-
2
-
-
72049101186
-
Interpretation of formative measurement in information systems research
-
R. Cenfetelli, and G. Bassellier Interpretation of formative measurement in information systems research MIS Quarterly 33 4 2009 689 708
-
(2009)
MIS Quarterly
, vol.33
, Issue.4
, pp. 689-708
-
-
Cenfetelli, R.1
Bassellier, G.2
-
3
-
-
29444460597
-
A practical guide to factorial validity using PLS-graph: Tutorial and annotated example
-
Gefen, and Straub A practical guide to factorial validity using PLS-graph: tutorial and annotated example Communications of the Association for Information Systems 16 5 2005 91 109
-
(2005)
Communications of the Association for Information Systems
, vol.16
, Issue.5
, pp. 91-109
-
-
Gefen1
Straub2
-
4
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
T. Herath, and H.R. Rao Protection motivation and deterrence: a framework for security policy compliance in organisations European Journal of Information Systems 18 2 2009 106 125
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
5
-
-
84859105508
-
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea
-
A. Hovav, and J. D'Arcy Applying an extended model of deterrence across cultures: an investigation of information systems misuse in the U.S. and South Korea Information and Management 49 2 2012 99 110
-
(2012)
Information and Management
, vol.49
, Issue.2
, pp. 99-110
-
-
Hovav, A.1
D'Arcy, J.2
-
6
-
-
80054707541
-
Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies
-
Jai-Yeol, and Son Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies Information and Management 48 7 2011 296 302
-
(2011)
Information and Management
, vol.48
, Issue.7
, pp. 296-302
-
-
Jai-Yeol1
Son2
-
7
-
-
77957057727
-
Fear appeals and information security behaviors: An empirical study
-
A. Johnston, and M. Warkentin Fear appeals and information security behaviors: an empirical study MIS Quarterly 34 3 2010 549 566
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 549-566
-
-
Johnston, A.1
Warkentin, M.2
-
8
-
-
1242263532
-
Why there aren't more information security research studies
-
A.G. Kotulic, and J.G. Clark Why there aren't more information security research studies Information and Management 41 5 2004 597 607
-
(2004)
Information and Management
, vol.41
, Issue.5
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, J.G.2
-
9
-
-
2342489402
-
An integrative model of computer abuse based on social control and general deterrence theories
-
S.M. Lee, S.G. Lee, and S. Yoo An integrative model of computer abuse based on social control and general deterrence theories Information and Management 41 2004 707 718
-
(2004)
Information and Management
, vol.41
, pp. 707-718
-
-
Lee, S.M.1
Lee, S.G.2
Yoo, S.3
-
10
-
-
12444325211
-
Force of habit and information systems usage: Theory and initial validation
-
M. Limayem, and S.G. Hirt Force of habit and information systems usage: theory and initial validation Journal of the AIS 4 1 2003 65 97
-
(2003)
Journal of the AIS
, vol.4
, Issue.1
, pp. 65-97
-
-
Limayem, M.1
Hirt, S.G.2
-
11
-
-
67650143327
-
What levels of moral reasoning and values explain adherence to information security rules? An empirical study
-
L. Myyry, M. Siponen, S. Pahnila, T. Vartiainen, and A. Vance What levels of moral reasoning and values explain adherence to information security rules? An empirical study European Journal of Information Systems 18 2 2009 126 139
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 126-139
-
-
Myyry, L.1
Siponen, M.2
Pahnila, S.3
Vartiainen, T.4
Vance, A.5
-
12
-
-
69549083453
-
Why break the habit of a lifetime? Rethinking the roles of intention, habit, and emotion in continuing information technology use
-
A. Ortiz de Guinea, and L.M. Markus Why break the habit of a lifetime? Rethinking the roles of intention, habit, and emotion in continuing information technology use MIS Quarterly 33 3 2009 433 444
-
(2009)
MIS Quarterly
, vol.33
, Issue.3
, pp. 433-444
-
-
Ortiz De Guinea, A.1
Markus, L.M.2
-
14
-
-
33745320750
-
Control balance and exploitative corporate crime
-
N.L. Piquero, and A.R. Piquero Control balance and exploitative corporate crime Criminology 44 2 2006 397 430
-
(2006)
Criminology
, vol.44
, Issue.2
, pp. 397-430
-
-
Piquero, N.L.1
Piquero, A.R.2
-
15
-
-
1642602843
-
Projected offending and implications for heterotypic continuity
-
G. Pogarsky Projected offending and implications for heterotypic continuity Criminology 42 1 2004 111 135
-
(2004)
Criminology
, vol.42
, Issue.1
, pp. 111-135
-
-
Pogarsky, G.1
-
16
-
-
78650770842
-
Improving employees' compliance through information systems security training: An action research study
-
P. Puhakainen, and M. Siponen Improving employees' compliance through information systems security training: an action research study MIS Quarterly 34 4 2010 757 778
-
(2010)
MIS Quarterly
, vol.34
, Issue.4
, pp. 757-778
-
-
Puhakainen, P.1
Siponen, M.2
-
17
-
-
77957068563
-
Neutralization: New insights into the problem of employee information systems security policy violations
-
M. Siponen, and A. Vance Neutralization: new insights into the problem of employee information systems security policy violations MIS Quarterly 34 3 2010 487 502
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 487-502
-
-
Siponen, M.1
Vance, A.2
-
18
-
-
67651102640
-
Information security management standards: Problems and solutions
-
M. Siponen, and R. Willison Information security management standards: problems and solutions Information and Management 46 5 2009 267 270
-
(2009)
Information and Management
, vol.46
, Issue.5
, pp. 267-270
-
-
Siponen, M.1
Willison, R.2
-
19
-
-
17844366573
-
Analysis of end user security behaviors
-
DOI 10.1016/j.cose.2004.07.001, PII S0167404804001841
-
J. Stanton, K. Stam, P. Mastrangelo, and J. Jolton Analysis of end user security behaviors Computers and Security 24 2 2005 124 133 (Pubitemid 40583824)
-
(2005)
Computers and Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
20
-
-
0141981362
-
Reflections on Past Behavior: A Self-Report Index of Habit Strength
-
Verplanken, and Orbell Reflections on past behavior: a self-report index of habit strength Journal of Applied Social Psychology 33 6 2003 1313 1330 (Pubitemid 37306730)
-
(2003)
Journal of Applied Social Psychology
, vol.33
, Issue.6
, pp. 1313-1330
-
-
Verplanken, B.1
Orbell, S.2
-
22
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
M. Workman, W. Bommer, and D. Straub Security lapses and the omission of information security measures: a threat control model and empirical test Computers in Human Behavior 24 6 2008 2799 2816
-
(2008)
Computers in Human Behavior
, vol.24
, Issue.6
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.2
Straub, D.3
|