoke global logistics". Journal of Industrial Engineering and Management 11, nr 4 (23.11.2018): 776. http://dx.doi.org/10.3926/jiem.2538.
Pełny tekst źródłaApridianto, Angga, Kodrat Iman Satoto i Ike Pertiwi Windasari. "Aplikasi Keliling Nusantara Edisi Sumatera Berbasis Android dan iOS". Jurnal Teknologi dan Sistem Komputer 3, nr 3 (20.08.2015): 362. http://dx.doi.org/10.14710/jtsiskom.3.3.2015.362-369.
Pełny tekst źródłaKarlsson, Fredrik, Ella Kolkowska i Frans Prenkert. "Inter-organisational information security: a systematic literature review". Information & Computer Security 24, nr 5 (14.11.2016): 418–51. http://dx.doi.org/10.1108/ics-11-2016-091.
Pełny tekst źródłaHarold, Dolly A., i Thomas A. Horan. "Examining collaboration and information sharing in Inter-Organisational Information System (IOIS) implementation". Electronic Government, an International Journal 9, nr 4 (2012): 333. http://dx.doi.org/10.1504/eg.2012.049723.
Pełny tekst źródłaHannås, Gøril, i Otto Andersen. "B2B Relationships in Modern Times". International Journal of Information Systems and Supply Chain Management 4, nr 3 (lipiec 2011): 18–37. http://dx.doi.org/10.4018/jisscm.2011070102.
Pełny tekst źródłaMin, Hokey. "An inter-organisational decision support system for global supply chain management". International Journal of Logistics Systems and Management 38, nr 4 (2021): 475. http://dx.doi.org/10.1504/ijlsm.2021.114760.
Pełny tekst źródłaDaniel, Elizabeth M., i Andrew White. "The future of inter-organisational system linkages: findings of an international Delphi study". European Journal of Information Systems 14, nr 2 (czerwiec 2005): 188–203. http://dx.doi.org/10.1057/palgrave.ejis.3000529.
Pełny tekst źródłaZaini, Muhamad Khairulnizam, Mohamad Noorman Masrek i Mad Khir Johari Abdullah Sani. "The impact of information security management practices on organisational agility". Information & Computer Security 28, nr 5 (13.06.2020): 681–700. http://dx.doi.org/10.1108/ics-02-2020-0020.
Pełny tekst źródłaAlthoff, Gereon, Alexander Ellebrecht i Brigitte Petersen. "Chain quality information management: development of a reference model for quality information requirements in pork chains". Journal on Chain and Network Science 5, nr 1 (1.06.2005): 27–38. http://dx.doi.org/10.3920/jcns2005.x052.
Pełny tekst źródłaKarlsson, Fredrik, Martin Karlsson i Joachim Åström. "Measuring employees’ compliance – the importance of value pluralism". Information & Computer Security 25, nr 3 (10.07.2017): 279–99. http://dx.doi.org/10.1108/ics-11-2016-0084.
Pełny tekst źródłaYuryna Connolly, Lena, Michael Lang, John Gathegi i Doug J. Tygar. "Organisational culture, procedural countermeasures, and employee security behaviour". Information & Computer Security 25, nr 2 (12.06.2017): 118–36. http://dx.doi.org/10.1108/ics-03-2017-0013.
Pełny tekst źródłaStorer, Christine, Geoffrey Soutar, Michelle Darrington i M. Fay Rola-Rubzen. "Buyer/seller reflections on inter-organisational information systems: Implications for chain data collection methods". Journal on Chain and Network Science 2, nr 2 (1.12.2002): 117–33. http://dx.doi.org/10.3920/jcns2002.x023.
Pełny tekst źródłaFord, Norma J. "The development and evaluation of an information technology support system to facilitate inter‐organisational collaboration in HRD". Journal of European Industrial Training 30, nr 7 (sierpień 2006): 569–88. http://dx.doi.org/10.1108/03090590610704411.
Pełny tekst źródłaRasit, Zarinah Abdul, i Che Ruhana Isa. "Relative Comprehensiveness of Performance Measurement System: Organisational Ownership Structure and Size". International Journal of Financial Research 10, nr 3 (19.05.2019): 380. http://dx.doi.org/10.5430/ijfr.v10n3p380.
Pełny tekst źródłaSoley, Ximena. "The Crucial Role of Human Rights NGOs in the Inter-American System". AJIL Unbound 113 (2019): 355–59. http://dx.doi.org/10.1017/aju.2019.68.
Pełny tekst źródłaMalatji, Masike, Sune Von Solms i Annlizé Marnewick. "Socio-technical systems cybersecurity framework". Information & Computer Security 27, nr 2 (12.06.2019): 233–72. http://dx.doi.org/10.1108/ics-03-2018-0031.
Pełny tekst źródłaMcCormac, Agata, Dragana Calic, Kathryn Parsons, Marcus Butavicius, Malcolm Pattinson i Meredith Lillie. "The effect of resilience and job stress on information security awareness". Information & Computer Security 26, nr 3 (9.07.2018): 277–89. http://dx.doi.org/10.1108/ics-03-2018-0032.
Pełny tekst źródłaM Aydin, Alperen. "Cognition to Collaboration: User-Centric Approach and Information Behaviour Theories/Models". Informing Science: The International Journal of an Emerging Transdiscipline 20 (2017): 001–20. http://dx.doi.org/10.28945/3615.
Pełny tekst źródłaGiannakis, Mihalis, i Michalis Louis. "A multi-agent based system with big data processing for enhanced supply chain agility". Journal of Enterprise Information Management 29, nr 5 (12.09.2016): 706–27. http://dx.doi.org/10.1108/jeim-06-2015-0050.
Pełny tekst źródłaIchino, Haruhiko, Kazuhiko Terada, Kenji Kawai, Osamu Ishida, Keishi Kishine, Noboru Iwasaki, Tetsuhiro Fukao, Shinji Shibao, Kazuo Kubo i Harufusa Kondoh. "ENHANCED NETWORK SIGNALING FOR 10 GIGABIT ETHERNET TO ACHIEVE A LAN-WAN SEAMLESS INTERFACE AND ITS IMPLEMENTATION IN THE PHY-LSI/TRANSCEIVER MODULE". International Journal of High Speed Electronics and Systems 15, nr 03 (wrzesień 2005): 667–704. http://dx.doi.org/10.1142/s0129156405003387.
Pełny tekst źródłaBello, Abubakar Garba, David Murray i Jocelyn Armarego. "A systematic approach to investigating how information security and privacy can be achieved in BYOD environments". Information & Computer Security 25, nr 4 (9.10.2017): 475–92. http://dx.doi.org/10.1108/ics-03-2016-0025.
Pełny tekst źródłaP N, Sindhuja, i Anand S. Kunnathur. "Information security in supply chains: a management control perspective". Information & Computer Security 23, nr 5 (9.11.2015): 476–96. http://dx.doi.org/10.1108/ics-07-2014-0050.
Pełny tekst źródłaMiao, Xin, David Banister, Yanhong Tang, Min Li i Bao Xi. "MAINTAINING THE TRANSPORT SYSTEM UNDER EXTREME WEATHER EVENTS: A DUAL-NETWORK PERSPECTIVE". Technological and Economic Development of Economy 19, Supplement_1 (28.01.2014): S342—S359. http://dx.doi.org/10.3846/20294913.2013.879748.
Pełny tekst źródłaVidakovic, Milan, Branko Milosavljevic, Zora Konjovic i Goran Sladic. "Extensible java EE-based agent framework and its application on distributed library catalogues". Computer Science and Information Systems 6, nr 2 (2009): 1–28. http://dx.doi.org/10.2298/csis0902001v.
Pełny tekst źródłaBergström, Erik, Martin Lundgren i Åsa Ericson. "Revisiting information security risk management challenges: a practice perspective". Information & Computer Security 27, nr 3 (8.07.2019): 358–72. http://dx.doi.org/10.1108/ics-09-2018-0106.
Pełny tekst źródłaSchinagl, Stef, i Abbas Shahim. "What do we know about information security governance?" Information & Computer Security 28, nr 2 (25.01.2020): 261–92. http://dx.doi.org/10.1108/ics-02-2019-0033.
Pełny tekst źródłaSmedley, Jo. "Information innovation: it’s all about people". Information and Learning Science 118, nr 11/12 (13.11.2017): 669–71. http://dx.doi.org/10.1108/ils-08-2017-0087.
Pełny tekst źródłaShahpasand, Maryam, Mehdi Shajari, Seyed Alireza Hashemi Golpaygani i Hoda Ghavamipoor. "A comprehensive security control selection model for inter-dependent organizational assets structure". Information & Computer Security 23, nr 2 (8.06.2015): 218–42. http://dx.doi.org/10.1108/ics-12-2013-0090.
Pełny tekst źródłaKhedr, Walid I., Mahmoud I. Abdalla i Asmaa A. Elsheikh. "Enhanced inter-access service network handover authentication scheme for IEEE 802.16m network". IET Information Security 9, nr 6 (1.11.2015): 334–43. http://dx.doi.org/10.1049/iet-ifs.2013.0170.
Pełny tekst źródłaOksanych, I. M., V. F. Grechaninov i A. V. Lopushansky. "Information interaction in disparate information systems of situational centers". Mathematical machines and systems 3 (2020): 60–68. http://dx.doi.org/10.34121/1028-9763-2020-3-60-68.
Pełny tekst źródłaRajamanickam, Vennila, i Duraisamy Veerappan. "Inter cluster communication and rekeying technique for multicast security in mobile ad hoc networks". IET Information Security 8, nr 4 (1.07.2014): 234–39. http://dx.doi.org/10.1049/iet-ifs.2013.0217.
Pełny tekst źródłaHinder, Susan, Kathrin Cresswell, Aziz Sheikh, Bryony Dean Franklin, Marta Krasuska, Hung The Nguyen, Wendy Lane i in. "Promoting inter-organisational knowledge sharing: A qualitative evaluation of England’s Global Digital Exemplar and Fast Follower Programme". PLOS ONE 16, nr 8 (2.08.2021): e0255220. http://dx.doi.org/10.1371/journal.pone.0255220.
Pełny tekst źródłaBorsellino, Valeria, Francesca Varia, Cinzia Zinnanti i Emanuele Schimmenti. "The Sicilian cooperative system of wine production". International Journal of Wine Business Research 32, nr 3 (31.03.2020): 391–421. http://dx.doi.org/10.1108/ijwbr-10-2018-0062.
Pełny tekst źródłaBerndtsson, Joakim, Peter Johansson i Martin Karlsson. "Value conflicts and non-compliance". Information & Computer Security 26, nr 2 (11.06.2018): 246–58. http://dx.doi.org/10.1108/ics-08-2017-0057.
Pełny tekst źródłaJunejo, Naveed Ur Rehman, Hamada Esmaiel, Haixin Sun, Zeyad A. H. Qasem i Junfeng Wang. "Pilot-Based Adaptive Channel Estimation for Underwater Spatial Modulation Technologies". Symmetry 11, nr 5 (24.05.2019): 711. http://dx.doi.org/10.3390/sym11050711.
Pełny tekst źródłaDe La Torre Cruz, Juan, Francisco Jesús Cañadas Quesada, Nicolás Ruiz Reyes, Pedro Vera Candeas i Julio José Carabias Orti. "Wheezing Sound Separation Based on Informed Inter-Segment Non-Negative Matrix Partial Co-Factorization". Sensors 20, nr 9 (8.05.2020): 2679. http://dx.doi.org/10.3390/s20092679.
Pełny tekst źródłaDa Veiga, Adéle. "An approach to information security culture change combining ADKAR and the ISCA questionnaire to aid transition to the desired culture". Information & Computer Security 26, nr 5 (12.11.2018): 584–612. http://dx.doi.org/10.1108/ics-08-2017-0056.
Pełny tekst źródłaLi, Zhen-Song, Bing-Jie Li i Min Miao. "A Parallel Transmission Scheme Based on the Turbo Product Code for Through Silicon via Array in Three-Dimensional Integrated Circuits". Journal of Nanoelectronics and Optoelectronics 16, nr 3 (1.03.2021): 494–500. http://dx.doi.org/10.1166/jno.2021.2944.
Pełny tekst źródłaZhai, Jingjing, Xiaobei Wu, Zihao Li, Shaojie Zhu, Bo Yang i Haoming Liu. "Day-Ahead and Intra-Day Collaborative Optimized Operation among Multiple Energy Stations". Energies 14, nr 4 (10.02.2021): 936. http://dx.doi.org/10.3390/en14040936.
Pełny tekst źródłaCope, Jacqueline, Francois Siewe, Feng Chen, Leandros Maglaras i Helge Janicke. "On data leakage from non-production systems". Information & Computer Security 25, nr 4 (9.10.2017): 454–74. http://dx.doi.org/10.1108/ics-02-2017-0004.
Pełny tekst źródłaAhmad, Zauwiyah, Thian Song Ong, Tze Hui Liew i Mariati Norhashim. "Security monitoring and information security assurance behaviour among employees". Information & Computer Security 27, nr 2 (12.06.2019): 165–88. http://dx.doi.org/10.1108/ics-10-2017-0073.
Pełny tekst źródłaHöhler, J., i R. Kühl. "Organisation of German livestock production from the bottom up: a new institutional economic analysis of dairy cattle breeding". Journal on Chain and Network Science 16, nr 1 (14.09.2016): 7–18. http://dx.doi.org/10.3920/jcns2014.0005.
Pełny tekst źródłaNajjar, Mohammad, Michael H. Small i Mahmoud M. Yasin. "Social Sustainability Strategy across the Supply Chain: A Conceptual Approach from the Organisational Perspective". Sustainability 12, nr 24 (14.12.2020): 10438. http://dx.doi.org/10.3390/su122410438.
Pełny tekst źródłaAkinsanya, Opeoluwa Ore, Maria Papadaki i Lingfen Sun. "Towards a maturity model for health-care cloud security (M2HCS)". Information & Computer Security 28, nr 3 (16.12.2019): 321–45. http://dx.doi.org/10.1108/ics-05-2019-0060.
Pełny tekst źródła