[1]
|
Gaining Positive E-WOM Through Reputation Depending on Information Privacy Concerns in Banking Services: Moderation Roles of Boycott Participation and Boycott Frequency
Corporate Reputation Review,
2025
DOI:10.1057/s41299-024-00211-4
|
|
|
[2]
|
Implementation of Information Security Management Systems for Data Protection in Organizations: A systematic literature review
Environment-Behaviour Proceedings Journal,
2024
DOI:10.21834/e-bpj.v9iSI18.5483
|
|
|
[3]
|
Cyberattack, cyber risk mitigation capabilities, and firm productivity in Kenya
Small Business Economics,
2024
DOI:10.1007/s11187-024-00946-8
|
|
|
[4]
|
Information Security Management System Practices in Kenya
Journal of International Business Research and Marketing,
2024
DOI:10.18775/10.18775/jibrm.1849-8558.2015.82.3002
|
|
|
[5]
|
Application of Data Encryption Technology in Network Information Security Sharing
Security and Communication Networks,
2022
DOI:10.1155/2022/2745334
|
|
|
[6]
|
Financial Management of Listed Companies Based on Convolutional Neural Network Model in the Context of Epidemic
Computational Intelligence and Neuroscience,
2022
DOI:10.1155/2022/1871315
|
|
|
[7]
|
Design and Implementation of Data Mining in Information Management System
2022 International Conference on Knowledge Engineering and Communication Systems (ICKES),
2022
DOI:10.1109/ICKECS56523.2022.10060029
|
|
|
[8]
|
Design and Implementation of Data Mining in Information Management System
2022 International Conference on Knowledge Engineering and Communication Systems (ICKES),
2022
DOI:10.1109/ICKECS56523.2022.10060029
|
|
|