{"title":"信息安全策略遵从与影子IT使用之间的不一致","authors":"Hsieh-Hong Huang, Jian-Wei Lin","doi":"10.1080/08874417.2023.2234318","DOIUrl":null,"url":null,"abstract":"","PeriodicalId":54855,"journal":{"name":"Journal of Computer Information Systems","volume":"30 1","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Inconsistencies Between Information Security Policy Compliance and Shadow IT Usage\",\"authors\":\"Hsieh-Hong Huang, Jian-Wei Lin\",\"doi\":\"10.1080/08874417.2023.2234318\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\",\"PeriodicalId\":54855,\"journal\":{\"name\":\"Journal of Computer Information Systems\",\"volume\":\"30 1\",\"pages\":\"\"},\"PeriodicalIF\":2.5000,\"publicationDate\":\"2023-07-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Computer Information Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1080/08874417.2023.2234318\",\"RegionNum\":4,\"RegionCategory\":\"管理学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer Information Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1080/08874417.2023.2234318","RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
期刊介绍:
The Journal of Computer Information Systems (JCIS) aims to publish manuscripts that explore information systems and technology research and thus develop computer information systems globally.
We encourage manuscripts that cover the following topic areas:
-Analytics, Business Intelligence, Decision Support Systems in Computer Information Systems
- Mobile Technology, Mobile Applications
- Human-Computer Interaction
- Information and/or Technology Management, Organizational Behavior & Culture
- Data Management, Data Mining, Database Design and Development
- E-Commerce Technology and Issues in computer information systems
- Computer systems enterprise architecture, enterprise resource planning
- Ethical and Legal Issues of IT
- Health Informatics
- Information Assurance and Security--Cyber Security, Cyber Forensics
- IT Project Management
- Knowledge Management in computer information systems
- Networks and/or Telecommunications
- Systems Analysis, Design, and/or Implementation
- Web Programming and Development
- Curriculum Issues, Instructional Issues, Capstone Courses, Specialized Curriculum Accreditation
- E-Learning Technologies, Analytics, Future