default search action
Ilona Ilvonen
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c13]Ilona Ilvonen, Maija Ylinen, Sonja Kari:
Facilitating group work skills in online environment: experiences from developing a course assignment. HICSS 2024: 2433-2442 - [c12]Alexandra Durcikova, Ilona Ilvonen, Murray E. Jennex:
Introduction to the Minitrack on Securing Knowledge, Innovation, and Entrepreneurial Systems and Managing Knowledge Risks. HICSS 2024: 5501-5502 - [c11]Murray E. Jennex, Alexandra Durcikova, Ilona Ilvonen, Jeffry Babb:
Assessing and Mitigating the Risk of Critical Knowledge Loss in Organizations: Insights from COVID-19 and the Great Resignation. HICSS 2024: 5522-5531 - 2023
- [c10]Ilona Ilvonen, Murray E. Jennex, Alexandra Durcikova:
Introduction to the Minitrack on Securing Knowledge, Innovation, and Entrepreneurial Systems and Managing Knowledge Risks. HICSS 2023: 4881 - 2022
- [c9]Murray E. Jennex, Alexandra Durcikova, Ilona Ilvonen:
Knowledge Systems and Risk Management: Threat Lessons Learned from COVID-19 in 2020-21. HICSS 2022: 1-10 - 2021
- [c8]Ilona Ilvonen, Alexandra Durcikova, Murray E. Jennex:
Introduction to the Minitrack on Securing Knowledge Systems and Managing Knowledge Risks. HICSS 2021: 1 - 2020
- [c7]Stefan Thalmann, Ilona Ilvonen:
Why Should We Investigate Knowledge Risks Incidents? - Lessons from Four Cases. HICSS 2020: 1-10
2010 – 2019
- 2019
- [c6]Samuli Pekkola, Henri Pirkkalainen, Pasi Hellsten, Ilona Ilvonen:
Foreword. SCIS 2019: 14 - [e1]Samuli Pekkola, Henri Pirkkalainen, Pasi Hellsten, Ilona Ilvonen:
10th Scandinavian Conference on Information Systems, SCIS 2019, Nokia, Finland, 11-14 August 2019. Association for Information Systems 2019, ISBN 978-0-578-53212-7 [contents] - 2018
- [c5]Katariina Kannus, Ilona Ilvonen:
Future Prospects of Cyber Security in Manufacturing: Findings from a Delphi Study. HICSS 2018: 1-10 - 2016
- [c4]Ilona Ilvonen, Aki Alanne, Nina Helander, Hannele Väyrynen:
Knowledge Sharing and Knowledge Security in Finnish Companies. HICSS 2016: 4021-4030 - [c3]Jussi Myllärniemi, Nina Helander, Pasi Hellsten, Ilona Ilvonen:
Co-design, co-teaching and co-learning in technology hands-on university tuition. MindTrek 2016: 153-158 - [c2]Heli Aramo-Immonen, Jari Juhani Jussila, Ilona Ilvonen, Nina Helander:
Perceived risks in social media use: a longitudinal study among university students. TEEM 2016: 777-780 - 2015
- [j4]Ilona Ilvonen, Jari Juhani Jussila, Hannu Kärkkäinen:
Towards a Business-Driven Process Model for Knowledge Security Risk Management: Making Sense of Knowledge Risks. Int. J. Knowl. Manag. 11(4): 1-18 (2015) - [c1]Ilona Ilvonen, Jari Jussila, Hannu Kärkkäinen, Tero Päivärinta:
Knowledge Security Risk Management in Contemporary Companies - Toward a Proactive Approach. HICSS 2015: 3941-3950 - 2013
- [j3]Ilona Ilvonen, Pasi Virtanen:
Preparing for Cyber Threats with Information Security Policies. Int. J. Cyber Warf. Terror. 3(4): 22-31 (2013) - [j2]Ilona Ilvonen, Vilma Vuori:
Risks and benefits of knowledge sharing in co-opetitive knowledge networks. Int. J. Netw. Virtual Organisations 13(3): 209-223 (2013) - [j1]Ilona Ilvonen:
Information Security Assessment of SMEs as Coursework: Learning Information Security Management by Doing. J. Inf. Syst. Educ. 24(1): 53-62 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint