-
1
-
-
19944394275
-
Bridging the gap between organizational and user perspectives of security in the clinical domain
-
Adams, A., and Blandford, A. Bridging the gap between organizational and user perspectives of security in the clinical domain. International Journal of Human-Computer Studies, 63, 1-2 (2005), 175-202.
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, Issue.1-2
, pp. 175-202
-
-
Adams, A.1
Blandford, A.2
-
3
-
-
81255210180
-
-
Constructing a TPB questionnaire: Conceptual and methodological considerations. University of Massachusetts, Amherst available at
-
Ajzen, I. Constructing a TPB questionnaire: Conceptual and methodological considerations. University of Massachusetts, Amherst, 2006 (available at http://people.umass.edu/aizen/ pdf/tpb.measurement.pdf).
-
(2006)
-
-
Ajzen, I.1
-
5
-
-
0002520483
-
Modeling IT ethics: A study in situational ethics
-
Banerjee, D.; Cronan, T.P.; and Jones, T.W. Modeling IT ethics: A study in situational ethics. MIS Quarterly, 22, 1 (1998), 31-60.
-
(1998)
MIS Quarterly
, vol.22
, Issue.1
, pp. 31-60
-
-
Banerjee, D.1
Cronan, T.P.2
Jones, T.W.3
-
6
-
-
12244306739
-
An information security meta-policy for emergent organizations
-
Baskerville, R.L., and Siponen, M.T. An information security meta-policy for emergent organizations. Logistics Information Management, 15, 5-6 (2002), 337-346.
-
(2002)
Logistics Information Management
, vol.15
, Issue.5-6
, pp. 337-346
-
-
Baskerville, R.L.1
Siponen, M.T.2
-
7
-
-
2342598277
-
Computer security impaired by legitimate users
-
Besnard, D., and Arief, B. Computer security impaired by legitimate users. Computers & Security, 23, 3 (2004), 253-264.
-
(2004)
Computers & Security
, vol.23
, Issue.3
, pp. 253-264
-
-
Besnard, D.1
Arief, B.2
-
8
-
-
33846007680
-
Influence processes for information technology acceptance: An elaboration likelihood model
-
Bhattacherjee, A., and Sanford, C. Influence processes for information technology acceptance: An elaboration likelihood model. MIS Quarterly, 30, 4 (2006), 805-825.
-
(2006)
MIS Quarterly
, vol.30
, Issue.4
, pp. 805-825
-
-
Bhattacherjee, A.1
Sanford, C.2
-
9
-
-
0141640903
-
Deviance regulation: A theory of action and identity
-
Blanton, H., and Christie, C. Deviance regulation: A theory of action and identity. Review of General Psychology, 7, 2 (2003), 115-149.
-
(2003)
Review of General Psychology
, vol.7
, Issue.2
, pp. 115-149
-
-
Blanton, H.1
Christie, C.2
-
10
-
-
77957061746
-
Information security policy compliance: An empirical study on rationality-based beliefs and information security awareness
-
Bulgurcu, B.; Cavusoglu, H.; and Benbasat, I. Information security policy compliance: An empirical study on rationality-based beliefs and information security awareness. MIS Quarterly, 34, 3 (2010), 523-548.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
12
-
-
61349159889
-
Perceptions of information security at the workplace: Linking information security climate to compliant behavior
-
Chan, M.; Woon, I.; and Kankanhalli, A. Perceptions of information security at the workplace: Linking information security climate to compliant behavior. Journal of Information Privacy and Security, 1, 3 (2005), 18-41.
-
(2005)
Journal of Information Privacy and Security
, vol.1
, Issue.3
, pp. 18-41
-
-
Chan, M.1
Woon, I.2
Kankanhalli, A.3
-
13
-
-
84928505317
-
Role identity and reasoned action in the prediction of repeated behavior
-
Charng, H.W.; Piliavin, J.A.; and Callero, P.L. Role identity and reasoned action in the prediction of repeated behavior. Social Psychology Quarterly, 51, 4 (1988), 303-317.
-
(1988)
Social Psychology Quarterly
, vol.51
, Issue.4
, pp. 303-317
-
-
Charng, H.W.1
Piliavin, J.A.2
Callero, P.L.3
-
14
-
-
58449126143
-
User satisfaction with an Internet-based portal: An asymmetric and nonlinear approach
-
Cheung, C.M.K., and Lee, M.K.O. User satisfaction with an Internet-based portal: An asymmetric and nonlinear approach. Journal of the American Society for Information Science and Technology, 60, 1 (2009), 111-122.
-
(2009)
Journal of the American Society for Information Science and Technology
, vol.60
, Issue.1
, pp. 111-122
-
-
Cheung, C.M.K.1
Lee, M.K.O.2
-
15
-
-
0003095695
-
The partial least squares approach to structural equation modeling. In G.A. Marcoulides (ed
-
Mahwah, NJ: Lawrence Erlbaum
-
Chin, W.W. The partial least squares approach to structural equation modeling. In G.A. Marcoulides (ed.), Modern Methods for Business Research. Mahwah, NJ: Lawrence Erlbaum, 1998, pp. 295-336.
-
(1998)
Modern Methods for Business Research
, pp. 295-336
-
-
Chin, W.W.1
-
16
-
-
0001878819
-
Jr. A paradigm for developing better measures of marketing constructs
-
Churchill, G.A., Jr. A paradigm for developing better measures of marketing constructs. Journal of Marketing Research, 16, 1 (1979), 64-73.
-
(1979)
Journal of Marketing Research
, vol.16
, Issue.1
, pp. 64-73
-
-
Churchill, G.A.1
-
18
-
-
67649551429
-
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
-
D'Arcy, J.; Hovav, A.; and Galletta, D. User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20, 1 (2009), 79-98.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 79-98
-
-
D'Arcy, J.1
Hovav, A.2
Galletta, D.3
-
19
-
-
0002698747
-
Information systems security management in the new millennium
-
Dhillon, G., and Backhouse, J. Information systems security management in the new millennium. Communications of the ACM, 43, 7 (2000), 125-128.
-
(2000)
Communications of the ACM
, vol.43
, Issue.7
, pp. 125-128
-
-
Dhillon, G.1
Backhouse, J.2
-
20
-
-
81255197040
-
Information technology at work: The implications for dignity at work
-
In S.C. Bolton (ed Oxford, UK: Butterworth- Heinemann
-
Doolin, B., and McLeod, L. Information technology at work: The implications for dignity at work. In S.C. Bolton (ed.), Dimensions of Dignity at Work. Oxford, UK: Butterworth- Heinemann, 2007, pp. 154-175.
-
(2007)
Dimensions of Dignity at Work
, pp. 154-175
-
-
Doolin, B.1
McLeod, L.2
-
21
-
-
84900482702
-
Security in the wild: User strategies for managing security as an everyday, practical problem
-
Dourish, P.; Grinter, R.E.; de la Flor, R.D.; and Joseph, M. Security in the wild: User strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 8, 6 (2004), 391-401.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 391-401
-
-
Dourish, P.1
Grinter, R.E.2
De La Flor, R.D.3
Joseph, M.4
-
22
-
-
81255176181
-
-
End users behaving badly. Network World December 10 available at
-
Dubie, D. End users behaving badly. Network World, December 10, 2007 (available at www. networkworld.com/slideshows/2007/121007-end-users-behaving- badly.html). 23. Eagly, A.H., and Chaiken, S. The Psychology of Attitudes. Fort Worth, TX: Harcourt Brace Jovanovich, 1993.
-
(2007)
-
-
Dubie, D.1
-
25
-
-
0000009769
-
Evaluating structural equation models with unobservable variables and measurement error
-
Fornell, C., and Larcker, D.F. Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 1 (1981), 39-50.
-
(1981)
Journal of Marketing Research
, vol.18
, Issue.1
, pp. 39-50
-
-
Fornell, C.1
Larcker, D.F.2
-
26
-
-
21344491319
-
Social construction of communication technology
-
Fulk, J. Social construction of communication technology. Academy of Management Journal, 36, 5 (1993), 921-950.
-
(1993)
Academy of Management Journal
, vol.36
, Issue.5
, pp. 921-950
-
-
Fulk, J.1
-
27
-
-
0000789331
-
An updated paradigm for scale development incorporating unidimensionality and its assessment
-
Gerbing, D.W., and Anderson, J.C. An updated paradigm for scale development incorporating unidimensionality and its assessment. Journal of Marketing Research, 25, 2 (1988), 186-192.
-
(1988)
Journal of Marketing Research
, vol.25
, Issue.2
, pp. 186-192
-
-
Gerbing, D.W.1
Anderson, J.C.2
-
29
-
-
0034226904
-
Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers
-
Grazioli, S., and Jarvenpaa, S.L. Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Human, 30, 4 (2000), 395-410.
-
(2000)
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Human
, vol.30
, Issue.4
, pp. 395-410
-
-
Grazioli, S.1
Jarvenpaa, S.L.2
-
30
-
-
0000917858
-
The effects of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
-
Harrington, S.J. The effects of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly, 20, 3 (1996), 257-278.
-
(1996)
MIS Quarterly
, vol.20
, Issue.3
, pp. 257-278
-
-
Harrington, S.J.1
-
31
-
-
85119232862
-
From wishes to action: The dead ends and short cuts on the long way to action
-
In M. Frese and J. Sabini (eds Hillsdale, NJ: Lawrence Erlbaum
-
Heckhausen, H., and Kuhl, J. From wishes to action: The dead ends and short cuts on the long way to action. In M. Frese and J. Sabini (eds.), Goal Directed Behavior: The Concept of Action in Psychology. Hillsdale, NJ: Lawrence Erlbaum, 1985, pp. 134-159.
-
(1985)
Goal Directed Behavior: The Concept of Action in Psychology
, pp. 134-159
-
-
Heckhausen, H.1
Kuhl, J.2
-
32
-
-
67349144062
-
Encouraging information security behaviors in organizations: Role of penalties, pressures, and perceived effectiveness
-
Herath, T., and Rao, H.R. Encouraging information security behaviors in organizations: Role of penalties, pressures, and perceived effectiveness. Decision Support Systems, 47, 2 (2009), 154-165.
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 154-165
-
-
Herath, T.1
Rao, H.R.2
-
33
-
-
67650152666
-
Protection motivation an deterrence: A framework for security policy compliance in organizations
-
Herath, T., and Rao, H.R. Protection motivation an deterrence: A framework for security policy compliance in organizations. European Journal of Information Systems, 18, 2 (2009), 106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
34
-
-
0002863814
-
Knowledge-based causal attribution-The abnormal conditions focus model
-
Hilton, D.J., and Slugoski, B.R. Knowledge-based causal attribution-The abnormal conditions focus model. Psychological Review, 93, 1 (1986), 75-88.
-
(1986)
Psychological Review
, vol.93
, Issue.1
, pp. 75-88
-
-
Hilton, D.J.1
Slugoski, B.R.2
-
35
-
-
0000230521
-
Use of partial least squares (PLS) in strategic management research: A review of four recent studies
-
Hulland, J. Use of partial least squares (PLS) in strategic management research: A review of four recent studies. Strategic Management Journal, 20, 2 (1999), 195-204.
-
(1999)
Strategic Management Journal
, vol.20
, Issue.2
, pp. 195-204
-
-
Hulland, J.1
-
36
-
-
33751161222
-
A longitudinal study of information system threat categories: The enduring problem of human error
-
Im, G.P., and Baskerville, R.L. A longitudinal study of information system threat categories: The enduring problem of human error. DATA BASE for Advances in Information Systems, 36, 4 (2005), 68-79.
-
(2005)
DATA BASE for Advances in Information Systems
, vol.36
, Issue.4
, pp. 68-79
-
-
Im, G.P.1
Baskerville, R.L.2
-
37
-
-
81255197039
-
-
Information security breaches survey Department for Business Enterprise & Regulatory Reform (BERR London 2008 available at
-
Information security breaches survey 2008. Department for Business Enterprise & Regulatory Reform (BERR), London, 2008 (available at www.bis.gov.uk/files/file45714.pdf).
-
(2008)
-
-
-
38
-
-
81255147039
-
An extension of the technology acceptance model to determine the intention to use biometric devices
-
In S. Clarke (ed Hershey, PA: IGI Global
-
James, T.; Pirim, T.; Boswell, K.; Reithel, B.; and Barkhi, R. An extension of the technology acceptance model to determine the intention to use biometric devices. In S. Clarke (ed.), End User Computing Challenges and Technologies: Emerging Tools and Applications. Hershey, PA: IGI Global, 2008, pp. 57-78.
-
(2008)
End User Computing Challenges and Technologies: Emerging Tools and Applications
, pp. 57-78
-
-
James, T.1
Pirim, T.2
Boswell, K.3
Reithel, B.4
Barkhi, R.5
-
39
-
-
0002447342
-
Consumer trust in an Internet store
-
Jarvenpaa, S.L.; Tractinsky, N.; and Vitale, M. Consumer trust in an Internet store. Information Technology and Management, 1, 1-2 (2000), 45-71.
-
(2000)
Information Technology and Management
, vol.1
, Issue.1-2
, pp. 45-71
-
-
Jarvenpaa, S.L.1
Tractinsky, N.2
Vitale, M.3
-
40
-
-
0033479307
-
Why differences make a difference: A field study of diversity, conflict, and performance in workgroups
-
Jehn, K.A.; Northcraft, G.B.; and Neale, M.A. Why differences make a difference: A field study of diversity, conflict, and performance in workgroups. Administrative Science Quarterly, 44, 4 (1999), 741-763.
-
(1999)
Administrative Science Quarterly
, vol.44
, Issue.4
, pp. 741-763
-
-
Jehn, K.A.1
Northcraft, G.B.2
Neale, M.A.3
-
41
-
-
58849133506
-
Information risk of inadvertent disclosure: An analysis of file-sharing risk in the financial supply chain
-
Fall
-
Johnson, M.E. Information risk of inadvertent disclosure: An analysis of file-sharing risk in the financial supply chain. Journal of Management Information Systems, 25, 2 (Fall 2008), 97-123.
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.2
, pp. 97-123
-
-
Johnson, M.E.1
-
42
-
-
33746380994
-
How large can a standardized coefficient be?
-
available at
-
Jöreskog, K.G. How large can a standardized coefficient be? Scientific Software International, Chicago, 1999 (available at www.ssicentral.com/lisrel/techdocs/HowLargeCana StandardizedCoefficientbe.pdf).
-
(1999)
Scientific Software International Chicago
-
-
Jöreskog, K.G.1
-
43
-
-
0001094004
-
Information technology adoption across time: A cross-sectional comparison of pre-adoption and post-adoption beliefs
-
Karahanna, E.; Straub, D.W.; and Chervany, N.L. Information technology adoption across time: A cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS Quarterly, 23, 2 (1999), 183-213.
-
(1999)
MIS Quarterly
, vol.23
, Issue.2
, pp. 183-213
-
-
Karahanna, E.1
Straub, D.W.2
Chervany, N.L.3
-
44
-
-
0036000547
-
Self-reported counterproductive behaviors and organizational citizenship behaviors: Separate but related constructs
-
Kelloway, E.K.; Loughlin, C.; Barling, J.; and Nault, A. Self-reported counterproductive behaviors and organizational citizenship behaviors: Separate but related constructs. International journal of Selection and Assessment, 10, 1-2 (2002), 143-151.
-
(2002)
International journal of Selection and Assessment
, vol.10
, Issue.1-2
, pp. 143-151
-
-
Kelloway, E.K.1
Loughlin, C.2
Barling, J.3
Nault, A.4
-
45
-
-
73549118703
-
Computer abuse and computer crime as organizational activities
-
Kling, R. Computer abuse and computer crime as organizational activities. Computer/ Law Journal, 2, 2 (1980), 186-196.
-
(1980)
Computer/ Law Journal
, vol.2
, Issue.2
, pp. 186-196
-
-
Kling, R.1
-
46
-
-
33644533141
-
Information security: Management's effect on culture and policy
-
Knapp, K.J.; Marshall, T.E.; Rainer, R.K.; and Ford, F.N. Information security: Management's effect on culture and policy. Information Management & Computer Security, 14, 1 (2006), 24-36.
-
(2006)
Information Management & Computer Security
, vol.14
, Issue.1
, pp. 24-36
-
-
Knapp, K.J.1
Marshall, T.E.2
Rainer, R.K.3
Ford, F.N.4
-
47
-
-
77956445011
-
WarpPLS 1.0 user manual
-
available at
-
Kock, N. WarpPLS 1.0 user manual. ScriptWarp Systems, 2010 (available at www .scriptwarp.com/warppls/UserManual.pdf).
-
(2010)
ScriptWarp Systems
-
-
Kock, N.1
-
48
-
-
81255176179
-
Why are cross-loadings so low in WarpPLS?
-
available at
-
Kock, N. Why are cross-loadings so low in WarpPLS? WarpPLS, 2010 (available at http:// warppls.blogspot.com/2010/01/why-are-cross-loadings-so- low-in.html).
-
(2010)
WarpPLS
-
-
Kock, N.1
-
49
-
-
1242263532
-
Why there aren't more information security research studies
-
Kotulic, A.G., and Clark, J.G. Why there aren't more information security research studies. Information & Management, 41, 5 (2004), 597-607.
-
(2004)
Information & Management
, vol.41
, Issue.5
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, J.G.2
-
50
-
-
33644667546
-
A multilevel model of resistance to information technology implementation
-
Lapointe, L., and Rivard, S. A multilevel model of resistance to information technology implementation. MIS Quarterly, 29, 3 (2005), 461-491.
-
(2005)
MIS Quarterly
, vol.29
, Issue.3
, pp. 461-491
-
-
Lapointe, L.1
Rivard, S.2
-
52
-
-
4644242309
-
Illegal, inappropriate, and unethical behavior in an information technology context: A study to explain influences
-
Article 12
-
Leonard, L.N.K., and Cronan, T.P. Illegal, inappropriate, and unethical behavior in an information technology context: A study to explain influences. Journal of the Association for Information Systems, 1, 1 (2001), Article 12.
-
(2001)
Journal of the Association for Information Systems
, vol.1
, pp. 1
-
-
Leonard, L.N.K.1
Cronan, T.P.2
-
53
-
-
28244495973
-
A methodology for construct development in MIS research
-
Lewis, B.R.; Templeton, G.F.; and Byrd, T.A. A methodology for construct development in MIS research. European Journal of Information Systems, 14, 4 (2005), 388-400.
-
(2005)
European Journal of Information Systems
, vol.14
, Issue.4
, pp. 388-400
-
-
Lewis, B.R.1
Templeton, G.F.2
Byrd, T.A.3
-
54
-
-
33847761422
-
Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management
-
Liang, H.; Saraf, N.; Hu, Q.; and Xue, Y. Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management. MIS Quarterly, 31, 1 (2007), 59-87.
-
(2007)
MIS Quarterly
, vol.31
, Issue.1
, pp. 59-87
-
-
Liang, H.1
Saraf, N.2
Hu, Q.3
Xue, Y.4
-
55
-
-
0000133760
-
Threats to information systems: Today's reality, yesterday's understanding
-
Loch, K.D.; Carr, H.H.; and Warkentin, M.E. Threats to information systems: Today's reality, yesterday's understanding. MIS Quarterly, 17, 2 (1992), 173-186.
-
(1992)
MIS Quarterly
, vol.17
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
56
-
-
13244298307
-
Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model
-
Malhotra, N.K.; Kim, S.S.; and Agarwal, J. Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15, 4 (2004), 336-355.
-
(2004)
Information Systems Research
, vol.15
, Issue.4
, pp. 336-355
-
-
Malhotra, N.K.1
Kim, S.S.2
Agarwal, J.3
-
57
-
-
73449149291
-
Development of an instrument to measure the perceptions of adopting an information technology innovation
-
Moore, G.C., and Benbasat, I. Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2, 3 (1991), 192-222.
-
(1991)
Information Systems Research
, vol.2
, Issue.3
, pp. 192-222
-
-
Moore, G.C.1
Benbasat, I.2
-
58
-
-
67650143327
-
What levels of moral reasoning and values explain adherence to information security rules? An empirical study
-
Myyry, L.; Siponen, M.; Pahnila, S.; Vartiainen, T., and Vance, A. What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems, 18, 2 (2009), 126-139.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 126-139
-
-
Myyry, L.1
Siponen, M.2
Pahnila, S.3
Vartiainen, T.4
Vance, A.5
-
59
-
-
39749168050
-
Employees' behavior towards IS security policy complianc
-
In R.H. Sprague (ed Los Alamitos, CA: IEEE Computer Society Press
-
Pahnila, S.; Siponen, M.T.; and Mahmood, A. Employees' behavior towards IS security policy compliance. In R.H. Sprague (ed.), Proceedings of the 40th Annual Hawaii International Conference on System Sciences. Los Alamitos, CA: IEEE Computer Society Press, 2007.
-
(2007)
Proceedings of the 40th Annual Hawaii International Conference on System Sciences
-
-
Pahnila, S.1
Siponen, M.T.2
Mahmood, A.3
-
60
-
-
67649951505
-
Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model
-
Pavlou, P.A. Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7, 3 (2003), 69-103.
-
(2003)
International Journal of Electronic Commerce
, vol.7
, Issue.3
, pp. 69-103
-
-
Pavlou, P.A.1
-
61
-
-
2442676514
-
Building effective online marketplaces with institution-based trust
-
Pavlou, P.A., and Gefen, D. Building effective online marketplaces with institution-based trust. Information Systems Research, 15, 1 (2004), 37-59.
-
(2004)
Information Systems Research
, vol.15
, Issue.1
, pp. 37-59
-
-
Pavlou, P.A.1
Gefen, D.2
-
62
-
-
81255210175
-
-
Perceptions and behaviors of remote workers: Keys to building a secure company White Paper, Cisco Systems, San Jose, CA
-
Perceptions and behaviors of remote workers: Keys to building a secure company. White Paper, Cisco Systems, San Jose, CA, 2006.
-
(2006)
-
-
-
63
-
-
35448977285
-
A multi-level perspective on personal selection research and practice: Implications for selection system design, assessment, and construct validation
-
In F.J. Yammarino and F. Dansereau (eds Oxford: Elsevier Science
-
Ployhart, R.E., and Schneider, B. A multi-level perspective on personal selection research and practice: Implications for selection system design, assessment, and construct validation. In F.J. Yammarino and F. Dansereau (eds.), The Many Faces of Multi-Level Issues. Oxford: Elsevier Science, 2002, pp. 95-140.
-
(2002)
The Many Faces of Multi-Level Issues
, pp. 95-140
-
-
Ployhart, R.E.1
Schneider, B.2
-
64
-
-
85046049330
-
Multilevel selection and prediction: Theories, methods, and models
-
In A. Evers, O. Omit-Voskuyl, and N. Anderson (eds Malden, MA: Blackwell
-
Ployhart, R.E., and Schneider, B. Multilevel selection and prediction: Theories, methods, and models. In A. Evers, O. Omit-Voskuyl, and N. Anderson (eds.), The Blackwell Handbook of Personnel Selection. Malden, MA: Blackwell, 2005, pp. 495-516.
-
(2005)
The Blackwell Handbook of Personnel Selection
, pp. 495-516
-
-
Ployhart, R.E.1
Schneider, B.2
-
65
-
-
84970235764
-
Self-reports in organizational research: Problems and prospects
-
Podasakoff, P.M., and Organ, D.W. Self-reports in organizational research: Problems and prospects. Journal of Management, 12, 4 (1986), 531-544.
-
(1986)
Journal of Management
, vol.12
, Issue.4
, pp. 531-544
-
-
Podasakoff, P.M.1
Organ, D.W.2
-
66
-
-
0141907688
-
Common method biases in behavioral research: A critical review of the literature and recommended remedies
-
Podasakoff, P.M.; MacKenzie, S.B.; Lee, J.-Y.; and Podsakoff, N.P. Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88, 5 (2003), 879-903.
-
(2003)
Journal of Applied Psychology
, vol.88
, Issue.5
, pp. 879-903
-
-
Podasakoff, P.M.1
MacKenzie, S.B.2
Lee, J.-Y.3
Podsakoff, N.P.4
-
67
-
-
34248334263
-
Evaluating information security tradeoff: Restricting access can interfere with user tasks
-
Post, G.V., and Kagan, A. Evaluating information security tradeoff: Restricting access can interfere with user tasks. Computers & Security, 26, 3 (2007), 229-237.
-
(2007)
Computers & Security
, vol.26
, Issue.3
, pp. 229-237
-
-
Post, G.V.1
Kagan, A.2
-
70
-
-
26844501781
-
Changing faces: Professional image construction in diverse organizational settings
-
Roberts, L.M. Changing faces: Professional image construction in diverse organizational settings. Academy of Management Review, 30, 4 (2005), 685-711.
-
(2005)
Academy of Management Review
, vol.30
, Issue.4
, pp. 685-711
-
-
Roberts, L.M.1
-
71
-
-
0032218162
-
Monkey see, monkey do: The influence of work groups on the antisocial behavior of employees
-
Robinson, S.L., and O'Leary-Kelly, A.M. Monkey see, monkey do: The influence of work groups on the antisocial behavior of employees. Academy of Management Journal, 41, 6 (1998), 658-672.
-
(1998)
Academy of Management Journal
, vol.41
, Issue.6
, pp. 658-672
-
-
Robinson, S.L.1
O'Leary-Kelly, A.M.2
-
72
-
-
0035387175
-
Transforming the "weakest link"-A human/ computer interaction approach to usable and effective security
-
Sasse, M.A.; Brostoff, S.; and Weirich, D. Transforming the "weakest link"-A human/ computer interaction approach to usable and effective security. BT Technology Journal, 19, 2 (2001), 122-131.
-
(2001)
BT Technology Journal
, vol.19
, Issue.2
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
74
-
-
72949107357
-
Illegitimate tasks and counterproductive work behavior
-
Semmer, N.K.; Tschan, F.; Meier, L.L.; Facchin, S.; and Jacobshagen, N. Illegitimate tasks and counterproductive work behavior. Applied Psychology: An International Review, 59, 1 (2010), 70-96.
-
(2010)
Applied Psychology: An International Review
, vol.59
, Issue.1
, pp. 70-96
-
-
Semmer, N.K.1
Tschan, F.2
Meier, L.L.3
Facchin, S.4
Jacobshagen, N.5
-
75
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Siponen, M.T. A conceptual foundation for organizational information security awareness. Information Management & Computer Security, 8, 1 (2000), 31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.T.1
-
76
-
-
77957068563
-
Neutralization: New insight into the problem of employee information systems security policy violation
-
Siponen, M.T., and Vance, A. Neutralization: New insight into the problem of employee information systems security policy violation. MIS Quarterly, 34, 3 (2010), 487-502.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 487-502
-
-
Siponen, M.T.1
Vance, A.2
-
77
-
-
0036001754
-
Consumer trust, value, and loyalty in relational exchanges
-
Sirdeshmukh, D.; Singh, J.; and Sabol, B. Consumer trust, value, and loyalty in relational exchanges. Journal of Marketing, 65, 1 (2002), 15-37.
-
(2002)
Journal of Marketing
, vol.65
, Issue.1
, pp. 15-37
-
-
Sirdeshmukh, D.1
Singh, J.2
Sabol, B.3
-
78
-
-
0000987320
-
Acting on one's attitudes: Procedures for linking attitude and behavior
-
Snyder, M., and Kendzierski, D. Acting on one's attitudes: Procedures for linking attitude and behavior. Journal of Experimental Social Psychology, 18, 2 (1982), 165-183.
-
(1982)
Journal of Experimental Social Psychology
, vol.18
, Issue.2
, pp. 165-183
-
-
Snyder, M.1
Kendzierski, D.2
-
79
-
-
77957070672
-
User participation in information systems security risk management
-
Spears, J.L., and Barki, H. User participation in information systems security risk management. MIS Quarterly, 34, 3 (2010), 503-522.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 503-522
-
-
Spears, J.L.1
Barki, H.2
-
80
-
-
55249123249
-
Validating instruments in MIS research
-
Straub, D.W. Validating instruments in MIS research. MIS Quarterly, 13, 2 (1989), 147-169.
-
(1989)
MIS Quarterly
, vol.13
, Issue.2
, pp. 147-169
-
-
Straub, D.W.1
-
81
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub, D.W. Effective IS security: An empirical study. Information Systems Research, 1, 3 (1990), 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
82
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations: A field study
-
Straub, D.W., and Nance, W.D. Discovering and disciplining computer abuse in organizations: A field study. MIS Quarterly, 14, 1 (1990), 45-60.
-
(1990)
MIS Quarterly
, vol.14
, Issue.1
, pp. 45-60
-
-
Straub, D.W.1
Nance, W.D.2
-
83
-
-
13244286108
-
Validation guidelines for IS positivist research
-
Straub, D.W.; Boudreau, M.; and Gefen, D. Validation guidelines for IS positivist research. Communications of the Association for Information Systems, 13, 1 (2004), 380-427.
-
(2004)
Communications of the Association for Information Systems
, vol.13
, Issue.1
, pp. 380-427
-
-
Straub, D.W.1
Boudreau, M.2
Gefen, D.3
-
84
-
-
0013435035
-
The theory of planned behaviour: Self-identity, social identity and group norms
-
Terry, D.J.; Hogg, M.A.; and White, K.M. The theory of planned behaviour: Self-identity, social identity and group norms. British Journal of Social Psychology, 38, 3 (1999), 225-244.
-
(1999)
British Journal of Social Psychology
, vol.38
, Issue.3
, pp. 225-244
-
-
Terry, D.J.1
Hogg, M.A.2
White, K.M.3
-
85
-
-
0020744868
-
Multiple identities and psychological well-being: A reformulation and test of the social isolation hypothesis
-
Thoits, P.A. Multiple identities and psychological well-being: A reformulation and test of the social isolation hypothesis. American Sociological Review, 48, 2 (1983), 174-187.
-
(1983)
American Sociological Review
, vol.48
, Issue.2
, pp. 174-187
-
-
Thoits, P.A.1
-
86
-
-
84936146063
-
On merging identity theory and stress research
-
Thoits, P.A. On merging identity theory and stress research. Social Psychology Quarterly, 54, 2 (1991), 101-112.
-
(1991)
Social Psychology Quarterly
, vol.54
, Issue.2
, pp. 101-112
-
-
Thoits, P.A.1
-
87
-
-
72049126081
-
Nonlinearities between attitude and subjective norms in information technology acceptance: A negative synergy?
-
Titah, R., and Barki, H. Nonlinearities between attitude and subjective norms in information technology acceptance: A negative synergy? MIS Quarterly, 33, 4 (2009), 827-844.
-
(2009)
MIS Quarterly
, vol.33
, Issue.4
, pp. 827-844
-
-
Titah, R.1
Barki, H.2
-
89
-
-
32544440696
-
Can businesses effectively regulate employee conduct? The antecedents of rule following in work settings
-
Tyler, T.R., and Blader, S.L. Can businesses effectively regulate employee conduct? The antecedents of rule following in work settings. Academy of Management Journal, 48, 6 (2005), 1143-1158.
-
(2005)
Academy of Management Journal
, vol.48
, Issue.6
, pp. 1143-1158
-
-
Tyler, T.R.1
Blader, S.L.2
-
90
-
-
1542382496
-
User acceptance of information technology: Toward a unified view
-
Venkatesh, V.; Morris, M.G.; Davis, G.B.; and Davis, F.D. User acceptance of information technology: Toward a unified view. MIS Quarterly, 27, 3 (2003), 425-478.
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.G.2
Davis, G.B.3
Davis, F.D.4
-
91
-
-
32044435280
-
Designing vignette studies in marketing
-
Wason, K.D.; Polonsky, M.J.; and Hyman, M.R. Designing vignette studies in marketing. Australasian Marketing Journal, 10, 3 (2002), 41-58.
-
(2002)
Australasian Marketing Journal
, vol.10
, Issue.3
, pp. 41-58
-
-
Wason, K.D.1
Polonsky, M.J.2
Hyman, M.R.3
-
92
-
-
21844511816
-
Rational and social theories as complementary explanations of communication media choices: Two policy-capturing studies
-
Webster, J., and Trevino, L.K. Rational and social theories as complementary explanations of communication media choices: Two policy-capturing studies. Academy of Management Journal, 38, 6 (1995), 1544-1572.
-
(1995)
Academy of Management Journal
, vol.38
, Issue.6
, pp. 1544-1572
-
-
Webster, J.1
Trevino, L.K.2
-
93
-
-
18844458431
-
An unappreciated reason why information security policies fail
-
Wood, C.C. An unappreciated reason why information security policies fail. Computer Fraud & Security, 10 (2000), 13-14.
-
(2000)
Computer Fraud & Security
, vol.10
, pp. 13-14
-
-
Wood, C.C.1
-
94
-
-
33846344673
-
Punishment and ethics deterrents: A study of insider security contravention
-
Workman, M., and Gathegi, J. Punishment and ethics deterrents: A study of insider security contravention. Journal of the American Society for Information Science and Technology, 58, 2 (2006), 212-222.
-
(2006)
Journal of the American Society for Information Science and Technology
, vol.58
, Issue.2
, pp. 212-222
-
-
Workman, M.1
Gathegi, J.2
-
95
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
Workman, M.; Bommer, W.H.; and Straub, D.W. Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior, 24, 6 (2008), 2799-2816.
-
(2008)
Computers in Human Behavior
, vol.24
, Issue.6
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.H.2
Straub, D.W.3
-
96
-
-
27544443011
-
Predicting the usage of P2P sharing software: The role of trust and perceived risk
-
IEEE Computer Society Press In R.H. Sprague (ed Los Alamitos, CA :
-
Xu, H.; Wang, H.; and Teo, H.-H. Predicting the usage of P2P sharing software: The role of trust and perceived risk. In R.H. Sprague (ed.), Proceedings of the 38th Annual Hawaii International Conference on System Sciences. Los Alamitos, CA : IEEE Computer Society Press, 2005.
-
(2005)
Proceedings of the 38th Annual Hawaii International Conference on System Sciences
-
-
Xu, H.1
Wang, H.2
Teo, H.-H.3
-
97
-
-
44449104957
-
Exploring asymmetric effects in the formation of retail price satisfaction
-
Zielke, S. Exploring asymmetric effects in the formation of retail price satisfaction. Journal of Retailing and Consumer Services, 15, 5 (2008), 335-347.
-
(2008)
Journal of Retailing and Consumer Services
, vol.15
, Issue.5
, pp. 335-347
-
-
Zielke, S.1
-
98
-
-
0033277446
-
Password security: An empirical study
-
Spring
-
Zviran, M., and Haga, W.J. Password security: An empirical study. Journal of Management Information Systems, 15, 4 (Spring 1999), 161-185.
-
(1999)
Journal of Management Information Systems
, vol.15
, Issue.4
, pp. 161-185
-
-
Zviran, M.1
Haga, W.J.2
|