Search
Now showing items 11-17 of 17
Creating and capturing value in technology ventures - from market validation to business model development
(The European Financial Review, 2015-04)
The business validation phase can be a tough time for an
entrepreneur, which is why it’s important that they use any
and all tools necessary to help them at this stage of their
business development. In this article, ...
The insider threat - understanding the aberrant thinking of the rogue" Trusted Agent"
(AIS Electronic Library (AISeL), 2015-05-29)
A deficiency exists in the Information Systems Security literature because of the paucity of research
aimed at understanding the mind of the insider criminal . Much of the academic and popular press
focuses on external ...
Brand tribalism and self-expressive brands: social influences and brand outcomes
(Emerald, 2015)
Purpose - This study aims to examine the relationship between social influence and consumers' self-expression through brands. It considers susceptibility to interpersonal influence and social network influence on self-expressive ...
Banking compliance and dependence corruption: towards an attachment perspective
(Taylor & Francis (Routledge), 2015-05-07)
Why did banking compliance fail so badly in the recent financial crisis and why, according to many, does it continue to do so? Rather than point to the lack of oversight of individuals in bank compliance roles, as many ...
Investigation of employee security behaviour: A grounded theory approach
(Springer, 2015-05-09)
At a time of rapid business globalisation, it is necessary to
understand employee security behaviour within diverse cultural settings. While
general deterrence theory has been extensively used in Behavioural Informatio ...
A survey of cyberbullying amongst students in Ireland's higher education sector
(International Association for Development of the Information Society, 2015-10-26)
Cyberbullying is an extension of traditional bullying where victims are harassed via the internet or mobile phones. This
study investigated the victims’ experiences of cyberbullying including the prevalence, type and ...