-
1
-
-
0002305454
-
From intentions to actions: A theory of planned behavior
-
KUHL J, and BECKMANN J, Eds, pp, Springer-Verlag, Berlin, NY
-
AJZEN I (1985) From intentions to actions: a theory of planned behavior. In Action Control, from Cognition to Behavior (KUHL J, and BECKMANN J, Eds), pp 11-39, Springer-Verlag, Berlin, NY.
-
(1985)
Action Control, from Cognition to Behavior
, pp. 11-39
-
-
AJZEN, I.1
-
2
-
-
67650176372
-
-
AMERICAN NATIONAL STANDARDS INSTITUTE , American National Standards Institute, Washington DC
-
AMERICAN NATIONAL STANDARDS INSTITUTE (2005) Iso ics 35 Information Technology. American National Standards Institute, Washington DC.
-
(2005)
Iso ics 35 Information Technology
-
-
-
4
-
-
0023020183
-
The moderator mediator variable distinction in social psychological-research - conceptual, strategic, and statistical considerations
-
BARON RM and KENNY DA (1986) The moderator mediator variable distinction in social psychological-research - conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology 51(6), 1173-1182.
-
(1986)
Journal of Personality and Social Psychology
, vol.51
, Issue.6
, pp. 1173-1182
-
-
BARON, R.M.1
KENNY, D.A.2
-
6
-
-
67650180566
-
-
BLUMSTEIN A (1978) Introduction. In Deterrence and Incapacitation: Estimating the Effects of Criminal Sanctions on Crime Rates (BLUMSTIEN A, COHEN Jand NAGIN D, Eds), National Academy of Sciences, Washington DC.
-
BLUMSTEIN A (1978) Introduction. In Deterrence and Incapacitation: Estimating the Effects of Criminal Sanctions on Crime Rates (BLUMSTIEN A, COHEN Jand NAGIN D, Eds), National Academy of Sciences, Washington DC.
-
-
-
-
7
-
-
0036922102
-
Do I really have to? User acceptance of mandated technology
-
BROWN SA, MASSEY AP, MONTOYA-WEISS MM and BURKMAN JR (2002) Do I really have to? User acceptance of mandated technology. European Journal of Information Systems 11(4), 283-295.
-
(2002)
European Journal of Information Systems
, vol.11
, Issue.4
, pp. 283-295
-
-
BROWN, S.A.1
MASSEY, A.P.2
MONTOYA-WEISS, M.M.3
BURKMAN, J.R.4
-
8
-
-
0035610759
-
Technological innovation in the pharmaceutical industry: The use of organizational control in managing research and development
-
CARDINAL LB (2001) Technological innovation in the pharmaceutical industry: the use of organizational control in managing research and development. Organization Science 12(1), 19-36.
-
(2001)
Organization Science
, vol.12
, Issue.1
, pp. 19-36
-
-
CARDINAL, L.B.1
-
9
-
-
4344627574
-
Balancing and rebalancing in the creation and evolution of organizational control
-
CARDINAL LB, SITKIN SB and LONG CP (2004) Balancing and rebalancing in the creation and evolution of organizational control. Organization Science 15(4), 411-431.
-
(2004)
Organization Science
, vol.15
, Issue.4
, pp. 411-431
-
-
CARDINAL, L.B.1
SITKIN, S.B.2
LONG, C.P.3
-
11
-
-
23044464839
-
-
CHAE Band POOLE MS (2005) Mandates and technology acceptance: a tale of two enterprise technologies. Journal of Strategic Information Systems 14(2), 147-166.
-
CHAE Band POOLE MS (2005) Mandates and technology acceptance: a tale of two enterprise technologies. Journal of Strategic Information Systems 14(2), 147-166.
-
-
-
-
12
-
-
21844487599
-
The development and validation of the computer apathy and anxiety scale
-
CHARLTON JP and BIRKETT PE (1995) The development and validation of the computer apathy and anxiety scale. Journal of Educational Computing Research 13(1), 41-59.
-
(1995)
Journal of Educational Computing Research
, vol.13
, Issue.1
, pp. 41-59
-
-
CHARLTON, J.P.1
BIRKETT, P.E.2
-
13
-
-
0003095695
-
The partial least squares approach for structural equation modeling
-
MARCOULIDES GA, Ed, pp, Lawrence Erlbaum, Mahwah, NJ
-
CHIN WW (1998) The partial least squares approach for structural equation modeling. In Modern Methods for Business Research (MARCOULIDES GA, Ed), pp 295-336, Lawrence Erlbaum, Mahwah, NJ.
-
(1998)
Modern Methods for Business Research
, pp. 295-336
-
-
CHIN, W.W.1
-
15
-
-
0141749138
-
-
CHOUDHURY Vand SABHERWAL R (2003) Portfolios of control in outsourced software development projects. Information Systems Research 14(3), 291-314.
-
CHOUDHURY Vand SABHERWAL R (2003) Portfolios of control in outsourced software development projects. Information Systems Research 14(3), 291-314.
-
-
-
-
16
-
-
0003170921
-
The effects of pay schemes and probabilistic management audits on subordinate misrepresentation of private information: An experimental investigation in a resource allocation context
-
CHOW CW, HIRST Mand SHIELDS MD (1995) The effects of pay schemes and probabilistic management audits on subordinate misrepresentation of private information: an experimental investigation in a resource allocation context. Behavioral Research in Accounting 7, 1-15.
-
(1995)
Behavioral Research in Accounting
, vol.7
, pp. 1-15
-
-
CHOW, C.W.1
HIRST2
Mand SHIELDS, M.D.3
-
18
-
-
49149116092
-
Computer self-efficacy - development of a measure and initial test
-
COMPEAU DR and HIGGINS CA (1995) Computer self-efficacy - development of a measure and initial test. MIS Quarterly 19(2), 189-211.
-
(1995)
MIS Quarterly
, vol.19
, Issue.2
, pp. 189-211
-
-
COMPEAU, D.R.1
HIGGINS, C.A.2
-
20
-
-
0035373667
-
-
D'AQUILA JM (2001) Financial accountants' perceptions of management's ethical standards. Journal of Business Ethics 31(3), 233-244.
-
D'AQUILA JM (2001) Financial accountants' perceptions of management's ethical standards. Journal of Business Ethics 31(3), 233-244.
-
-
-
-
21
-
-
0032365776
-
Between trust and control: Developing confidence in partner cooperation in alliances
-
DAS TK and TENG BS (1998) Between trust and control: developing confidence in partner cooperation in alliances. Academy of Management Review 23(3), 491-512.
-
(1998)
Academy of Management Review
, vol.23
, Issue.3
, pp. 491-512
-
-
DAS, T.K.1
TENG, B.S.2
-
23
-
-
0035063716
-
-
DHILLON G (2001) Violation of safeguards by trusted personnel and understanding related information security concerns. Computers & Security 20(2), 165-1 72.
-
DHILLON G (2001) Violation of safeguards by trusted personnel and understanding related information security concerns. Computers & Security 20(2), 165-1 72.
-
-
-
-
25
-
-
0036765493
-
-
DUTTA Aand MCCROHAN K (2002) Management's role in information security in a cyber economy. California Management Review 45(1), 67-87.
-
DUTTA Aand MCCROHAN K (2002) Management's role in information security in a cyber economy. California Management Review 45(1), 67-87.
-
-
-
-
26
-
-
0022013369
-
Control: Organizational and economic approaches
-
EISENHARDT KM (1985) Control: organizational and economic approaches. Management Science 31(2), 134-149.
-
(1985)
Management Science
, vol.31
, Issue.2
, pp. 134-149
-
-
EISENHARDT, K.M.1
-
27
-
-
0000798911
-
Agency-theory and institutional-theory explanations - the case of retail sales compensation
-
EISENHARDT KM (1988) Agency-theory and institutional-theory explanations - the case of retail sales compensation. Academy of Management Journal 31(3), 488-511.
-
(1988)
Academy of Management Journal
, vol.31
, Issue.3
, pp. 488-511
-
-
EISENHARDT, K.M.1
-
29
-
-
0000009769
-
Evaluating structural equation models with unobservable variables and measurement error
-
FORNELL C and LARCKER DF (1981) Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research 18(1), 39-50.
-
(1981)
Journal of Marketing Research
, vol.18
, Issue.1
, pp. 39-50
-
-
FORNELL, C.1
LARCKER, D.F.2
-
30
-
-
28744438934
-
Carrot or stick? Contract frame and use of decision-influencing information in a principal-agent setting
-
FREDERICKSON JR and WALLER W (2005) Carrot or stick? Contract frame and use of decision-influencing information in a principal-agent setting. Journal of Accounting Research 43(5), 709-733.
-
(2005)
Journal of Accounting Research
, vol.43
, Issue.5
, pp. 709-733
-
-
FREDERICKSON, J.R.1
WALLER, W.2
-
32
-
-
85050649674
-
-
HARTWICK Jand BARKI H (1994) Explaining the role of user participation in information-system use. Management Science 40(4), 440-465.
-
HARTWICK Jand BARKI H (1994) Explaining the role of user participation in information-system use. Management Science 40(4), 440-465.
-
-
-
-
33
-
-
33745808831
-
Delineating the effects of general and system-specific computer self-efficacy beliefs on is acceptance
-
HASAN B (2006) Delineating the effects of general and system-specific computer self-efficacy beliefs on is acceptance. Information & Management 43(5), 565-571.
-
(2006)
Information & Management
, vol.43
, Issue.5
, pp. 565-571
-
-
HASAN, B.1
-
34
-
-
34547692726
-
The role of external and internal influences on information systems security - a neo-institutional perspective
-
HU Q, HART Pand COOKE D (2007) The role of external and internal influences on information systems security - a neo-institutional perspective. Journal of Strategic Information Systems 6(2), 153-172.
-
(2007)
Journal of Strategic Information Systems
, vol.6
, Issue.2
, pp. 153-172
-
-
HU, Q.1
HART2
Pand COOKE, D.3
-
35
-
-
0002552704
-
Toward a theory of marketing control: Environmental context, control types, and consequences
-
JAWORSKI BJ (1988) Toward a theory of marketing control: environmental context, control types, and consequences. Theory of Marketing Control 52, 23-39.
-
(1988)
Theory of Marketing Control
, vol.52
, pp. 23-39
-
-
JAWORSKI, B.J.1
-
36
-
-
11244304009
-
Writing an information security policy
-
Indian Express Group, Mumbai, India
-
KADAM A (2002) Writing an information security policy. Network Magazine. Indian Express Group, Mumbai, India.
-
(2002)
Network Magazine
-
-
KADAM, A.1
-
37
-
-
0001282226
-
The psychological origins of perceived usefulness and ease-of-use
-
KARAHANNA E and STRAUB DW (1999) The psychological origins of perceived usefulness and ease-of-use. Information & Management 35(4), 237-250.
-
(1999)
Information & Management
, vol.35
, Issue.4
, pp. 237-250
-
-
KARAHANNA, E.1
STRAUB, D.W.2
-
38
-
-
0000590429
-
Compliance, identification, and internationalization: Three processes of attitude change?
-
KELMAN HC (1958) Compliance, identification, and internationalization: three processes of attitude change? Journal of Conflict Resolution 2(1), 51-60.
-
(1958)
Journal of Conflict Resolution
, vol.2
, Issue.1
, pp. 51-60
-
-
KELMAN, H.C.1
-
39
-
-
0346561168
-
Processes of opinion change
-
KELMAN HC (1961) Processes of opinion change. Public Opinion Quarterly 25(1), 57-78.
-
(1961)
Public Opinion Quarterly
, vol.25
, Issue.1
, pp. 57-78
-
-
KELMAN, H.C.1
-
40
-
-
0001639661
-
The handbook of social psychology
-
GILBERT DT, FISKE ST and LINDZEYG, Eds, pp, McGraw-Hill, Boston, NY
-
KENNY DA, KASHY DA and BOLGER N (1998) The handbook of social psychology. In The Handbook of Social Psychology (GILBERT DT, FISKE ST and LINDZEYG, Eds), pp 233-265, McGraw-Hill, Boston, NY.
-
(1998)
The Handbook of Social Psychology
, pp. 233-265
-
-
KENNY, D.A.1
KASHY, D.A.2
BOLGER, N.3
-
41
-
-
0642314444
-
The management of complex tasks in organizations: Controlling the systems development process
-
KIRSCH LJ (1996) The management of complex tasks in organizations: controlling the systems development process. Organization Science 7(1), 1-21.
-
(1996)
Organization Science
, vol.7
, Issue.1
, pp. 1-21
-
-
KIRSCH, L.J.1
-
42
-
-
0031500151
-
Portfolios of control modes and is project management
-
KIRSCH LJ (1997) Portfolios of control modes and is project management. Information Systems Research 8(3), 215-239.
-
(1997)
Information Systems Research
, vol.8
, Issue.3
, pp. 215-239
-
-
KIRSCH, L.J.1
-
43
-
-
13244253851
-
Deploying common solutions globally: The dynamics of control
-
KIRSCH LJ (2004) Deploying common solutions globally: the dynamics of control. Information Systems Research 15(4), 374-395.
-
(2004)
Information Systems Research
, vol.15
, Issue.4
, pp. 374-395
-
-
KIRSCH, L.J.1
-
44
-
-
0036541934
-
Controlling information systems development projects: The view from the client
-
KIRSCH LJ, SAMBAMURTHY V, KO DG and PURVIS RL (2002) Controlling information systems development projects: the view from the client. Management Science 48(4), 484-498.
-
(2002)
Management Science
, vol.48
, Issue.4
, pp. 484-498
-
-
KIRSCH, L.J.1
SAMBAMURTHY, V.2
KO, D.G.3
PURVIS, R.L.4
-
45
-
-
33847761422
-
Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management
-
LIANG HG, SARAF N, HU Q and XUE YJ (2007) Assimilation of enterprise systems: the effect of institutional pressures and the mediating role of top management. MIS Quarterly 31(1), 59-87.
-
(2007)
MIS Quarterly
, vol.31
, Issue.1
, pp. 59-87
-
-
LIANG, H.G.1
SARAF, N.2
HU, Q.3
XUE, Y.J.4
-
48
-
-
0001321828
-
Bonus and penalty incentives contract choice by employees
-
LUFT J (1994) Bonus and penalty incentives contract choice by employees. Journal of Accounting & Economics 18(2), 181-206.
-
(1994)
Journal of Accounting & Economics
, vol.18
, Issue.2
, pp. 181-206
-
-
LUFT, J.1
-
49
-
-
29144460700
-
-
MACAULAY Sand COOK S (1994) Performance management as the key to customer service. Industrial and Commercial Training 26(11), 3-8.
-
MACAULAY Sand COOK S (1994) Performance management as the key to customer service. Industrial and Commercial Training 26(11), 3-8.
-
-
-
-
50
-
-
23744448456
-
-
MALHOTRA Yand GALLETTA D (2005) A multidimensional commitment model of volitional systems adoption and usage behavior. Journal of Management Information Systems 22(1), 117-151.
-
MALHOTRA Yand GALLETTA D (2005) A multidimensional commitment model of volitional systems adoption and usage behavior. Journal of Management Information Systems 22(1), 117-151.
-
-
-
-
51
-
-
49049089191
-
How endogenous motivations influence user intentions: Beyond the dichotomy of extrinsic and intrinsic user motivations
-
MALHOTRA Y, GALLETTA DF and KIRSCH LJ (2008) How endogenous motivations influence user intentions: beyond the dichotomy of extrinsic and intrinsic user motivations. Journal of Management Information Systems 25(1), 267-299.
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.1
, pp. 267-299
-
-
MALHOTRA, Y.1
GALLETTA, D.F.2
KIRSCH, L.J.3
-
52
-
-
0020765012
-
Power, politics, and mis implementation
-
MARKUS ML (1983) Power, politics, and mis implementation. Communications of the ACM 26(6), 430-444.
-
(1983)
Communications of the ACM
, vol.26
, Issue.6
, pp. 430-444
-
-
MARKUS, M.L.1
-
55
-
-
67650157736
-
-
NATIONAL CYBER SECURITY ALLIANCE , National Cyber Security Alliance, Washington DC
-
NATIONAL CYBER SECURITY ALLIANCE (2005) Top Ten Cybersecurity Tips. National Cyber Security Alliance, Washington DC.
-
(2005)
Top Ten Cybersecurity Tips
-
-
-
56
-
-
67650174397
-
-
NATIONAL CYBER SECURITY ALLIANCE and MCAFEE CORPORATION (2008) Mcafee-ncsa Online Safety Study. National Cyber Security Alliance and McAfee Corporation, Washingtion DC.
-
NATIONAL CYBER SECURITY ALLIANCE and MCAFEE CORPORATION (2008) Mcafee-ncsa Online Safety Study. National Cyber Security Alliance and McAfee Corporation, Washingtion DC.
-
-
-
-
57
-
-
1242310120
-
The matrix of control: Combining process and structure approaches to managing software development
-
NIDUMOLU SR and SUBRAMANI MR (2003) The matrix of control: combining process and structure approaches to managing software development. Journal of Management Information Systems 20(3), 159-196.
-
(2003)
Journal of Management Information Systems
, vol.20
, Issue.3
, pp. 159-196
-
-
NIDUMOLU, S.R.1
SUBRAMANI, M.R.2
-
59
-
-
0002569906
-
Relationship between organizational-structure and organizational control
-
OUCHI WG (1977) Relationship between organizational-structure and organizational control. Administrative Science Quarterly 22(1), 95-113.
-
(1977)
Administrative Science Quarterly
, vol.22
, Issue.1
, pp. 95-113
-
-
OUCHI, W.G.1
-
60
-
-
0018519695
-
Conceptual-framework for the design of organizational control mechanisms
-
OUCHI WG (1979) Conceptual-framework for the design of organizational control mechanisms. Management Science 25(9), 833-848.
-
(1979)
Management Science
, vol.25
, Issue.9
, pp. 833-848
-
-
OUCHI, W.G.1
-
61
-
-
38549116762
-
Specifying formative constructs in information systems research
-
PETTER S, STRAUB Dand RAI A (2007) Specifying formative constructs in information systems research. MIS Quarterly 31(4), 623-656.
-
(2007)
MIS Quarterly
, vol.31
, Issue.4
, pp. 623-656
-
-
PETTER, S.1
STRAUB2
Dand RAI, A.3
-
62
-
-
0141907688
-
Common method biases in behavioral research: A critical review of the literature and recommended remedies
-
PODSAKOFF PM, MACKENZIE SB, LEE JY and PODSAKOFF NP (2003) Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology 88(5), 879-903.
-
(2003)
Journal of Applied Psychology
, vol.88
, Issue.5
, pp. 879-903
-
-
PODSAKOFF, P.M.1
MACKENZIE, S.B.2
LEE, J.Y.3
PODSAKOFF, N.P.4
-
63
-
-
84901154907
-
An integrative model of information systems use in mandatory environments
-
Association for Computing Machinery, Helsinki, Finland
-
RAWSTORNE P, JAYASURIYA Rand CAPUTI P (1998) An integrative model of information systems use in mandatory environments. in International Conference on Information Systems pp 325-330, Association for Computing Machinery, Helsinki, Finland.
-
(1998)
International Conference on Information Systems
, pp. 325-330
-
-
RAWSTORNE, P.1
JAYASURIYA2
Rand CAPUTI, P.3
-
65
-
-
85043751872
-
Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being
-
RYAN RM and DECI EL (2000) Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being. American Psychologist 55(1), 68-78.
-
(2000)
American Psychologist
, vol.55
, Issue.1
, pp. 68-78
-
-
RYAN, R.M.1
DECI, E.L.2
-
66
-
-
67650117150
-
-
SCHNEDLER Wand VADOVIC R (2007) Legitimacy of Control. Institute for the Study of Labor (IZA), Bonn, Germany.
-
SCHNEDLER Wand VADOVIC R (2007) Legitimacy of Control. Institute for the Study of Labor (IZA), Bonn, Germany.
-
-
-
-
68
-
-
84875514169
-
Mediation in experimental and nonexperimental studies: New procedures and recommendations
-
SHROUT PE and BOLGER N (2002) Mediation in experimental and nonexperimental studies: new procedures and recommendations. Psychological Methods 7(4), 422-445.
-
(2002)
Psychological Methods
, vol.7
, Issue.4
, pp. 422-445
-
-
SHROUT, P.E.1
BOLGER, N.2
-
69
-
-
0000132469
-
Control-theory in strategic human-resource management - the mediating effect of administrative information
-
SNELL SA (1992) Control-theory in strategic human-resource management - the mediating effect of administrative information. Academyof Management Journal 35(2), 292-327.
-
(1992)
Academyof Management Journal
, vol.35
, Issue.2
, pp. 292-327
-
-
SNELL, S.A.1
-
70
-
-
0000280419
-
Effective is security: An empirical study
-
STRAUB DW (1990) Effective is security: an empirical study. Information Systems Research 1(3), 255-273.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-273
-
-
STRAUB, D.W.1
-
71
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
STRAUB DW and WELKE RJ (1998) Coping with systems risk: security planning models for management decision making. MIS Quarterly 22(4), 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
STRAUB, D.W.1
WELKE, R.J.2
-
72
-
-
0037626037
-
Informational influence in organizations: An integrated approach to knowledge adoption
-
SUSSMAN SW and SIEGAL WS (2003) Informational influence in organizations: an integrated approach to knowledge adoption. Information Systems Research 14(1), 47-65.
-
(2003)
Information Systems Research
, vol.14
, Issue.1
, pp. 47-65
-
-
SUSSMAN, S.W.1
SIEGAL, W.S.2
-
74
-
-
0000703119
-
-
TAYLOR Sand TODD P (1995) Assessing it usage: the role of prior experience. MIS Quarterly 19(4), 561-570.
-
TAYLOR Sand TODD P (1995) Assessing it usage: the role of prior experience. MIS Quarterly 19(4), 561-570.
-
-
-
-
75
-
-
0033872521
-
-
VENKATESH Vand DAVIS FD (2000) A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science 46(2), 186-204.
-
VENKATESH Vand DAVIS FD (2000) A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science 46(2), 186-204.
-
-
-
|