Follow
Jean-Loup Richet
Jean-Loup Richet
Sorbonne Business School (IAE Paris)
Verified email at univ-paris1.fr - Homepage
Title
Cited by
Cited by
Year
Freedom on the Net (France report, from 2012 to 2019)
JL Richet
Freedom on the Net (yearly report, aggregated citations from 2012 to 2019), 2019
844*2019
Contact-tracing apps and alienation in the age of COVID-19
F Rowe, O Ngwenyama, JL Richet
European Journal of Information Systems 29 (5), 545-562, 2020
1382020
Laundering Money Online: a review of cybercriminals methods
JL Richet
Tools and Resources for Anti-Corruption Knowledge (UNODC), 2013
602013
From young hackers to crackers
JL Richet
International Journal of Technology and Human Interaction (IJTHI) 9 (3), 53-62, 2013
292013
Extortion on the Internet: the Rise of Crypto-Ransomware
JL Richet
Berkman Center for Internet & Society at Harvard University 2015, 0
24*
Cybersecurity Policies and Strategies for Cyberwarfare Prevention
JL RICHET
Information Science Reference, Hershey, 2015
182015
Agile Innovation: Cases and Applied Research, n. 31
JL Richet
ESSEC, 2013
11*2013
How to Become a Black Hat Hacker? An Exploratory Study of Barriers to Entry Into Cybercrime
JL Richet
AIM 2012, 2012
112012
Key stakeholders dissent and their influences in the reframing of strategic intent in IS-enabled organizational transformation
JL Richet, O Ngwenyama, F Rowe
102016
How cybercriminal communities grow and change: An investigation of ad-fraud communities
JL Richet
Technological Forecasting and Social Change 174, 121282, 2022
72022
Overt censorship: a fatal mistake?
JL Richet
Communications of the ACM 56 (8), 37-38, 2013
72013
Information systems management: Governance, urbanization and alignment
D Alban, P Eynaud, J Malaurent, JL Richet, C Vitari
John Wiley & Sons, 2019
52019
Apps and downs: Cross-country variations in the success of contact-tracing technology
A Grosman, S Porcher, JL Richet
Academy of Management Proceedings 2022 (1), 16109, 2022
42022
Internal communication failure in times of change
JL Richet
Organizational change management strategies in modern business, 289-300, 2016
42016
How to Become a Cybercriminal?: An Explanation of Cybercrime Diffusion
JL Richet
Human Behavior, Psychology, and Social Interaction in the Digital Era, 229-240, 2015
32015
Internet et usages: ce que la Libye a appris de la révolution en Égypte
JL RICHET
Analyse stratégique, 2011
32011
A loose coupling perspective on Ancient Egypt economy and society
JL Richet
Business History 64 (6), 1149-1171, 2022
22022
Financial crimes: Psychological, technological, and ethical issues
M Dion, D Weisstub, JL Richet
Springer, 2016
22016
Cornerstone of terror: the double-edged impact of fear appeals in a transformational information system security project
JL Richet, F Rowe
ICIS 2014, 2014
22014
Game-Changing Strategies: How to Create New Market Space in Established Industries by Breaking the Rules—Constantinos C. Markides.(San Francisco, CA: Jossey-Bass, 256 pages …
JL Richet
IEEE Transactions on Engineering Management 61 (1), 196-197, 2013
22013
The system can't perform the operation now. Try again later.
Articles 1–20