default search action
Moshe Zviran
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j39]Yael Karlinsky-Shichor, Moshe Zviran:
Factors Influencing Perceived Benefits and User Satisfaction in Knowledge Management Systems. Inf. Syst. Manag. 33(1): 55-73 (2016) - 2011
- [j38]Lior Lazar, Omer Tikolsky, Chanan Glezer, Moshe Zviran:
Personalized Cognitive Passwords: An Exploratory Assessment. Inf. Manag. Comput. Secur. 19(1): 25-41 (2011) - [j37]Neomi Kaplan-Mor, Chanan Glezer, Moshe Zviran:
A comparative analysis of end-user training methods. J. Syst. Inf. Technol. 13(1): 25-42 (2011) - 2010
- [j36]Tamir Bechor, Seev Neumann, Moshe Zviran, Chanan Glezer:
A contingency model for estimating success of strategic information systems planning. Inf. Manag. 47(1): 17-29 (2010) - [j35]Zippy Erlich, Moshe Zviran:
Goals and Practices in Maintaining Information Systems Security. Int. J. Inf. Secur. Priv. 4(3): 40-50 (2010)
2000 – 2009
- 2009
- [j34]Stanislav Berlin, Tzvi Raz, Chanan Glezer, Moshe Zviran:
Comparison of estimation methods of cost and duration in IT projects. Inf. Softw. Technol. 51(4): 738-748 (2009) - 2008
- [j33]Moshe Zviran:
User's Perspectives on Privacy in Web-Based Applications. J. Comput. Inf. Syst. 48(4): 97-105 (2008) - 2007
- [j32]Ido Green, Tzvi Raz, Moshe Zviran:
Analysis of active intrusion prevention data for predicting hostile activity in computer networks. Commun. ACM 50(4): 63-68 (2007) - [j31]Aviv Segev, Moshe Leshno, Moshe Zviran:
Internet as a knowledge base for medical diagnostic assistance. Expert Syst. Appl. 33(1): 251-255 (2007) - [j30]Aviv Segev, Moshe Leshno, Moshe Zviran:
Context recognition using internet as a knowledge base. J. Intell. Inf. Syst. 29(3): 305-327 (2007) - 2006
- [j29]Moshe Zviran, Dov Te'eni, Yuval Gross:
Does color in email make a difference? Commun. ACM 49(4): 94-99 (2006) - [j28]Moshe Zviran, Zippy Erlich:
Identification and Authentication: Technology and Implementation Issues. Commun. Assoc. Inf. Syst. 17: 4 (2006) - [j27]David Gefen, Moshe Zviran, Natalie Elman:
What Can Be Learned from CMMi Failures? Commun. Assoc. Inf. Syst. 17: 36 (2006) - [j26]Moshe Zviran, Chanan Glezer, Itay Avni:
User satisfaction from commercial web sites: The effect of design and use. Inf. Manag. 43(2): 157-178 (2006) - 2005
- [j25]Moshe Zviran, Chanan Glezer:
Website and organisational characteristics of Israeli firms. Int. J. Electron. Bus. 3(5): 411-426 (2005) - [j24]Moshe Zviran, Nava Pliskin, Ron Levin:
Measuring User Satisfaction and Perceived Usefulness in the ERP Context. J. Comput. Inf. Syst. 45(3): 43-52 (2005) - 2004
- [c3]Chanan Glezer, Moshe Zviran:
A Reconfiguration Algorithm for Distributed Computer Networks. ICEIS (1) 2004: 491-494 - [c2]Moshe Zviran, Seev Neumann, Diego Hocksman:
Privacy Concerns in Internet Applications. ICEIS (3) 2004: 592-595 - 2003
- [j23]Moshe Zviran, Zippy Erlich:
Measuring IS User Satisfaction: Review and Implications. Commun. Assoc. Inf. Syst. 12: 5 (2003) - [j22]Moshe Zviran, Niv Ahituv, Chanan Glezer:
A conceptual model for increasing utilization of dependable computer networks. Data Knowl. Eng. 46(3): 247-269 (2003) - 2002
- [j21]Moshe Zviran:
Securing PC applications: the relay race approach. Commun. ACM 45(4): 219-227 (2002) - [j20]Niv Ahituv, Seev Neumann, Moshe Zviran:
A System Development Methodology for ERP Systems. J. Comput. Inf. Syst. 42(3): 56-67 (2002) - 2001
- [j19]Moshe Zviran, Niv Ahituv, Aviad Armoni:
Building outsourcing relationships across the global community: the UPS-Motorola experience. J. Strateg. Inf. Syst. 10(4): 313-333 (2001) - 2000
- [j18]Moshe Zviran, Chanan Glezer:
Towards Generating a Data Integrity Standard. Data Knowl. Eng. 32(3): 291-313 (2000)
1990 – 1999
- 1999
- [j17]Niv Ahituv, Moshe Zviran, Chanan Glezer:
Top Management Toolbox for Managing Corporate IT. Commun. ACM 42(4): 93-99 (1999) - [j16]Moshe Zviran, William J. Haga:
Password Security: An Empirical Study. J. Manag. Inf. Syst. 15(4): 161-186 (1999) - 1997
- [j15]Seev Neumann, Moshe Zviran:
Tel Aviv City hall - The computerization revolution. J. Strateg. Inf. Syst. 6(2): 149-167 (1997) - 1996
- [j14]Magid Igbaria, Moshe Zviran:
Comparison of end-user computing characteristics in the U.S., Israel and Taiwan. Inf. Manag. 30(1): 1-13 (1996) - 1994
- [j13]William J. Haga, Moshe Zviran:
Information systems effectiveness: research designs for causal inference. Inf. Syst. J. 4(2): 141-166 (1994) - 1993
- [j12]Moshe Zviran, William J. Haga:
A Comparison of Password Techniques for Multilevel Authentication Mechanisms. Comput. J. 36(3): 227-237 (1993) - [j11]Moshe Zviran:
A comprehensive methodology for computer family selection. J. Syst. Softw. 22(1): 17-26 (1993) - 1992
- [j10]Seev Neumann, Niv Ahituv, Moshe Zviran:
A measure for determining the strategic relevance of IS to the organization. Inf. Manag. 22(5): 281-299 (1992) - 1991
- [j9]William J. Haga, Moshe Zviran:
Question-and-answer passwords: an empirical evaluation. Inf. Syst. 16(3): 335-343 (1991) - [j8]Magdi N. Kamel, Moshe Zviran:
A methodology for integrating heterogeneous data bases in a hospital environment. J. Syst. Softw. 15(3): 251-260 (1991) - 1990
- [j7]Moshe Zviran, James C. Hoge, Val A. Micucci:
SPAN - a DSS for security plan analysis. Comput. Secur. 9(2): 153-160 (1990) - [j6]Moshe Zviran, William J. Haga:
Cognitive passwords: The key to easy access control. Comput. Secur. 9(8): 723-736 (1990) - [j5]J. Daniel Couger, Heimo H. Adelsberger, Israel Borovits, Moshe Zviran, Juzar Motiwalla:
Commonalities in motivating environments for programmer/analysts in Austria, Israel, Singapore, and the U.S.A. Inf. Manag. 18(1): 41-46 (1990) - [j4]Moshe Zviran:
ISSPSS: A decision support system for information systems strategic planning. Inf. Manag. 19(5): 345-359 (1990) - [j3]Moshe Zviran:
Relationships between Organizational and Information Systems Objectives: Some Empirical Evidence. J. Manag. Inf. Syst. 7(1): 65-84 (1990) - [c1]Moshe Zviran, William J. Haga:
User authentication by cognitive passwords: an empirical assessment. Jerusalem Conference on Information Technology 1990: 137-144
1980 – 1989
- 1989
- [j2]Niv Ahituv, Seev Neumann, Moshe Zviran:
Factors Affecting the Policy for Distributing Computing Resources. MIS Q. 13(4): 389-401 (1989) - 1987
- [j1]Israel Borovits, Moshe Zviran:
Computer-family selection methodology for organizational information systems. Inf. Manag. 12(3): 107-115 (1987)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint