关注
Ella Kolkowska
Ella Kolkowska
未知所在单位机构
在 oru.se 的电子邮件经过验证
标题
引用次数
引用次数
年份
Value conflicts for information security management
K Hedström, E Kolkowska, F Karlsson, JP Allen
The Journal of Strategic Information Systems 20 (4), 373-384, 2011
2322011
Organizational power and information security rule compliance
E Kolkowska, G Dhillon
Computers & Security 33, 3-11, 2013
1332013
Factors influencing seniors’ acceptance of technology for ageing in place in the post-implementation stage: A literature review
A Tsertsidis, E Kolkowska, K Hedström
International journal of medical informatics 129, 324-333, 2019
1312019
Information privacy in e-service: Effect of organizational privacy assurances on individual privacy concerns, perceptions, trust and self-disclosure behavior
C Mutimukwe, E Kolkowska, Å Grönlund
Government Information Quarterly 37 (1), 101413, 2020
1292020
Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method
E Kolkowska, F Karlsson, K Hedström
The Journal of Strategic Information Systems 26 (1), 39-57, 2017
1292017
Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale
K Hedström, F Karlsson, E Kolkowska
Information Management & Computer Security 21 (4), 266-287, 2013
802013
Inter-organisational information sharing in the public sector: A longitudinal case study on the reshaping of success factors
F Karlsson, M Frostenson, F Prenkert, E Kolkowska, S Helin
Government Information Quarterly 34 (4), 567-577, 2017
512017
An interface for IoT: feeding back health-related data to Parkinson’s disease patients
M Memedi, G Tshering, M Fogelberg, I Jusufi, E Kolkowska, G Klein
Journal of Sensor and Actuator Networks 7 (1), 14, 2018
502018
Inter-organisational information security: A systematic literature review
F Karlsson, E Kolkowska, F Prenkert
Information & Computer Security 24 (5), 418-451, 2016
412016
Security subcultures in an organization-exploring value conflicts.
E Kolkowska
ECIS, 237, 2011
372011
Trusting and adopting e-government services in developing countries? Privacy concerns and practices in rwanda
C Mutimukwe, E Kolkowska, Å Grönlund
Electronic Government: 16th IFIP WG 8.5 International Conference, EGOV 2017 …, 2017
322017
Information privacy practices in e‐government in an African least developing country, Rwanda
C Mutimukwe, E Kolkowska, Å Grönlund
The Electronic Journal of Information Systems in Developing Countries 85 (2 …, 2019
202019
Using care professionals as proxies in the design process of welfare technology–perspectives from municipality care
M Sjölinder, I Scandurra, A Avatare Nou, E Kolkowska
Human Aspects of IT for the Aged Population. Aging, Design and User …, 2017
172017
To capture the diverse needs of welfare technology stakeholders–evaluation of a value matrix
E Kolkowska, A Avatare Nöu, M Sjölinder, I Scandurra
Human Aspects of IT for the Aged Population. Applications, Services and …, 2017
162017
The hunt for computerized support in information security policy management: a literature review
E Rostami, F Karlsson, E Kolkowska
Information & Computer Security 28 (2), 215-259, 2020
152020
Can a cloud be really secure? A socratic dialogue
G Dhillon, E Kolkowska
Computers, privacy and data protection: an element of choice, 345-360, 2011
152011
Information security goals in a Swedish hospital
E Kolkowska, K Hedström, F Karlsson
8th Annual Security Conference, 15-16 April 2009, Las Vegas, USA, Article no. 16, 2009
152009
Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis
F Karlsson, E Kolkowska, J Petersson
Computers & Security 114, 102578, 2022
142022
Socio-technical challenges in implementation of monitoring technologies in elderly care
E Kolkowska, A Avatare Nöu, M Sjölinder, I Scandurra
Human Aspects of IT for the Aged Population. Healthy and Active Aging …, 2016
142016
Privacy dimensions in design of smart home systems for elderly people
E Kolkowska, M Kajtazi
132015
系统目前无法执行此操作,请稍后再试。
文章 1–20