-
3
-
-
61349159889
-
Perceptions of information security in the workplace: Linking information security climate to compliant behavior
-
M. Chan, I. Woon, and A. Kankanhalli Perceptions of information security in the workplace: linking information security climate to compliant behavior Journal of Information Privacy and Security 1 2006 18 41
-
(2006)
Journal of Information Privacy and Security
, vol.1
, pp. 18-41
-
-
Chan, M.1
Woon, I.2
Kankanhalli, A.3
-
4
-
-
34848873123
-
Deterring internal information systems misuse
-
DOI 10.1145/1290958.1290971, 1290971
-
D. D'Arcy, and A. Hovav Deterring internal information systems misuse Communications of the ACM 50 2007 113 117 (Pubitemid 47505008)
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 113-117
-
-
D'Arcy, J.1
Hovav, A.2
-
5
-
-
67349280492
-
Does one size fit all? Examining the differential effects of IS security countermeasures
-
D. D'Arcy, and A. Hovav Does one size fit all? Examining the differential effects of IS security countermeasures Journal of Business Ethics 89 2009 57 71
-
(2009)
Journal of Business Ethics
, vol.89
, pp. 57-71
-
-
D'Arcy, D.1
Hovav, A.2
-
6
-
-
80455178572
-
A review and analysis of deterrence theory in the IS security literature: Making sense of disparate findings
-
D. D'Arcy, and T. Herath A review and analysis of deterrence theory in the IS security literature: making sense of disparate findings European Journal of Information Systems 20 2011 643 658
-
(2011)
European Journal of Information Systems
, vol.20
, pp. 643-658
-
-
D'Arcy, D.1
Herath, T.2
-
8
-
-
63349084985
-
-
[cited 26 October 2010] Available from
-
Deloitte Global security survey [cited 26 October 2010] 2007 Available from: http://www.deloitte.com/view/en-GX/global/industries/financial-services/ 5f5d5724a82fb110VgnVCM100000ba42f00aRCRD.htm
-
(2007)
Global Security Survey
-
-
-
9
-
-
61349200300
-
From culture to disobedience: Recognising the varying user acceptance of IT security
-
S. Furnell, and K.-L. Thomson From culture to disobedience: recognising the varying user acceptance of IT security Computer Fraud & Security 2009 2009 5 10
-
(2009)
Computer Fraud & Security
, vol.2009
, pp. 5-10
-
-
Furnell, S.1
Thomson, K.-L.2
-
10
-
-
12344305644
-
Self-control, deviant peers, and software piracy
-
E. George, G.E. Higgins, and D.A. Makin Self-Control, deviant peers and software piracy Psychological Reports 95 2004 921 931 (Pubitemid 40131934)
-
(2004)
Psychological Reports
, vol.95
, Issue.3
, pp. 921-931
-
-
Higgins, G.E.1
Makin, D.A.2
-
11
-
-
84935667238
-
Conscience, significant others, and rational choice: Extending the deterrence model
-
H.G. Grasmick, and R.J. Bursik Conscience, significant others, and rational choice: extending the deterrence model Law & Society Review 24 1990 837 862
-
(1990)
Law & Society Review
, vol.24
, pp. 837-862
-
-
Grasmick, H.G.1
Bursik, R.J.2
-
12
-
-
67349144062
-
Encouraging information security behavior in organizations: Role of penalties, pressures and perceived effectiveness
-
T. Herath, and H.R. Rao Encouraging information security behavior in organizations: role of penalties, pressures and perceived effectiveness Decision Support Systems 47 2009 154 165
-
(2009)
Decision Support Systems
, vol.47
, pp. 154-165
-
-
Herath, T.1
Rao, H.R.2
-
13
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
T. Herath, and H.R. Rao Protection motivation and deterrence: a framework for security policy compliance in organisations European Journal of Information Systems 18 2009 106 125
-
(2009)
European Journal of Information Systems
, vol.18
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
16
-
-
84856018908
-
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
-
P. Ifinedo Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory Computers & Security 31 2011 83 95
-
(2011)
Computers & Security
, vol.31
, pp. 83-95
-
-
Ifinedo, P.1
-
17
-
-
79959606753
-
Motivation and multimodal interaction in model-driven educational game design
-
M. Jovanovic, D. Starcevic, M. Minovic, and V. Stavljanin Motivation and multimodal interaction in model-driven educational game design IEEE Transactions on Systems, Man and Cybernetics Systems and Humans, Part A 41 2011 817 824
-
(2011)
IEEE Transactions on Systems, Man and Cybernetics Systems and Humans, Part A
, vol.41
, pp. 817-824
-
-
Jovanovic, M.1
Starcevic, D.2
Minovic, M.3
Stavljanin, V.4
-
18
-
-
0345764837
-
Improving user security behaviour
-
J. Leach Improving user security behaviour Computers & Security 22 2003 685 692
-
(2003)
Computers & Security
, vol.22
, pp. 685-692
-
-
Leach, J.1
-
19
-
-
84862270515
-
Open source software adoption: Motivations of adopters and amotivations of non-adopters
-
Y. Li, T. Chan-Hoo, X. Heng, and T. Hock-Hai Open source software adoption: motivations of adopters and amotivations of non-adopters SIGMIS Database 42 2011 76 94
-
(2011)
SIGMIS Database
, vol.42
, pp. 76-94
-
-
Li, Y.1
Chan-Hoo, T.2
Heng, X.3
Hock-Hai, T.4
-
20
-
-
0036173202
-
Insider threat prediction tool: Evaluating the probability of IT misuse
-
DOI 10.1016/S0167-4048(02)00109-8
-
G.B. Magklaras, and S.M. Furnell Insider threat prediction tool: evaluating the probability of IT misuse Computers & Security 21 2001 62 73 (Pubitemid 34133784)
-
(1998)
Computers and Security
, vol.21
, Issue.1
, pp. 62-73
-
-
Magklaras, G.B.1
Furnell, S.M.2
-
25
-
-
0002209063
-
Intrinsic and extrinsic motivations: Classic definitions and new directions
-
R.M. Ryan, and E.L. Deci Intrinsic and extrinsic motivations: classic definitions and new directions Contemporary Educational Psychology 25 2000 54 67
-
(2000)
Contemporary Educational Psychology
, vol.25
, pp. 54-67
-
-
Ryan, R.M.1
Deci, E.L.2
-
26
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
DOI 10.1016/S0167-4048(02)01009-X
-
E.E. Schultz A framework for understanding and predicting insider attacks Computers & Security 21 2002 526 531 (Pubitemid 35186246)
-
(2002)
Computers and Security
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.E.1
-
28
-
-
0025430236
-
Criminological concepts and research findings relevant for improving computer crime control
-
DOI 10.1016/0167-4048(90)90166-Q
-
S. Sherizen Criminological concepts and research findings relevant for improving computer crime control Computers & Security 9 1990 215 222 (Pubitemid 20694883)
-
(1990)
Computers and Security
, vol.9
, Issue.3
, pp. 215-222
-
-
Sherizen Sanford1
-
30
-
-
77149132467
-
Compliance with information security policies: An empirical investigation
-
M. Siponen, S. Pahnila, and M.A. Mahmood Compliance with information security policies: an empirical investigation Computer 43 2010 64 71
-
(2010)
Computer
, vol.43
, pp. 64-71
-
-
Siponen, M.1
Pahnila, S.2
Mahmood, M.A.3
-
33
-
-
70349569700
-
What needs tell us about user experience
-
T. Gross, J. Gulliksen, P. Kotzé, L. Oestreicher, P. Palanque, R. Prates, Springer Berlin/Heidelberg
-
A. Wiklund-Engblom, M. Hassenzahl, A. Bengs, and S. Sperring What needs tell us about user experience T. Gross, J. Gulliksen, P. Kotzé, L. Oestreicher, P. Palanque, R. Prates, Human-computer interaction - INTERACT 2009 2009 Springer Berlin/Heidelberg 666 669
-
(2009)
Human-computer Interaction - INTERACT 2009
, pp. 666-669
-
-
Wiklund-Engblom, A.1
Hassenzahl, M.2
Bengs, A.3
Sperring, S.4
-
34
-
-
70149119150
-
Overcoming the insider: Reducing employee computer crime through situational crime prevention
-
R. Willison, and M. Siponen Overcoming the insider: reducing employee computer crime through situational crime prevention Communications of the ACM 52 2009 133 137
-
(2009)
Communications of the ACM
, vol.52
, pp. 133-137
-
-
Willison, R.1
Siponen, M.2
-
35
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
M. Workman, W.H. Bommer, and D. Straub Security lapses and the omission of information security measures: a threat control model and empirical test Computers in Human Behavior 24 2008 2799 2816
-
(2008)
Computers in Human Behavior
, vol.24
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.H.2
Straub, D.3
|