Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-3 of 3
Keywords: Structural equation modeling
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Do desire, anxiety and personal innovativeness impact the adoption of IoT devices?
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2022) 30 (5): 730–750.
Published: 26 May 2022
... squares (PLS), a latent structural equation modeling technique to assess the measurement and structural models (Hair et al., 2011). PLS labeled as “silver bullet” enjoys widespread popularity not only among IS researchers (Marcoulides and Saunders, 2006) but also among researchers in other...
Journal Articles
Impact of information security initiatives on supply chain performance: An empirical investigation
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2014) 22 (5): 450–473.
Published: 10 November 2014
... managers to collect data. Data were collected from 197 organizations belonging to various sectors. The study used exploratory and confirmatory factor analysis for data analysis. Further, to test the hypotheses and to fit the theoretical model, structural equation modeling techniques were used. Findings...
Journal Articles
Impacts of organizational capabilities in information security
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2011) 19 (3): 155–176.
Published: 19 July 2011
... strategy and organization performance. Design/methodology/approach Based on existing literature in strategic management and information security, a theoretical model was proposed and validated. A self‐administered survey instrument was developed to collect empirical data. Structural equation modeling...
