To see the other types of publications on this topic, follow the link: Information factors.

Journal articles on the topic 'Information factors'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Information factors.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Borgstede, Chris von, and Kristin Andersson. "Environmental Information—Explanatory Factors for Information Behavior." Sustainability 2, no. 9 (September 2, 2010): 2785–98. http://dx.doi.org/10.3390/su2092785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

White, Garry, and Ju Long. "Global Information Security Factors." International Journal of Information Security and Privacy 4, no. 2 (April 2010): 49–60. http://dx.doi.org/10.4018/jisp.2010040104.

Full text
Abstract:
The Internet has changed security and because the Internet is borderless, security threats are now on a global scale. In this paper, the authors explore the global nature of information security from the perspectives of corporate professionals. Through an empirical study with corporate professionals, who have first-hand information security knowledge, the authors confirm that the proposed knowledge topics are relevant toward a comprehensive understanding of information security issues. Analyzing the empirical data, the authors found two global security factors: business protection of data and government/social issues.
APA, Harvard, Vancouver, ISO, and other styles
3

Янченко, Вадим Николавевич, Александр Владимирович Ивченко, Вильям Александрович Залога, and Оксана Дмитриевна Дынник. "Information security factors systematization." Technology audit and production reserves 5, no. 6(25) (September 22, 2015): 30. http://dx.doi.org/10.15587/2312-8372.2015.51111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Meyer, R. "A Biomedical Informatics Perspective on Human Factors - How Human Factors Influence Information Technology Adoption." Yearbook of Medical Informatics 20, no. 01 (August 2011): 58–62. http://dx.doi.org/10.1055/s-0038-1638739.

Full text
Abstract:
Summaryto select and summarize excellent research published in 2010 in the field of bio-medical informatics human factors.we attempt to derive a synthetic overview of the activity and new trends in this field, from a selection of worldwide research papers published during 2010.this year again, healthcare information technology (HIT) adoption occupies a central role in the field and leads to research focused mainly on measuring impact and factors influencing it. One of the selected papers especially dissects the anatomy of a nationwide personal electronic health record adoption failure.Due to the vast and increasing amount of excellent works, choosing the best papers in human factors is a challenge. More and more the published work takes into account fundamental principles expressed in Grudin’s Laws, one form of which is: “When those who beneût from a technology are not those who do the work, then the technology is likely to fail or be subverted.”.
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Ruey-Shun, Chia-Ming Sun, Marilyn M. Helms, and Wen-Jang (Kenny) Jih. "Factors Influencing Information System Flexibility." International Journal of Enterprise Information Systems 5, no. 1 (January 2009): 32–43. http://dx.doi.org/10.4018/jeis.2009010103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zammani, Mazlina, and Rozilawati Razali. "Information Security Management Success Factors." Advanced Science Letters 22, no. 8 (August 1, 2016): 1924–29. http://dx.doi.org/10.1166/asl.2016.7746.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Arguello, Jaime, Bogeum Choi, and Robert Capra. "Factors Influencing Users’ Information Requests." ACM Transactions on Information Systems 36, no. 4 (October 10, 2018): 1–37. http://dx.doi.org/10.1145/3209624.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Goles, Tim, and Wynne W. Chin. "Information systems outsourcing relationship factors." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 36, no. 4 (October 7, 2005): 47–67. http://dx.doi.org/10.1145/1104004.1104009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Williams, Michelle Hale, and Jocelyn Jones Evans. "Factors in Information Literacy Education." Journal of Political Science Education 4, no. 1 (January 28, 2008): 116–30. http://dx.doi.org/10.1080/15512160701816234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Whyte, Grafton, and Andy Bytheway. "Factors affecting information systems’ success." International Journal of Service Industry Management 7, no. 1 (March 1996): 74–93. http://dx.doi.org/10.1108/09564239610109429.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

PALMER, JUDITH. "SCIENTISTS AND INFORMATION: II. PERSONAL FACTORS IN INFORMATION BEHAVIOUR." Journal of Documentation 47, no. 3 (March 1991): 254–75. http://dx.doi.org/10.1108/eb026880.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Matschke, Christina, Johannes Moskaliuk, Franziska Bokhorst, Till Schümmer, and Ulrike Cress. "Motivational factors of information exchange in social information spaces." Computers in Human Behavior 36 (July 2014): 549–58. http://dx.doi.org/10.1016/j.chb.2014.04.044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Rowley, Jennifer. "Information pricing policy: factors and contexts." Information Services & Use 18, no. 3 (July 1, 1998): 165–75. http://dx.doi.org/10.3233/isu-1998-18303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Arsal, Riza Ergun, Jason Bennett Thatcher, Thomas J. Zagenczyk, D. Harrison McKnight, and Manju K. Ahuja. "Organizational Factors and Information Technology Use." Journal of Organizational and End User Computing 21, no. 3 (July 2009): 37–59. http://dx.doi.org/10.4018/joeuc.2009070103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

임경원 and Park,Seong-Kyu. "Factors Affecting the Environmental Information Disclosure." Korea International Accounting Review ll, no. 37 (June 2011): 311–28. http://dx.doi.org/10.21073/kiar.2011..37.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Heinström, Jannica. "Psychological factors behind incidental information acquisition." Library & Information Science Research 28, no. 4 (December 2006): 579–94. http://dx.doi.org/10.1016/j.lisr.2006.03.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

King, John Leslie, Vijay Gurbaxani, Kenneth L. Kraemer, F. Warren McFarlan, K. S. Raman, and C. S. Yap. "Institutional Factors in Information Technology Innovation." Information Systems Research 5, no. 2 (June 1994): 139–69. http://dx.doi.org/10.1287/isre.5.2.139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Hasas Yeghaneh, Yahya. "Factors Affecting Information Technology Audit Quality." Journal of Investment and Management 4, no. 5 (2015): 196. http://dx.doi.org/10.11648/j.jim.20150405.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Proctor, Robert W., Mei-Ching Lien, E. Eugene Schultz, and Gavriel Salvendy. "Human Factors in Information Security Methods." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 44, no. 2 (July 2000): 357. http://dx.doi.org/10.1177/154193120004400219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Nauli, Sukarno Bahat, and Berlin P. Sitorus. "Academic Information System Effectiveness Key Factors." International Journal of Computer Trends and Technology 67, no. 9 (September 25, 2019): 45–49. http://dx.doi.org/10.14445/22312803/ijctt-v67i9p108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Hakim, Latif Al. "Information quality factors affecting innovation process." International Journal of Information Quality 1, no. 2 (2007): 162. http://dx.doi.org/10.1504/ijiq.2007.014607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Domm, Jennifer A., Ellen E. Parker, George W. Reed, Deborah C. German, and Esther Eisenberg. "Factors Affecting Access to Menopause Information." Menopause 7, no. 1 (2000): 62–67. http://dx.doi.org/10.1097/00042192-200007010-00010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Fontaine, Patrice, Sonia Jimenez-Garcès, and Mark S. Seasholes. "Common Factors, Information, and Holdings Dispersion*." Review of Finance 22, no. 4 (June 30, 2017): 1441–67. http://dx.doi.org/10.1093/rof/rfx030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Cross, Rosemary, and David Bawden. "Information technology: human and organizational factors." Journal of Information Science 13, no. 5 (October 1987): 277–84. http://dx.doi.org/10.1177/016555158701300502.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Sharples, Sarah, Michael Brown, Jenny Harding, and Mike Jackson. "Usability, human factors and geographic information." Applied Ergonomics 44, no. 6 (November 2013): 853–54. http://dx.doi.org/10.1016/j.apergo.2013.02.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Wood, Charles Cresson. "Information systems security: Management success factors." Computers & Security 6, no. 4 (August 1987): 314–20. http://dx.doi.org/10.1016/0167-4048(87)90066-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Krcmar, Helmut, and Henry C. Lucas. "Success factors for strategic information systems." Information & Management 21, no. 3 (October 1991): 137–45. http://dx.doi.org/10.1016/0378-7206(91)90060-f.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Basnet, Shanti. "Influential Factors of Geo-Information Sharing." Journal on Geoinformatics, Nepal 13 (March 13, 2017): 7–13. http://dx.doi.org/10.3126/njg.v13i0.16932.

Full text
Abstract:
Information resources, spatial or non-spatial are used widely and wisely to improve the organization's operation in today's competitive environment. With the advancement of information and communication technology, information sharing is made feasible and practiced within various entities. However, information sharing can be complex. There are various factors that influence cross-boundary information sharing because each organization operates within complex information, organizational and national context. There can be differences in technology, knowledge, culture, politics, geography, resources, relationships and intentions. This paper highlights on the different factors that can influence the information sharing in different perspectives.Nepalese Journal on Geoinformatics -13, 2014, Page: 7-13
APA, Harvard, Vancouver, ISO, and other styles
29

Rajendrakumar, Barot Mukti. "Evaluation of Critical Success Factors for Accounting Information Systems Data Quality in Gujarat." International Journal of Scientific Research 3, no. 2 (June 1, 2012): 151–53. http://dx.doi.org/10.15373/22778179/feb2014/49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Fadjar, Achmad. "Factors that Influence Decision Making through the Application of Management Accounting Information Systems." International Journal of Psychosocial Rehabilitation 24, no. 2 (February 13, 2020): 2689–97. http://dx.doi.org/10.37200/ijpr/v24i2/pr200565.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Faber Frandsen, Tove, Ronald Rousseau, and Ian Rowlands. "Diffusion factors." Journal of Documentation 62, no. 1 (January 2006): 58–72. http://dx.doi.org/10.1108/00220410610642048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Brookes, B. C. "Human factors." Journal of Information Science 10, no. 1 (January 1985): 47. http://dx.doi.org/10.1177/016555158501000107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Kang, Jae-Jung, and Yoo-Jung Kim. "Effects of Information Literacy and Motivation Factors on Information Representation Capability and Information Contribution." Journal of Digital Convergence 15, no. 1 (January 28, 2017): 97–108. http://dx.doi.org/10.14400/jdc.2017.15.1.97.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Wong, Wai Peng, Hwee Chin Tan, Kim Hua Tan, and Ming-Lang Tseng. "Human factors in information leakage: mitigation strategies for information sharing integrity." Industrial Management & Data Systems 119, no. 6 (July 8, 2019): 1242–67. http://dx.doi.org/10.1108/imds-12-2018-0546.

Full text
Abstract:
Purpose The purpose of this paper is to explore the human factors triggering information leakage and investigate how companies mitigate insider threat for information sharing integrity. Design/methodology/approach The methodology employed is multiple case studies approach with in-depth interviews with five multinational enterprises (MNEs)/multinational corporations (MNCs). Findings The findings reveal that information leakage can be approached with human governance mechanism such as organizational ethical climate and information security culture. Besides, higher frequency of leakages negatively affects information sharing integrity. Moreover, this paper also contributes to a research framework which could be a guide to overcome information leakage issue in information sharing. Research limitations/implications The current study involved MNCs/MNEs operating in Malaysia, while companies in other countries may have different ethical climate and information sharing culture. Thus, for future research, it will be good to replicate the study in a larger geographic region to verify the findings and insights of this research. Practical implications This research contributes to the industry and business that are striving toward solving the mounting problem of information leakage by raising awareness of human factors and to take appropriate mitigating governance strategies to pre-empt information leakage. This paper also contributes to a novel theoretical model that characterizes the iniquities of humans in sharing information, and suggests measures which could be a guide to avert disruptive leakages. Originality/value This paper is likely an unprecedented research in molding human governance in the domain of information sharing and its Achilles’ heel which is information leakage.
APA, Harvard, Vancouver, ISO, and other styles
35

Martinkėnas, Arvydas, Vytautas Kaminskas, and Giedrius Varoneckas. "Forecast Model of Impact of Meteorological Factors on Coronary Artery Disease Patients." Informatica 18, no. 3 (January 1, 2007): 407–18. http://dx.doi.org/10.15388/informatica.2007.185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Ramsey, N. F. "Neurophysiological factors in human information processing capacity." Brain 127, no. 3 (November 7, 2003): 517–25. http://dx.doi.org/10.1093/brain/awh060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Suganthy, A., and Moinak Maiti. "Information Security Evolution, Impact and Design Factors." International Journal of Computer Applications 100, no. 2 (August 20, 2014): 14–19. http://dx.doi.org/10.5120/17496-8028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Magal, Simha R., Houston H. Carr, and Hugh J. Watson. "Critical Success Factors for Information Center Managers." MIS Quarterly 12, no. 3 (September 1988): 413. http://dx.doi.org/10.2307/249208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Kamalzadeh takhti, Hesamaddin, Azizah Binti Abdul Rahman, and Samireh Abedini. "Factors Determining Nurses Hospital Information System Usage." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 3, no. 3 (May 31, 2013): 37–44. http://dx.doi.org/10.24297/ijmit.v3i3.1721.

Full text
Abstract:
This study employs the combined technology acceptance model (TAM) and theory of planned behavior (TPB) (i.e., C-TAM-TPB) that extended with self-efficacy and knowledge of information technology to examine HIS acceptance by Malaysian nurses. A cross-sectional survey was conducted in three public hospitals in Malaysia to gather data from practicing nurses with experience of using HIS. Structural equation modeling using the partial least squares (PLS) method was utilized to evaluate measurements and structural models. The results stress that a nurses intention was significantly influenced by three factors, including his or her attitude, the subjective norm, and perceived behavioral control. The results also indicate that the model can explain over half of the variance in the intention to use HIS.
APA, Harvard, Vancouver, ISO, and other styles
40

Bojmaeh, Hanieh Yaghoobi. "The Main Factors Influencing Information Security Behavior." International Journal of Science and Engineering Applications 4, no. 6 (December 7, 2015): 353–56. http://dx.doi.org/10.7753/ijsea0406.1004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Singh, Harmandeep, and Arwinder Singh. "Factors Influencing Web Accessibility of Corporate Information." International Journal of E-Business Research 16, no. 3 (July 2020): 1–19. http://dx.doi.org/10.4018/ijebr.2020070101.

Full text
Abstract:
With the rapidly growing demand for corporate information from the external stakeholders, the Internet is a crucial instrument for meeting the required information. The web-based disclosure is an improvised version of the traditional form of disclosure with enhanced technology. In spite of that, web-based disclosure is the most prevalent form of business communication, and the accessibility of corporate information on webpages is a concern area for the organization. Thus, this article is an attempt to study the web accessibility of corporate information disclosed by 100 large BSE listed Indian companies and also to identify the firm determinants that affect the web accessibility of corporate information. The study reveals that the web-accessibility of the company website is increased with company size and company listing age. It also shows that companies with a low market risk have more concerns for the web accessibility of corporate information. The results of the study are helpful for the organizations to make policies for the advancement of web accessibility on the webpages.
APA, Harvard, Vancouver, ISO, and other styles
42

Alshamari, Majed. "Usability Factors Assessment in Health Information System." Intelligent Information Management 08, no. 06 (2016): 170–80. http://dx.doi.org/10.4236/iim.2016.86012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Biehl, Markus. "Success factors for implementing global information systems." Communications of the ACM 50, no. 1 (January 2007): 52–58. http://dx.doi.org/10.1145/1188913.1188917.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Berné, Carmen, Jose M. Múgica, Marta Pedraja, and Pilar Rivera. "Factors involved in price information-seeking behaviour." Journal of Retailing and Consumer Services 8, no. 2 (March 2001): 71–84. http://dx.doi.org/10.1016/s0969-6989(99)00027-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Law, David, and Narasimhaiah Gorla. "Exploring factors underlying effective office information systems." Information & Management 31, no. 1 (October 1996): 25–35. http://dx.doi.org/10.1016/s0378-7206(96)01055-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

박철 and Park,Seong-Kyu. "Factors Affecting the Environmental Accounting Information Disclosure." Global Business Administration Review 9, no. 3 (September 2012): 25–43. http://dx.doi.org/10.17092/jibr.2012.9.3.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Muhaya. "Dominant Factors in National Information Security Policies." Journal of Computer Science 6, no. 7 (July 1, 2010): 808–12. http://dx.doi.org/10.3844/jcssp.2010.808.812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

GERENCSÉR, BALÁZS, and VIKTOR HARANGI. "Mutual information decay for factors of i.i.d." Ergodic Theory and Dynamical Systems 39, no. 11 (April 29, 2018): 3015–30. http://dx.doi.org/10.1017/etds.2018.3.

Full text
Abstract:
This paper is concerned with factors of independent and identically distributed processes on the $d$ -regular tree for $d\geq 3$ . We study the mutual information of values on two given vertices. If the vertices are neighbors (i.e. their distance is $1$ ), then a known inequality between the entropy of a vertex and the entropy of an edge provides an upper bound for the (normalized) mutual information. In this paper we obtain upper bounds for vertices at an arbitrary distance $k$ , of order $(d-1)^{-k/2}$ . Although these bounds are sharp, we also show that an interesting phenomenon occurs here: for any fixed process, the rate of mutual information decay is much faster, essentially of order $(d-1)^{-k}$ .
APA, Harvard, Vancouver, ISO, and other styles
49

Yeo, K. T. "Critical failure factors in information system projects." International Journal of Project Management 20, no. 3 (April 2002): 241–46. http://dx.doi.org/10.1016/s0263-7863(01)00075-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Narain Singh, Abhishek, M. P. Gupta, and Amitabh Ojha. "Identifying factors of “organizational information security management”." Journal of Enterprise Information Management 27, no. 5 (September 2, 2014): 644–67. http://dx.doi.org/10.1108/jeim-07-2013-0052.

Full text
Abstract:
Purpose – Despite many technically sophisticated solutions, managing information security has remained a persistent challenge for organizations. Emerging IT/ICT media have posed new security challenges to business information and information assets. It is felt that technical solutions alone are not sufficient to address the information security challenge. It has been argued that organizations also need to consider the management aspects of information security. Consequently, literature, especially in the last decade, has witnessed various scholarly works in this direction. Therefore, a synthesis exercise is required to bring clarity on categorizing the issues of organizational information security management (ISM) to take the research forward. The purpose of this paper is to identify management factors that address organizational information security challenges. Design/methodology/approach – Using a mix method approach, the paper adopts the qualitative (keyword analysis and experts’ opinion) and quantitative (questionnaire survey) research routes. Exploratory factor analysis is conducted to find out the key factors of organizational ISM. Findings – The paper categorizes various organizational ISM functions into ten factors. Spanning across three levels (strategic, tactical and operational), these factors cover various management issues of organizational ISM. Originality/value – The paper takes the ISM literature forward by statistically validating the key management factors of organizational ISM. The study outcome should help to draw the attention of organizations toward the managerial challenges of organizational ISM.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography