Search

Your search keyword '"Jason Bennett"' showing total 481 results

Search Constraints

Start Over You searched for: Author "Jason Bennett" Remove constraint Author: "Jason Bennett"
481 results on '"Jason Bennett"'

Search Results

201. Reprogramming immunosuppressive tumour-associated dendritic cells with GADD45β inhibitors

202. Worker stress in the age of mobile technology: The combined effects of perceived interruption overload and worker control

203. CONCEPTUALIZING FLUID TEAM MEMBERSHIP AND ITS EFFECTS IN IT PROJECTS: A PRELIMINARY MODEL.

204. Avoiding pressure injuries with Root Cause Analysis and Action

205. Clinical proof of concept for a safe and effective NF-κB-targeting strategy in multiple myeloma

206. Deploying Machine Learning Models for Public Policy

208. Turning an old GADDget into a troublemaker

209. NF-κB in the crosshairs: Rethinking an old riddle

210. GADD45β loss ablates innate immunosuppression in cancer

211. Six types of IT-business strategic alignment: an investigation of the constructs and their measurement

212. Beliefs and Attributions toward Computing Technology

213. The role of user age in task performance: examining curvilinear and interaction effects of user age, expertise, and interface design on mistake making

214. Interrupting the Workplace: Examining Stressors in an Information Technology Context

215. Modern information technology in an old workforce: Toward a strategic research agenda

216. Development of a new patient-reported outcome (PRO) measure on the Impact of Nighttime Urination (INTU) in patients with nocturia-Psychometric validation

217. When Modern Technologies Meet Ageing Workforces: Older Workers are more affected by Demands from Mobile Interruptions than their Younger Counterparts

218. Partnering for Perioperative Skin Assessment: A Time to Change A Practice Culture

219. Incorporating trust-in-technology into Expectation Disconfirmation Theory

220. Research Note—Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance

221. Looking Toward the Future of IT-Business Strategic Alignment through the Past: A Meta-Analysis

222. Understanding the social web

223. Understanding online customers' ties to merchants: the moderating influence of trust on the relationship between switching costs and e-loyalty

224. The Influence of Social Aversion and Institution-Based Trust on Computer Self-Efficacy, Computer Anxiety and Antecedents to IT Use

225. Perspectives on numerical data quality in IS research

226. Political Affiliation in Resumes: Loathing, Disidentification, and the Dark Side of Assessment

229. How Much is Too Much: Employee Monitoring, Surveillance, and Strain.

230. Advancing operations management theory using exploratory structural equation modelling techniques.

231. Phishing Tests Are Necessary. But They Don't Need to Be Evil.

232. Electronic medical record compliance and continuity in delivery of care: an empirical investigation in a combat environment

233. Social Media in Employee-Selection-Related Decisions

234. Can we have fun @ work? The role of intrinsic motivation for utilitarian systems

235. The Influence of Social Aversion and Institution-Based Trust on Computer Self-Efficacy, Computer Anxiety and Antecedents to IT Use

236. Tacrolimus Modulates TGF-β Signaling to Induce Epithelial-Mesenchymal Transition in Human Renal Proximal Tubule Epithelial Cells

237. Examining Academic Support After Concussion for the Adolescent Student-Athlete: Perspectives of the Athletic Trainer

238. Mobile Phone Identity

239. The Moderating Effects of Privacy Restrictiveness and Experience on Trusting Beliefs and Habit: An Empirical Test of Intention to Continue Using a Social Networking Website

240. The Grass is Always Greener on The Other Side: A Test of Present and Alternative Job Utility on IT Professionals’ Turnover

241. Sustained therapeutic effects of percutaneous tibial nerve stimulation: 24-month results of the STEP study

242. Does Technology Trust Substitute Interpersonal Trust?

243. Post-Acceptance Intentions and Behaviors

244. Conceptualizing models using multidimensional constructs: a review and guidelines for their use

245. Trust in a specific technology

246. The Influence of Interactivity on E-service Offerings: An Empirical Examination of Benefits and Risks

247. The Role of Trust in Postadoption IT Exploration: An Empirical Examination of Knowledge Management Systems

248. Organisational change and capability reconfiguration in information technology innovation

249. Social influence and perceived organizational support: A social networks analysis

250. A Study of Work-Family Conflict Among IT Professionals: Job Characteristics, Individual Values, and Management Practices

Catalog

Books, media, physical & digital resources