-
1
-
-
33746633350
-
Perceived usefulness, easy of use, and usage of information technology: A replication
-
Adams , D.A., Nelson, R.R. and Todd, P.A. (1992), "Perceived usefulness, easy of use, and usage of information technology: a replication", MIS Quarterly, Vol. 16 No. 2, pp. 227-47.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 227-247
-
-
Adams, D.A.1
Nelson, R.R.2
Todd, P.A.3
-
3
-
-
0004171316
-
-
McGraw-Hill, New York, NY
-
Bartol, K.M. and Martin, D.C. (1994), Management, Second international edition, McGraw-Hill, New York, NY.
-
(1994)
Management, Second International Edition
-
-
Bartol, K.M.1
Martin, D.C.2
-
4
-
-
6744247045
-
Logical controls specification: An approach to information system security
-
Klein, H. and Kumar, K. (Eds), North-Holland, Amsterdam
-
Baskerville, R. (1989), "Logical controls specification: an approach to information system security", in Klein, H. and Kumar, K. (Eds), Systems Development for Human Progress, North-Holland, Amsterdam.
-
(1989)
Systems Development for Human Progress
-
-
Baskerville, R.1
-
5
-
-
0002608856
-
In search of the moral manager
-
Carrol , A.B. (1987), "In search of the moral manager", Business Horizons, March-April, p. 8.
-
(1987)
Business Horizons
, vol.MARCH-APRIL
, pp. 8
-
-
Carrol, A.B.1
-
6
-
-
6744255767
-
Penetration testing through social engineering
-
Ceraolo, J.P. (1996), "Penetration testing through social engineering", Information Systems Security, Vol. 4 No. 4, Winter.
-
(1996)
Information Systems Security
, vol.4
, Issue.4 WINTER
-
-
Ceraolo, J.P.1
-
8
-
-
0030307369
-
An empirical assessment of a modified technology acceptance model
-
Chau, P (1996), "An empirical assessment of a modified technology acceptance model", Journal of Management Information Systems, Vol. 13 No. 2, pp. 185-205.
-
(1996)
Journal of Management Information Systems
, vol.13
, Issue.2
, pp. 185-205
-
-
Chau, P.1
-
9
-
-
0012207738
-
Building commitment to organizational change
-
Conner, D.L. and Patterson, R.W. (1982), "Building commitment to organizational change", Training and Development Journal, April, pp. 18-30.
-
(1982)
Training and Development Journal
, vol.APRIL
, pp. 18-30
-
-
Conner, D.L.1
Patterson, R.W.2
-
10
-
-
6744251943
-
Why there is really no such things as the theory of motivation
-
Dancy, J. (1994), "Why there is really no such things as the theory of motivation", Proceedings of the Aristotelian Society.
-
(1994)
Proceedings of the Aristotelian Society
-
-
Dancy, J.1
-
11
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
Davis , F. (1989), "Perceived usefulness, perceived ease of use, and user acceptance of information technology", MIS Quarterly, Vol. 13 No. 3, September, pp. 319-40.
-
(1989)
MIS Quarterly
, vol.13
, Issue.3 SEPTEMBER
, pp. 319-340
-
-
Davis, F.1
-
13
-
-
0003631043
-
-
Plenum Press, New York, NY
-
Deci, E.L. and Ryan, R.M. (1985), Intrinsic Motivation and Self-determination in Human Behaviour, Plenum Press, New York, NY.
-
(1985)
Intrinsic Motivation and Self-determination in Human Behaviour
-
-
Deci, E.L.1
Ryan, R.M.2
-
14
-
-
0003551671
-
-
Addison-Wesley, Reading, MA
-
Fishbein, M. and Ajzen, I. (1975), Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Addison-Wesley, Reading, MA.
-
(1975)
Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research
-
-
Fishbein, M.1
Ajzen, I.2
-
16
-
-
0024859373
-
Security concerns of system users: A proposed study of user perceptions of the adequacy of security measures
-
Kona, HA, January
-
Goodhue, D.L. and Straub, D.W. (1989), "Security concerns of system users: a proposed study of user perceptions of the adequacy of security measures", Proceedings of the 21st Hawaii International Conference on System Science (HICSS), Kona, HA, January.
-
(1989)
Proceedings of the 21st Hawaii International Conference on System Science (HICSS)
-
-
Goodhue, D.L.1
Straub, D.W.2
-
18
-
-
6744260747
-
-
Oxford University Press, Reprinted in 20th century Ethical theory, in Cahn, S.M. and Haber, J.G. (Eds), R.M Hare: A Moral Argument, 1995, Prentice-Hall, Englewood Cliffs, NJ
-
Hare, R.M. (1963), Freedom and Reason, Oxford University Press, Reprinted in 20th century Ethical theory, in Cahn, S.M. and Haber, J.G. (Eds), R.M Hare: A Moral Argument, 1995, Prentice-Hall, Englewood Cliffs, NJ.
-
(1963)
Freedom and Reason
-
-
Hare, R.M.1
-
19
-
-
0004093084
-
-
Oxford University Press, Oxford
-
Hare, R.M. (1997), Sorting Out Ethics, Oxford University Press, Oxford.
-
(1997)
Sorting out Ethics
-
-
Hare, R.M.1
-
21
-
-
0002042413
-
The 9 to 5 underground: Are you policing computer crimes?
-
Hoffer, J.A. and Straub, D.W. (1989), "The 9 to 5 underground: are you policing computer crimes?", Sloan Management Review, Vol. 30 No. 4, Summer.
-
(1989)
Sloan Management Review
, vol.30
, Issue.4 SUMMER
-
-
Hoffer, J.A.1
Straub, D.W.2
-
22
-
-
0001080103
-
Personal computing acceptance factors in small firms: A structural equation model
-
Igbaria, M. and Zinatelli, N. (1997), "Personal computing acceptance factors in small firms: a structural equation model", MIS Quarterly, Vol. 21 No. 3.
-
(1997)
MIS Quarterly
, vol.21
, Issue.3
-
-
Igbaria, M.1
Zinatelli, N.2
-
23
-
-
0011648740
-
The new classification of research approaches
-
Edited by Zemanek, H., IFIP, Laxenburg
-
Järvinen, P. (1997), "The new classification of research approaches", The IFIP Pink Summary - 35 Years of IFIP, Edited by Zemanek, H., IFIP, Laxenburg.
-
(1997)
The IFIP Pink Summary - 35 Years of IFIP
-
-
Järvinen, P.1
-
24
-
-
0031344483
-
Developing ethical practices to minimise computer misuse
-
IEEE Computer Society Press, Piscataway, NJ
-
Kesar, S. and Rogerson, S. (1997), "Developing ethical practices to minimise computer misuse", Proceedings of International IEEE Symposium on Technology and Society: "Technology and Society at a Time of Sweeping Change", IEEE Computer Society Press, Piscataway, NJ.
-
(1997)
Proceedings of International IEEE Symposium on Technology and Society: "Technology and Society at a Time of Sweeping Change"
-
-
Kesar, S.1
Rogerson, S.2
-
26
-
-
0002175441
-
The truth, the quality, and the interpretation
-
Julkunen, K. (Ed.), University of Joensuu, Bulletins of the Faculty of Education, Joensuu, Finland
-
Koski, L. (1996), "The truth, the quality, and the interpretation", in Julkunen, K. (Ed.), Qualitative Methodology in Educational Research, University of Joensuu, Bulletins of the Faculty of Education, No. 60, Joensuu, Finland.
-
(1996)
Qualitative Methodology in Educational Research
, Issue.60
-
-
Koski, L.1
-
27
-
-
84938015068
-
Collective and individual moral responsibility in engineering: Some questions
-
Ladd, J. (1982), "Collective and individual moral responsibility in engineering: some questions", IEEE Technology and Society, Vol. 1 No. 2, pp. 3-10.
-
(1982)
IEEE Technology and Society
, vol.1
, Issue.2
, pp. 3-10
-
-
Ladd, J.1
-
28
-
-
43549112930
-
The motivation sequence, the motivation hub, and the motivation core
-
Locke, E.A. (1991), "The motivation sequence, the motivation hub, and the motivation core", Organizational Behavior and Human Decision Processes, Vol. 50, pp. 288-99.
-
(1991)
Organizational Behavior and Human Decision Processes
, vol.50
, pp. 288-299
-
-
Locke, E.A.1
-
30
-
-
73549114871
-
Predicting user intentions: Comparing the technology acceptance model with the theory of planned behaviour
-
Mathieson, K. (1991), "Predicting user intentions: comparing the technology acceptance model with the theory of planned behaviour", Information System Research, Vol. 3 No. 2, pp. 173-91.
-
(1991)
Information System Research
, vol.3
, Issue.2
, pp. 173-191
-
-
Mathieson, K.1
-
31
-
-
6744260746
-
Information security awareness - Selling the cause
-
27-29 May, Singapore
-
McLean, K. (1992), "Information security awareness - selling the cause", Proceedings of the IFIP TC11/Sec'92, 27-29 May, Singapore.
-
(1992)
Proceedings of the IFIP TC11/Sec'92
-
-
McLean, K.1
-
32
-
-
84992944805
-
Business continuity: Awareness and training programmes
-
Morwood, G. (1998), "Business continuity: awareness and training programmes", Information Management & Computer Security, Vol. 6 No. 1, pp. 28-32.
-
(1998)
Information Management & Computer Security
, vol.6
, Issue.1
, pp. 28-32
-
-
Morwood, G.1
-
33
-
-
0038562418
-
An Introduction to Computer Security
-
NIST special publications in October
-
(The) NIST Handbook (1995), An Introduction to Computer Security, NIST special publications in October.
-
(1995)
(The) NIST Handbook
-
-
-
36
-
-
6744221155
-
-
Aavaranta Serie. (in Finnish) Otava, Keuruu, Finland
-
Peltonen, M. (1989), Management in the 1990s, Aavaranta Serie. No. 14, (in Finnish) Otava, Keuruu, Finland.
-
(1989)
Management in the 1990s
, Issue.14
-
-
Peltonen, M.1
-
39
-
-
0004048289
-
-
Oxford University Press, Oxford
-
Rawls, J. A. (1972), A Theory of Justice, Oxford University Press, Oxford.
-
(1972)
A Theory of Justice
-
-
Rawls, J.A.1
-
41
-
-
0031644921
-
Ontology of organizational IT security awareness from theoretical foundations to practical framework
-
Third International Workshop on Enterprise Security, IEEE Computer Society Press, Los Alamitos, CA
-
Siponen, M.T. and Kajava, J. (1998), "Ontology of organizational IT security awareness From theoretical foundations to practical framework", Third International Workshop on Enterprise Security, IEEE 7th International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WET ICE '98), IEEE Computer Society Press, Los Alamitos, CA.
-
(1998)
IEEE 7th International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WET ICE '98)
-
-
Siponen, M.T.1
Kajava, J.2
-
43
-
-
6744265224
-
Competing against human failing. 15th IFIP World Computer Congress, 'The Global Information Society on the way to the next millennium'
-
TC11, Vienna
-
Spruit, M.E.M. (1998), "Competing against human failing. 15th IFIP World Computer Congress, 'The Global Information Society on the way to the next millennium"', Proceedings of the SEC'98, TC11, Vienna.
-
(1998)
Proceedings of the SEC'98
-
-
Spruit, M.E.M.1
-
44
-
-
0242453511
-
Promoting security awareness and commitment
-
Spurling, P. (1995), "Promoting security awareness and commitment", Information Management and Computer Security, Vol. 3 No. 2, pp. 20-6.
-
(1995)
Information Management and Computer Security
, vol.3
, Issue.2
, pp. 20-26
-
-
Spurling, P.1
-
45
-
-
0011524195
-
-
SSE-CMM (1998a), The Model, v2.0, http:// www.sse-cmm.org.
-
(1998)
The Model, V2.0
-
-
-
48
-
-
0000280419
-
Effective IS security; an empirical study
-
Straub, D.W. (1990), "Effective IS security; an empirical study", Information System Research, Vol. 1 No. 2, June, pp. 255-77.
-
(1990)
Information System Research
, vol.1
, Issue.2 JUNE
, pp. 255-277
-
-
Straub, D.W.1
-
49
-
-
6744245495
-
Deterring highly motivated computer abuses: A field experiment in computer security
-
Singapore, 27-29 May
-
Straub, D., Carson, P. and Jones, E. (1992), "Deterring highly motivated computer abuses: a field experiment in computer security", Proceedings of the IFIP TC11/ Sec'92, Security and Control: From Small Systems to Large, Singapore, 27-29 May.
-
(1992)
Proceedings of the IFIP TC11/ Sec'92, Security and Control: From Small Systems to Large
-
-
Straub, D.1
Carson, P.2
Jones, E.3
-
50
-
-
0002630371
-
Testing the technology acceptance model across cultures: A three country study
-
Straub, D.W., Keil, M. and Brenner, W. (1997), "Testing the technology acceptance model across cultures: a three country study", Information & Management, Vol. 31 No. 1, November, pp. 1-11.
-
(1997)
Information & Management
, vol.31
, Issue.1 NOVEMBER
, pp. 1-11
-
-
Straub, D.W.1
Keil, M.2
Brenner, W.3
-
51
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D.W. and Welke, R.J. (1998), "Coping with systems risk: security planning models for management decision making", MIS Quarterly, Vol. 22 No. 4, p. 441-64.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-464
-
-
Straub, D.W.1
Welke, R.J.2
-
52
-
-
0003786918
-
-
Nuclear Regulatory Commission, Washington, DC
-
Swain, A. and Guttman, H. (1983), Handbook of Human Reliability Analysis with Emphasis on Nuclear Power Plant Applications, Nuclear Regulatory Commission, Washington, DC.
-
(1983)
Handbook of Human Reliability Analysis with Emphasis on Nuclear Power Plant Applications
-
-
Swain, A.1
Guttman, H.2
-
53
-
-
0004358917
-
Senior executives and ISO 9000: Attitudes, behaviours and commitment
-
Taylor, W.A. (1995), "Senior executives and ISO 9000: attitudes, behaviours and commitment", International Journal of Quality & Reliability Management, Vol. 22 No. 4, pp 40-57.
-
(1995)
International Journal of Quality & Reliability Management
, vol.22
, Issue.4
, pp. 40-57
-
-
Taylor, W.A.1
-
56
-
-
0242517401
-
Information security awareness: Educating our users effectively
-
Thomson, M.E. and von Solms, R. (1998), "Information security awareness: educating our users effectively", Information Management & Computer Security, Vol. 6 No. 4, pp. 167-73.
-
(1998)
Information Management & Computer Security
, vol.6
, Issue.4
, pp. 167-173
-
-
Thomson, M.E.1
Von Solms, R.2
-
57
-
-
0039639238
-
Organizational computer security policy: The reality
-
Warman, A.R. (1992), "Organizational computer security policy: the reality", European Journal of Information Systems, Vol. 1 No. 5, pp. 305-10.
-
(1992)
European Journal of Information Systems
, vol.1
, Issue.5
, pp. 305-310
-
-
Warman, A.R.1
|