-
1
-
-
0003636017
-
-
Los Angeles: Roxbury Publishing
-
Akers, R. L., and Sellers, C. S. 1994. Criminological Theories: Introduction, Evaluation, and Application, Los Angeles: Roxbury Publishing.
-
(1994)
Criminological Theories: Introduction, Evaluation, and Application
-
-
Akers, R.L.1
Sellers, C.S.2
-
2
-
-
0000784219
-
Punishment in organizations: A review, propositions, and research suggestions
-
Arvey, R. D., and Ivancevich, J. M. 1980. "Punishment in Organizations: A Review, Propositions, and Research Suggestions," The Academy of Management Review (5:1), pp. 123-132.
-
(1980)
The Academy of Management Review
, vol.5
, Issue.1
, pp. 123-132
-
-
Arvey, R.D.1
Ivancevich, J.M.2
-
3
-
-
23044525969
-
Current directions in is security research: Toward socio-organizational perspectives
-
Backhouse, J., and Dhillon, G. 2001. "Current Directions in IS Security Research: Toward Socio-Organizational Perspectives," Information Systems Journal (11:2), pp. 127-153.
-
(2001)
Information Systems Journal
, vol.11
, Issue.2
, pp. 127-153
-
-
Backhouse, J.1
Dhillon, G.2
-
5
-
-
16344391307
-
Special issue on action research in information systems: Making is relevant to practice-foreword
-
Baskerville, R., and Myers, M. 2004. "Special Issue on Action Research in Information Systems: Making IS Relevant to Practice-Foreword," MIS Quarterly (28:3), 329-335.
-
(2004)
MIS Quarterly
, vol.28
, Issue.3
, pp. 329-335
-
-
Baskerville, R.1
Myers, M.2
-
6
-
-
12244306739
-
An information security meta-policy for emergent organizations
-
Baskerville, R., and Siponen, M. 2002. "An Information Security Meta-policy for Emergent Organizations" Journal of Logistics Information Management, special issue on Information Security (5-6), pp. 337-346.
-
(2002)
Journal of Logistics Information Management, Special Issue on Information Security
, vol.5-6
, pp. 337-346
-
-
Baskerville, R.1
Siponen, M.2
-
7
-
-
22044451957
-
Diversity in information systems action research methods
-
1998
-
Baskerville, R. and Wood-Harper, T. 1998. "Diversity in Information Systems Action Research Methods," European Journal of Information Systems (7:2), 1998, pp. 90-107.
-
(1998)
European Journal of Information Systems
, vol.7
, Issue.2
, pp. 90-107
-
-
Baskerville, R.1
Wood-Harper, T.2
-
11
-
-
19144365273
-
-
Maidenhead, England: McGraw-Hill
-
Cockman, P., Evans, B., and Raynolds, P. 1999. Consulting for Real People: A Client-Centered Approach for Change Agents and Leaders, Maidenhead, England: McGraw-Hill.
-
(1999)
Consulting for Real People: A Client-Centered Approach for Change Agents and Leaders
-
-
Cockman, P.1
Evans, B.2
Raynolds, P.3
-
12
-
-
84992963195
-
Raising is security awareness in the academic setting
-
Cox, A., Connolly, S., and Currall, J. 2001. "Raising IS Security Awareness in the Academic Setting," VINE (31:2), pp. 11-16.
-
(2001)
VINE
, vol.31
, Issue.2
, pp. 11-16
-
-
Cox, A.1
Connolly, S.2
Currall, J.3
-
17
-
-
85050754880
-
Realism and instrumentalism
-
M. Bunge (ed.) , London: Free Press of Glencoe
-
Feyerabend, P. K. 1964. "Realism and Instrumentalism," in The Critical Approach to Science and Philosophy, M. Bunge (ed.), London: Free Press of Glencoe, pp. 280-308.
-
(1964)
The Critical Approach to Science and Philosophy
, pp. 280-308
-
-
Feyerabend, P.K.1
-
18
-
-
0346648325
-
-
New York: Rockefeller Foundation
-
Figueroa, M. E., Kincaid, D. L., Rani, M., and Lewis, G. 2002. Communication for Social Change: An Integrated Model for Measuring the Process and Its Outcomes, New York: Rockefeller Foundation.
-
(2002)
Communication for Social Change: An Integrated Model for Measuring the Process and Its Outcomes
-
-
Figueroa, M.E.1
Kincaid, D.L.2
Rani, M.3
Lewis, G.4
-
20
-
-
0002955225
-
Choosing information systems research approaches
-
R. D. Galliers (ed.) , Oxford, England: Blackwell Scientific Publications
-
Galliers, R. D. 1992. "Choosing Information Systems Research Approaches," in Information Systems Research: Issues, Methods, and Practical Guidelines, R. D. Galliers (ed.), Oxford, England: Blackwell Scientific Publications, pp. 144-162.
-
(1992)
Information Systems Research: Issues, Methods, and Practical Guidelines
, pp. 144-162
-
-
Galliers, R.D.1
-
22
-
-
0032032029
-
Installing an appropriate information security policy
-
DOI 10.1016/S1386-5056(98)00022-7, PII S1386505698000227, Common Security Solutions for Communicating Patient Data
-
Gaunt, N. 1998. "Installing an Appropriate IS Security Policy [in Hospitals]," International Journal of Medical Informatics (49:1), pp. 131-134. (Pubitemid 28353814)
-
(1998)
International Journal of Medical Informatics
, vol.49
, Issue.1
, pp. 131-134
-
-
Gaunt, N.1
-
23
-
-
79953283167
-
The design of instruction
-
M. D. Merrill (ed.), Englewood Cliffs, NJ: Prentice-Hall
-
Glaser, R. 1971. "The Design of Instruction," in Instructional Design: Readings, M. D. Merrill (ed.), Englewood Cliffs, NJ: Prentice-Hall.
-
(1971)
Instructional Design: Readings
-
-
Glaser, R.1
-
24
-
-
0001823869
-
Security concerns of system users: A study of perceptions of the adequacy of security
-
Goodhue, D. L., and Straub, D. W. 1991. "Security Concerns of System Users: A Study of Perceptions of the Adequacy of Security," Information & Management (20), pp.13- 27.
-
(1991)
Information & Management
, vol.20
, pp. 13-27
-
-
Goodhue, D.L.1
Straub, D.W.2
-
25
-
-
0002615353
-
Cognitive learning, cognitive response to persuasion, and attitude change
-
A. G. Greenwald, T. C. Brock, and T M
-
Greenwald, A. G. 1968. "Cognitive Learning, Cognitive Response to Persuasion, and Attitude Change," in Psychological Foundations of Attitudes, A. G. Greenwald, T. C. Brock, and T. M.
-
(1968)
Psychological Foundations of Attitudes
-
-
Greenwald, A.G.1
-
26
-
-
79953285328
-
-
Ostrom (eds.), San Diego, CA: Academic Press, pp.147-170
-
Ostrom (eds.), San Diego, CA: Academic Press, pp. 147-170
-
-
-
-
28
-
-
79953267144
-
Is security management: An awareness campaign
-
C. J. Armstrong and R. J. Hartley (eds.), Manchester, England, July
-
Hadland, T. 1998. "IS Security Management: An Awareness Campaign," in UKOLUG98: New Networks, Old Information- UKOLUG's 20th Birthday Conference, C. J. Armstrong and R. J. Hartley (eds.), Manchester, England, July 14-16.
-
(1998)
UKOLUG98: New Networks, Old Information- UKOLUG's 20th Birthday Conference
, pp. 14-16
-
-
Hadland, T.1
-
29
-
-
85071343148
-
Theories of learning and computer-mediated instructional technologies
-
Hung, D. 2001. "Theories of Learning and Computer-Mediated Instructional Technologies," Educational Media International (38:4), pp. 281-287.
-
(2001)
Educational Media International
, vol.38
, Issue.4
, pp. 281-287
-
-
Hung, D.1
-
32
-
-
27744519235
-
The effect of top management support of SISP on strategic IS management: Insights from the US electric power industry
-
DOI 10.1016/j.omega.2004.10.008, PII S0305048304001598
-
Kearns, G. 2006. "The Effect of Top Management Support of SISP on Strategic IS Management: Insights from the US Electric Power Industry," Omega (34:3), pp. 236-253. (Pubitemid 41600562)
-
(2006)
Omega
, vol.34
, Issue.3
, pp. 236-253
-
-
Kearns, G.S.1
-
34
-
-
55849147710
-
Training as part of a security awareness program
-
Lafleur, L. M. 1992. "Training as Part of a Security Awareness Program," Computer Control Quarterly (10:4), pp. 4-11.
-
(1992)
Computer Control Quarterly
, vol.10
, Issue.4
, pp. 4-11
-
-
Lafleur, L.M.1
-
35
-
-
0002479337
-
Falsification and the methodology of scientific research programmes
-
I. Lakatos and A. Musgrave (eds), Cambridge, UK: Cambridge University Press
-
Lakatos, I. 1970. "Falsification and the Methodology of Scientific Research Programmes," in Criticism and the Growth of Knowledge, I. Lakatos and A. Musgrave (eds), Cambridge, UK: Cambridge University Press, pp. 91-196.
-
(1970)
Criticism and the Growth of Knowledge
, pp. 91-196
-
-
Lakatos, I.1
-
36
-
-
0004235034
-
-
Berkeley, CA: University of California Press
-
Laudan, L. 1984. Science and Values, Berkeley, CA: University of California Press.
-
(1984)
Science and Values
-
-
Laudan, L.1
-
37
-
-
0001921246
-
Personality and attitude change: An information-processing theory
-
A. G. Greenwald, T. C. Brock, and M. T. Ostrom (eds.), San Diego: Academic Press
-
McGuire, W. J. 1968. "Personality and Attitude Change: An Information-Processing Theory," in A. G. Greenwald, T. C. Brock, and M. T. Ostrom (eds.), Psychological Foundations of Attitudes, San Diego: Academic Press, pp. 171-196.
-
(1968)
Psychological Foundations of Attitudes
, pp. 171-196
-
-
McGuire, W.J.1
-
38
-
-
6744260746
-
Is security awareness- selling the cause
-
G. G. Gable and W. J. Caelli (eds.), May 27-29, Amsterdam: North-Holland Publishing Co.
-
McLean, K. 1992. "IS Security Awareness- Selling the Cause," in Information Technology Security: The Need for International Cooperation (Proceedings of the IFIP TC11, Eighth International Conference on Information Security), G. G. Gable and W. J. Caelli (eds.), May 27-29, Amsterdam: North-Holland Publishing Co., pp. 179-193.
-
(1992)
Information Technology Security: The Need for International Cooperation (Proceedings of the IFIP TC11, Eighth International Conference on Information Security)
, pp. 179-193
-
-
McLean, K.1
-
39
-
-
33846313618
-
The qualitative interview in is research: Examining the craft
-
Myers, M., and Newman, M. 2007. "The Qualitative Interview in IS Research: Examining the Craft," Information and Organization (171), pp. 2-26.
-
(2007)
Information and Organization
, Issue.171
, pp. 2-26
-
-
Myers, M.1
Newman, M.2
-
41
-
-
73849124985
-
Running corporate and national security awareness programs
-
Amsterdam: North- Holland Publishing Co.
-
Murray, B. 1991. "Running Corporate and National Security Awareness Programs," in Proceedings of the FIP TC11 Seventh International Conference on IS Security, Amsterdam: North- Holland Publishing Co., pp. 203-207.
-
(1991)
Proceedings of the FIP TC11 Seventh International Conference on IS Security
, pp. 203-207
-
-
Murray, B.1
-
42
-
-
9744264932
-
Dialogical action research at omega corporation
-
Mårtensson, P., and Lee, A. S. 2004. "Dialogical Action Research at Omega Corporation," MIS Quarterly (28:3), pp. 507-536.
-
(2004)
MIS Quarterly
, vol.28
, Issue.3
, pp. 507-536
-
-
Mårtensson, P.1
Lee, A.S.2
-
44
-
-
6744258985
-
-
NIST, NIST Special Publication 800-16 U.S. Department of Commerce, Technology Administration, National Institute of Standards and Technology
-
NIST. "Information echnology Security Training Requirements: A Role- and Performance-Based Model," NIST Special Publication 800-16, U.S. Department of Commerce, Technology Administration, National Institute of Standards and Technology (available at http://csrc.nist.gov/publications/ nistpubs/800-16/ 800-16.pdf).
-
Information Echnology Security Training Requirements: A Role- And Performance-Based Model
-
-
-
46
-
-
0033698868
-
How to build a comprehensive security awareness program
-
Peltier, T. 2002. "How to Build a Comprehensive Security Awareness Program," Computer Security Journal (16:2), pp. 23-32.
-
(2002)
Computer Security Journal
, vol.16
, Issue.2
, pp. 23-32
-
-
Peltier, T.1
-
50
-
-
0002273518
-
Issue involvement as a moderator of the effects on attitude of advertising content and context
-
Petty, R. E., and Cacioppo, J. T. 1981b. "Issue Involvement as a Moderator of the Effects on Attitude of Advertising Content and Context," Advances in Consumer Research (8), pp. 20-24.
-
(1981)
Advances in Consumer Research
, vol.8
, pp. 20-24
-
-
Petty, R.E.1
Cacioppo, J.T.2
-
51
-
-
0001132217
-
Source factors and the elaboration likelihood model of persuasion
-
Petty, R. E., and Cacioppo, J. T. 1984. "Source Factors and the Elaboration Likelihood Model of Persuasion," Advances in Consumer Research (11), pp. 668-672.
-
(1984)
Advances in Consumer Research
, vol.11
, pp. 668-672
-
-
Petty, R.E.1
Cacioppo, J.T.2
-
52
-
-
77953970829
-
The elaboration likelihood model of persuasion
-
L. Berkowitz (ed.) , San Diego: Academic Press
-
Petty, R. E., and Cacioppo, J. T. 1986. "The Elaboration Likelihood Model of Persuasion," in Advances in Experimental Social Psychology (19), L. Berkowitz (ed.), San Diego: Academic Press, pp. 123-205.
-
(1986)
Advances in Experimental Social Psychology
, vol.19
, pp. 123-205
-
-
Petty, R.E.1
Cacioppo, J.T.2
-
54
-
-
4143143530
-
The secured enterprise: Protecting your information assets
-
NJ: Prentice Hall
-
Proctor, P. E., and Byrnes, F. C. 2002. The Secured Enterprise: Protecting Your Information Assets, Upper Saddle River, NJ: Prentice Hall.
-
(2002)
Upper Saddle River
-
-
Proctor, P.E.1
Byrnes, F.C.2
-
56
-
-
0001945885
-
Background: Theory and research
-
J. R. Rest and D. Narvaéz (eds.) , Hillsdale, JJ: Lawrence Erlbaum Associates
-
Rest, J. R. 1994. "Background: Theory and Research," in Moral Development in the Professions: Psychology and Applied Ethics, J. R. Rest and D. Narvaéz (eds.), Hillsdale, JJ: Lawrence Erlbaum Associates, pp. 1-26.
-
(1994)
Moral Development in the Professions: Psychology and Applied Ethics
, pp. 1-26
-
-
Rest, J.R.1
-
57
-
-
79953267586
-
Communicating highway safety: What works
-
Center for Transportation Research and Education, Iowa State University, Ames, Iowa
-
Rodriguez, L., and Anderson-Wilk, M. 2002. "Communicating Highway Safety: What Works," CTRE Project 01-85, Iowa Safety Management System, Center for Transportation Research and Education, Iowa State University, Ames, Iowa (available at http://ntl.bts.gov/lib/22000/22800/22892/chs.pdf).
-
(2002)
CTRE Project 01-85, Iowa Safety Management System
-
-
Rodriguez, L.1
Anderson-Wilk, M.2
-
59
-
-
36448948749
-
Security awareness
-
(4th ed.), S. Bosworth and M. E. Kabay (eds.) , New York: John Wiley & Sons, 1-29.19
-
Rudolph, K., Warshawsky, G., and Numkin, L. 2002. "Security Awareness," in Computer Security Handbook (4th ed.), S. Bosworth and M. E. Kabay (eds.), New York: John Wiley & Sons, pp. 29.1-29.19.
-
(2002)
Computer Security Handbook
, pp. 29
-
-
Rudolph, K.1
Warshawsky, G.2
Numkin, L.3
-
60
-
-
85070019893
-
On the architectonics of instructional theory
-
Theory, Research, and Models, R. D. Tennyson, F. Schott, N. Seel, and S. Dijkstra (eds.) ,Mahwah, NJ: Lawrence Erlbaum Associates
-
Schott, F., and Driscoll, M. P. 1997. "On the Architectonics of Instructional Theory," in Instructional Design: International Perspective, Vol. 1, Theory, Research, and Models, R. D. Tennyson, F. Schott, N. Seel, and S. Dijkstra (eds.),Mahwah, NJ: Lawrence Erlbaum Associates, pp. 135-173.
-
(1997)
Instructional Design: International Perspective
, vol.1
, pp. 135-173
-
-
Schott, F.1
Driscoll, M.P.2
-
61
-
-
0003830237
-
-
New York: Doubleday
-
Senge, P. M, Kleiner, A. C., Ross, R., and Smith, B. 1994. The Fifth Discipline Fieldbook, New York: Doubleday.
-
(1994)
The Fifth Discipline Fieldbook
-
-
Senge, P.M.1
Kleiner, A.C.2
Ross, R.3
Smith, B.4
-
62
-
-
0033683516
-
A conceptual foundation for organizational is security awareness
-
Siponen, M. 2000a. "A Conceptual Foundation for Organizational IS Security Awareness," Information Management & Computer Security (8:1), pp. 31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.1
-
64
-
-
36248967046
-
Employees' adherence to information security policies: An empirical study
-
H. Venter, M. Eloff, L. Labuschagne, J. Eloff, and R. von Solms (eds.), Boston Springer
-
Siponen, M. T., Pahnila, S., and Mahmood, A. 2007. "Employees' Adherence to Information Security Policies: An Empirical Study," in New Approaches for Security, Privacy and Trust in Complex Environments (Proceedings of the 22nd IFIP TC 11 International Information Security Conference), H. Venter, M. Eloff, L. Labuschagne, J. Eloff, and R. von Solms (eds.), Boston: Springer, pp. 133-144.
-
(2007)
New Approaches for Security, Privacy and Trust in Complex Environments (Proceedings of the 22nd IFIP TC 11 International Information Security Conference)
, pp. 133-144
-
-
Siponen, M.T.1
Pahnila, S.2
Mahmood, A.3
-
66
-
-
0000280419
-
Effective is security: An empirical study
-
Straub, D. W. 1990. "Effective IS Security: An Empirical Study," Information Systems Research (1:3), pp. 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
67
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D. W., and Welke, R. J. 1998. "Coping with Systems Risk: Security Planning Models for Management Decision Making," MIS Quarterly (22:4), pp. 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
68
-
-
79953278252
-
Security awareness programs: A proactive approach
-
Telders, E. 1991. "Security Awareness Programs: A Proactive Approach," Computer Security Journal (7:2), pp. 57-64.
-
(1991)
Computer Security Journal
, vol.7
, Issue.2
, pp. 57-64
-
-
Telders, E.1
-
70
-
-
0242517401
-
Information security awareness: Educating your users effectively
-
Thomson, M. E. and von Solms, R. "IS Security Awareness: Educating Your Users Effectively," Information Management & Computer Security (6:4), 1998, pp. 167-173. (Pubitemid 128623423)
-
(1998)
Information Management and Computer Security
, vol.6
, Issue.4
, pp. 167-173
-
-
Thomson, M.E.1
Von Solms, R.2
-
72
-
-
0001897127
-
Information security management: Why standards are important
-
von Solms, R. 1999. "Information Security Management: Why Standards Are Important," Information Management and Computer Security (7:1), pp. 50-58.
-
(1999)
Information Management and Computer Security
, vol.7
, Issue.1
, pp. 50-58
-
-
Von Solms, R.1
-
73
-
-
85104987112
-
A practical approach to is security awareness in the organization
-
A. Ghonaimy, M. T. El-Hadidi, and H. K. Aslan (eds.) , Boston: Kluwer Academic Press
-
Vroom, C., and von Solms, R. 2002. "A Practical Approach to IS Security Awareness in the Organization," in Security in the Information Society: Visions and Perxpectives (Proceedings of IFIP TC 11 17th International Conference on IS Security), A. Ghonaimy, M. T. El-Hadidi, and H. K. Aslan (eds.), Boston: Kluwer Academic Press, pp. 19-38.
-
(2002)
Security in the Information Society: Visions and Perxpectives (Proceedings of IFIP TC 11 17th International Conference on IS Security)
, pp. 19-38
-
-
Vroom, C.1
Von Solms, R.2
-
75
-
-
33746641326
-
Doing interpretive research
-
DOI 10.1057/palgrave.ejis.3000589, PII 3000589
-
Walsham, G. 2o06. "Doing Interpretive Research," European Journal of Information Systems (15:3), pp. 320-330. (Pubitemid 44146931)
-
(2006)
European Journal of Information Systems
, vol.15
, Issue.3
, pp. 320-330
-
-
Walsham, G.1
-
76
-
-
0043219327
-
Information security awareness raising methods
-
June
-
Wood, C. C. 1995. "Information Security Awareness Raising Methods," Computer Fraud & Security Bulletin, June, pp. 13-15.
-
(1995)
Computer Fraud & Security Bulletin
, pp. 13-15
-
-
Wood, C.C.1
-
77
-
-
0036884659
-
The human firewall manifesto
-
Wood, C. C. 2002. "The Human Firewall Manifesto," Computer Security Journal (18:1), pp. 15-18. (Pubitemid 35017348)
-
(2002)
Computer Security Journal
, vol.18
, Issue.1
, pp. 15-18
-
-
Wood, C.C.1
-
78
-
-
84996570963
-
Improving Security from the Ground Up
-
Wylder, J. O. 2003. "Improving Security From the Ground Up," Information Systems Security (11:6), pp. 29-38. (Pubitemid 36154092)
-
(2003)
INFORMATION SYSTEMS SECURITY
, vol.11
, Issue.6
, pp. 29-38
-
-
Wylder, J.O.1
|