Exploring Risks Transferred from Cloud-Based Information Systems: A Quantitative and Longitudinal Model W Bouaynaya, H Lyu, Z Zhang Sensors 18 (10), 3488, 2018 | 12 | 2018 |
Characterization of cloud computing reversibility as explored by the DELPHI method W Bouaynaya Information Systems Frontiers 22 (6), 1505-1518, 2020 | 11 | 2020 |
ICT for an Inclusive World Y Baghdadi, A Harfouche, M Musso Springer International Publishing, Cham (Lecture Notes in Information …, 2020 | 7 | 2020 |
Une exploration qualitative du rôle des opérateurs du Cloud Computing dans l’acheminement des données des PME W Bouaynaya, M Bidan Revue management et avenir, 65-83, 2017 | 7 | 2017 |
Cloud computing in SMEs: towards delegation of the CIO role W Bouaynaya Information & Computer Security 28 (2), 199-213, 2020 | 6 | 2020 |
Herding behaviour in peer-to-peer lending: the elaboration likelihood during the COVID-19 crisis W Bouaynaya, JM Vaslin Journal of Decision Systems, 1-12, 2023 | 2 | 2023 |
ECRM 2021 20th European Conference on Research Methods in Business and Management M Au-Yong-Oliveira, C Costa Academic Conferences International Limited, 2021 | 2 | 2021 |
Exploring Trust in Mobile Commerce during Pandemic Crisis W Bouaynaya, N Mavengere, O Kayas 2022 IEEE International Conference on e-Business Engineering (ICEBE), 119-123, 2022 | 1 | 2022 |
Knowledge Transfer and Boundary Objects: An Ecological View of the Research Center E Hamza, W Bouaynaya International Journal of Knowledge-Based Organizations (IJKBO) 12 (2), 1-12, 2022 | 1 | 2022 |
Time Construction in Information Systems Research: a Meta-Analytic Examination of Longitudinal Studies W Bouaynaya, M Dunes ICIS 2020 Proceedings 1, 2020 | 1 | 2020 |
Governance of IS Security in a Cloud Computing Ecosystem: A Longitudinal Approach W Bouaynaya ICT for an Inclusive World: Industry 4.0–Towards the Smart Enterprise, 527-536, 2020 | 1 | 2020 |
Mise en perspective théorique du construit sécurité dans le couplage Cloud Computing-Open Source W Bouaynaya Proceedings of the 21ème Colloque de l’AIM, Lille, France, 18-20, 2016 | 1 | 2016 |
Understanding and Managing Complex Software Vulnerabilities: An Empirical Analysis of Open-Source Operating Systems JL Richet, W Bouaynaya Systèmes d'Information et Management 28 (1), 2023 | | 2023 |
Blockchain at the boundaries W Bouaynaya, V Kin, JL Richet, B Aghhavani-Shajari Pré-ICIS FRAIS, 2022 | | 2022 |
Building Trust in Artificial Intelligence: Findings from Healthcare Organization A Rey, W Bouaynaya | | 2022 |
Institutionnalisation de la souveraineté numérique supranationale W Bouaynaya, J Cloarec, M Bidan 12ème conférence d'ATLAS AFMI, 2022 | | 2022 |
Plateformes et Ecosystèmes Numériques: Construire une Résilience Mondiale pour la «Nouvelle» Norme à l'Ere Post-Pandémie F Bahri-Korbi, W Bouaynaya, M Hani, T Levy, J Lichy 12ème conférence d'ATLAS AFMI, 2022 | | 2022 |
Theories in IS, a Matter of Time? A Study of Longitudinal Cases in IS Research W Bouaynaya, JL Richet pre-ICIS SIG PHIL–Products of Theorizing: Towards Native Theories of Emerging IT, 2021 | | 2021 |
Longitudinal Research in Information Systems: A Set of Methodological Guidelines W Bouaynaya European Conference on Research Methodology for Business and Management …, 2021 | | 2021 |
Cas en management des systèmes d'information: Études de cas-DCSG 5 C Godé, M Bidan Éditions EMS, 2020 | | 2020 |