JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about JSTOR, please contact firstname.lastname@example.org.. is collaborating… (More)
Deviant security behavior a b s t r a c t Information Security (InfoSec) research is far reaching and includes many approaches to deal with protecting and mitigating threats to the information assets and technical resources available within computer based systems. Although a predominant weakness in properly securing information assets is the individual user… (More)
Methods for evaluating and effectively managing the security behavior of employees.
This research is an attempt to better understand how external and internal organizational influences shape organizational actions for improving information systems security. A case study of a multinational company is presented and then analyzed from the perspective of neo-institutional theory. The analysis indicates that coercive, normative, and mimetic… (More)
The significance of aligning IT with corporate strategy is widely recognized, but the lack of appropriate methodologies prevented practitioners from integrating IT projects with competitive strategies effectively. This article addresses the issue of deploying Web services strategically using the concept of a widely accepted management tool, the balanced… (More)
Resonant-phonon terahertz quantum-cascade lasers operating up to a heat-sink temperature of 186 K are demonstrated. This record temperature performance is achieved based on a diagonal design, with the objective to increase the upper-state lifetime and therefore the gain at elevated temperatures. The increased diagonality also lowers the operating current… (More)