-
1
-
-
44649169106
-
-
Deloitte, Deloitte Touche Tohmatsu
-
Deloitte, "Global security survey, " Deloitte Touche Tohmatsu, 2005.
-
(2005)
Global Security Survey
-
-
-
3
-
-
0000280419
-
Effective is security: An empirical study
-
D. W. Straub, "Effective IS Security: An Empirical Study, " Information Systems Research, vol. 1, pp. 255-276, 1990.
-
(1990)
Information Systems Research
, vol.1
, pp. 255-276
-
-
Straub, D.W.1
-
4
-
-
77951724076
-
Information security control resources in organizations: A multidimensional view and their key drivers
-
H. Cavusoglu, H. Cavusoglu, J. Son, and I. Benbasat, "Information Security Control Resources in Organizations: A Multidimensional View and Their Key Drivers, " UBC Working Paper, 2008.
-
(2008)
UBC Working Paper
-
-
Cavusoglu, H.1
Cavusoglu, H.2
Son, J.3
Benbasat, I.4
-
5
-
-
23044525969
-
Current directions in information security research: Toward socio-organizational perspectives
-
G. Dhillon, and J. Backhouse, "Current Directions in Information Security Research: Toward Socio-Organizational Perspectives, " Information Systems Journal, vol. 11, pp. 127-153, 2001.
-
(2001)
Information Systems Journal
, vol.11
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
6
-
-
30744438863
-
An analysis of the traditional IS security approaches: Implications for research and practice
-
M. Siponen, "An analysis of the traditional IS security approaches: implications for research and practice, " European Journal of Information Systems, vol. 14, pp. 303-315, 2005.
-
(2005)
European Journal of Information Systems
, vol.14
, pp. 303-315
-
-
Siponen, M.1
-
7
-
-
84870963275
-
The last line of defense: Motivating employees to follow corporate security guideliness
-
S. R. Boss, and L. J. Kirsch, "The Last Line of Defense: Motivating Employees to Follow Corporate Security Guideliness, " in International Conference on Information Systems, Montreal, pp. 1-18, 2007.
-
(2007)
International Conference on Information Systems, Montreal
, pp. 1-18
-
-
Boss, S.R.1
Kirsch, L.J.2
-
9
-
-
0036064934
-
A holistic model of computer abuse within organizations
-
J. Lee, and Y. Lee, "A holistic model of computer abuse within organizations, " Information management & computer security, vol. 10, pp. 57-63, 2002.
-
(2002)
Information Management & Computer Security
, vol.10
, pp. 57-63
-
-
Lee, J.1
Lee, Y.2
-
10
-
-
2342489402
-
An integrative model of computer abuse based on social control and general deterrence theories
-
S. M. Lee, S. G. Lee, and S. Yoo, "An integrative model of computer abuse based on social control and general deterrence theories, " Information & Management, vol. 41, pp. 707-718, 2003.
-
(2003)
Information & Management
, vol.41
, pp. 707-718
-
-
Lee, S.M.1
Lee, S.G.2
Yoo, S.3
-
11
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations: A field study
-
D. W. Straub, and W. D. Nance, "Discovering and disciplining computer abuse in organizations: a field study, " MIS Quarterly, vol. 14, pp. 45-60, 1990.
-
(1990)
MIS Quarterly
, vol.14
, pp. 45-60
-
-
Straub, D.W.1
Nance, W.D.2
-
12
-
-
33750683067
-
Understanding the perpetration of employee computer crime in the organisational context
-
R. Willison, "Understanding the Perpetration of Employee Computer Crime in the Organisational Context, " Information and organization, vo. 16, pp. 304-324, 2006.
-
(2006)
Information and Organization
, vol.16
, pp. 304-324
-
-
Willison, R.1
-
14
-
-
0003551671
-
-
MA: Addison-Wesley
-
M. Fishbein, And I. Ajzen, Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, MA: Addison-Wesley, 1975.
-
(1975)
Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research
-
-
Fishbein, M.1
Ajzen, I.2
-
15
-
-
0003010471
-
Social identity theory and the organization
-
B. E. Ashforth, and F. Mael, "Social identity theory and the organization, " Academy of Management Review, vol. 14, pp. 20-39, 1989.
-
(1989)
Academy of Management Review
, vol.14
, pp. 20-39
-
-
Ashforth, B.E.1
Mael, F.2
-
16
-
-
84965539758
-
Social identity and intergroup behavior
-
H. Tajfel, "Social identity and intergroup behavior, " Social Science Information, vol. 13, pp. 65-93, 1974.
-
(1974)
Social Science Information
, vol.13
, pp. 65-93
-
-
Tajfel, H.1
-
17
-
-
0038382615
-
An integrative theory of intergroup conflict
-
W. G. Austin, and S. Worchel ed. Monterey, CA, 94-109
-
H. Tajfel, J. Turner, "An Integrative Theory of Intergroup Conflict, " in The Social Psychology of Intergroup Relations, W. G. Austin, and S. Worchel ed. Monterey, CA, 94-109, 1979.
-
(1979)
The Social Psychology of Intergroup Relations
-
-
Tajfel, H.1
Turner, J.2
-
18
-
-
39749168050
-
Employees' behavior towards is security policy compliance
-
S. Pahnila, M. Siponen, and A. Mahmood, "Employees' Behavior towards IS Security Policy Compliance, " in Proceedings of the 40th Hawaii International Conference on System Sciences, IEEE, p. 156-166, 2007.
-
(2007)
Proceedings of the 40th Hawaii International Conference on System Sciences, IEEE
, pp. 156-166
-
-
Pahnila, S.1
Siponen, M.2
Mahmood, A.3
|