Search Results for Information technology -- Research. - Narrowed by: Business administration.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dInformation$002btechnology$002b--$002bResearch.$0026qf$003dSUBJECT$002509Subject$002509Business$002badministration.$002509Business$002badministration.$0026ps$003d300?dt=list2026-04-23T09:42:49ZData Security in the Age of Big Data in the Financial Industryent://SD_ILS/0/SD_ILS:6821992026-04-23T09:42:49Z2026-04-23T09:42:49Zby Noutoua, Jean Sylvestre, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10824619">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10824619</a><br/>Format: Books<br/>Investigation into Barriers Preventing IT-Business Strategic Alignment in Medium-Sized Manufacturing Organizations in the Midwest Region of the United States of Americaent://SD_ILS/0/SD_ILS:6825702026-04-23T09:42:49Z2026-04-23T09:42:49Zby Sandusky, William B., author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10826392">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10826392</a><br/>Format: Books<br/>The Relationship Between Emotional Intelligence, Leadership Style, and Leader Effectiveness: A Quantitative Correlation Studyent://SD_ILS/0/SD_ILS:6819772026-04-23T09:42:49Z2026-04-23T09:42:49Zby Beckles, Arlene Patricia, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10823623">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10823623</a><br/>Format: Books<br/>A Study on How Cyber Economic Espionage Affects U.S. National Security and Competitivenessent://SD_ILS/0/SD_ILS:6948072026-04-23T09:42:49Z2026-04-23T09:42:49Zby Mayers, Adrian Merton, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828940">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828940</a><br/>Format: Books<br/>Employees' Intentional Violation of Information Security Policies in Organizations: The Leader- Member Exchange (LMX) Perspectiveent://SD_ILS/0/SD_ILS:6821262026-04-23T09:42:49Z2026-04-23T09:42:49Zby Ezeilo, Greg Ugochukwu, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10824298">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10824298</a><br/>Format: Books<br/>