Open Access
SHS Web Conf.
Volume 83, 2020
Current Problems of the Corporate Sector 2020
Article Number 01003
Number of page(s) 10
Section Economics, Management and Finance
Published online 30 October 2020
  1. V. Bolek, A. Romanova, P. Richnak, K. Porubanova, The use of pervasive technologies in business processes. Ad Alta-Journal Of Interdisciplinary Research, 9, 2, 293-298 (2019) [Google Scholar]
  2. A. Romanova, P. Richnak, K. Porubanova, V. Bolek, Application of modern information technology in innovation of business logistics processes. Ad Alta-Journal Of Interdisciplinary Research, 9, 1, 245-248 (2019) [Google Scholar]
  3. M. Kokles, A. Romanova, A. Hamranova, Information Systems in the post-transition period in enterprises in Slovakia. Journal of Global Information Technology Management, 18, 2, 110-126 (2015) [CrossRef] [Google Scholar]
  4. A. Hamranová, Š. Marsina, P. Molnár, F. Okruhlica, Development of Information and Communication Systems within the Building of Project-Oriented Manufacturing Organization. Advances in production management systems: innovative and knowledge-based production management in a global-local world, pt 1 Book Series: IFIP Advances in Information and Communication Technology, 438, 241-+ (2014) [Google Scholar]
  5. F. Korcek, V. Bolek, A. Romanova, P. Richnak, Practicing information security management system in e-commerce. Ad Alta-Journal Of Interdisciplinary Research, 8, 1, 207-212 (2018) [Google Scholar]
  6. D. G. Moody, M. Siponen, S. Pahnila, Toward a unified model of information security policy compliance. MIS quarterly, 42, 1, 285-+ (2018) [Google Scholar]
  7. Y. Zhang, Y. L. Zhang, J. Zhou, L. Liu, F. Chen, X. He, A review of compressive sensing in information security field. IEEE access, 4, 2507-2519 (2016) [CrossRef] [Google Scholar]
  8. J. D’Arcy, P. B. Lowry, Cognitive‐affective drivers of employees’ daily compliance with information security policies: A multilevel, longitudinal study. Information Systems Journal, 29, 1, 43-69 (2019) [CrossRef] [Google Scholar]
  9. V. Bolek, A. Látečková, A. Romanová, F. KORČEK, Factors affecting information security focused on SME and agricultural enterprises. Agris on-line Papers in Economics and Informatics, 8, 4, 37-50 (2016) [CrossRef] [Google Scholar]
  10. P. Balozian, D. Leidner, M. Warkentin, Managers’ and employees’ differing responses to security approaches. Journal of Computer Information Systems, 59, 3, 197-210 (2019) [CrossRef] [Google Scholar]
  11. P. Ifinedo, Roles of organizational climate, social bonds, and perceptions of security threats on IS security policy compliance intentions. Information Resources Management Journal, 31, 1, 53-82 (2018) [CrossRef] [Google Scholar]
  12. PSIB SR ´06, Ernst & Young, NBÚ SR, DSM – data security management, TATE International Slovakia. last accessed 2007/09/11 [Google Scholar]
  13. PSIB SR ´08, Ernst & Young, NBÚ SR, DSM – data security management, TATE International Slovakia. last accessed 2009/05/06 [Google Scholar]
  14. Guideline on performing security audit of IS FM SR, 331/2003-22 (2003) [Google Scholar]
  15. M. Szarková, M. Andrejčák, Personnel audit in financial institutions in Slovac Republic. International scientific conference Financial management of Firms and Financial Institutions, Part III, 899-902 (2013) [Google Scholar]
  16. N. Matkovčíková, Health and safety management in companies of all size. International scientific conference Hradec Economic Days 2017, 597-603 (2017) [Google Scholar]
  17. J. Koubek, Řízení lidských zdrojů (Management Press, Praha, 2015) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.