Collaborating with Bounty Hunters: How to Encourage White Hat Hackers’ Participation in Vulnerability Crowdsourcing Programs through Formal and Relational Governance (Englisch)
- Neue Suche nach: Li, Yuni
- Neue Suche nach: Zhao, Ling
- Neue Suche nach: Li, Yuni
- Neue Suche nach: Zhao, Ling
In:
Information and Management
;
59
, 4
;
2022
-
ISSN:
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:Collaborating with Bounty Hunters: How to Encourage White Hat Hackers’ Participation in Vulnerability Crowdsourcing Programs through Formal and Relational Governance
-
Beteiligte:Li, Yuni ( Autor:in ) / Zhao, Ling ( Autor:in )
-
Erschienen in:Information and Management ; 59, 4
-
Verlag:
- Neue Suche nach: Elsevier B.V.
-
Erscheinungsdatum:26.03.2022
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis – Band 59, Ausgabe 4
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
-
Collaborating with Bounty Hunters: How to Encourage White Hat Hackers’ Participation in Vulnerability Crowdsourcing Programs through Formal and Relational GovernanceLi, Yuni / Zhao, Ling et al. | 2022
-
Impact of mobile technology-enabled HR gamification on employee performance: An empirical investigationBenitez, Jose / Ruiz, Laura / Popovic, Ales et al. | 2022
-
Social Media Advertising through Private Messages and Public Feeds: A Congruency Effect between Communication Channels and Advertising AppealsZeng, Professor Fue / Wang, Ruijuan / Li, Assistant Professor Stella Yiyan / Qu, Associate Professor Zhe et al. | 2022
-
Designing crowdsolving Ba: A closer look at the features of crowdsolving platforms to manage organizational knowledgeZhao, Zhenzhen / Oberoi, Poonam et al. | 2022
-
Hybrid Social Media Use and Guanxi Types: How Do Employees Use Social Media in the Chinese Workplace?Zheng, Bowen / Davison, Robert M et al. | 2022
-
Corrigendum to “Estimating the impact of cloud computing on firm performance: An empirical investigation of listed firms”✰Chen, Xi / Guo, Ming / Shangguan, Wuyue et al. | 2022
-
Becoming agile together: Customer influence on agile adoption within commissioned software teamsCiriello, Dr. Raffaele Fabio / Glud, Jeppe Aagaard / Hansen-Schwartz, Kevin Helge et al. | 2022
-
A theoretical perspective on organizational culture and digitalizationGrover, Varun / Tseng, Shih-Lun / Pu, Wenxi et al. | 2022
-
Antecedents and consequences of data breaches: A systematic reviewSchlackl, Frederic / Link, Nico / Hoehle, Hartmut et al. | 2022
-
A dedication-constraint model of consumer switching behavior in mobile payment applicationsGong, Xiang / Liu, Xiaoxiao / Xiao, Zhenxin et al. | 2022
-
Data Matters: A Strategic Action Framework for Data GovernanceZhang, Qingqiang / Sun, Xinbo / Zhang, Mingchao et al. | 2022
-
Editorial Board| 2022
-
Corrigendum to “Consumer preference analysis based on text comments and ratings: A multi-attribute decision-making perspective”✰Zhu, Bin / Guo, Dingfei / Ren, Long et al. | 2022