-
1
-
-
33645986181
-
Personal fables, narcissism, and adolescent adjustment
-
DOI 10.1002/pits.20162
-
M.C. Aalsma, D.K. Lapsley, and D.J. Flannery Personal fables, narcissism, and adolescent adjustment Psychology in the Schools 43 2006 481 491 10.1002/pits.20162 (Pubitemid 43600878)
-
(2006)
Psychology in the Schools
, vol.43
, Issue.4
, pp. 481-491
-
-
Aalsma, M.C.1
Lapsley, D.K.2
Flannery, D.J.3
-
3
-
-
0035999319
-
Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior
-
I. Ajzen Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior Journal of Applied Social Psychology 32 2002 665 683
-
(2002)
Journal of Applied Social Psychology
, vol.32
, pp. 665-683
-
-
Ajzen, I.1
-
4
-
-
33646888013
-
The NPI-16 as a short measure of narcissism
-
DOI 10.1016/j.jrp.2005.03.002, PII S0092656605000504
-
D.R. Ames, P. Rose, and C.P. Anderson The NPI-16 as a short measure of narcissism Journal of Research in Personality 40 2006 440 450 10.1016/j.jrp.2005.03.002 (Pubitemid 43779138)
-
(2006)
Journal of Research in Personality
, vol.40
, Issue.4
, pp. 440-450
-
-
Ames, D.R.1
Rose, P.2
Anderson, C.P.3
-
5
-
-
0035753278
-
Efficacy of the theory of planned behaviour: A meta-analytic review
-
DOI 10.1348/014466601164939
-
C.J. Armitage, and M. Conner Efficacy of the theory of planned behaviour: A meta-analytic review The British Journal of Social Psychology 40 2001 471 499 (Pubitemid 33597358)
-
(2001)
British Journal of Social Psychology
, vol.40
, Issue.4
, pp. 471-499
-
-
Armitage, C.J.1
Conner, M.2
-
6
-
-
2642549662
-
Computer security and risky computing practices: A rational choice perspective
-
K. Aytes, and T. Connolly Computer security and risky computing practices: A rational choice perspective Journal of Organizational and End User Computing 16 2004 22 40
-
(2004)
Journal of Organizational and End User Computing
, vol.16
, pp. 22-40
-
-
Aytes, K.1
Connolly, T.2
-
7
-
-
0017472917
-
Self-efficacy: Toward a unifying theory of behavioral change
-
A. Bandura Self-efficacy: Toward a unifying theory of behavioral change Psychological Review 84 1977 191 215
-
(1977)
Psychological Review
, vol.84
, pp. 191-215
-
-
Bandura, A.1
-
8
-
-
0002520483
-
Modeling it ethics: A study in situational ethics
-
D. Banerjee, T.P. Cronan, and T.W. Jones Modeling it ethics: A study in situational ethics MIS Quarterly 22 1998 31 60
-
(1998)
MIS Quarterly
, vol.22
, pp. 31-60
-
-
Banerjee, D.1
Cronan, T.P.2
Jones, T.W.3
-
9
-
-
0347973105
-
Conventional wisdom on measurement: A structural equation perspective
-
K. Bollen, and R. Lennox Conventional wisdom on measurement: A structural equation perspective Psychological Bulletin 110 1991 305 314
-
(1991)
Psychological Bulletin
, vol.110
, pp. 305-314
-
-
Bollen, K.1
Lennox, R.2
-
10
-
-
0031501312
-
Narcissism, identity, and legitimacy
-
A.D. Brown Narcissism, identity, and legitimacy Academy of Management Review 22 1997 643 686
-
(1997)
Academy of Management Review
, vol.22
, pp. 643-686
-
-
Brown, A.D.1
-
11
-
-
26444606854
-
Ethical decision making in the public accounting profession: An extension of Ajzen's theory of planned behavior
-
DOI 10.1007/s10551-005-0277-2
-
H.F. Buchan Ethical decision making in the public accounting profession: An extension of Ajzen's theory of planned behavior Journal of Business Ethics 61 2005 165 181 10.1007/s10551-005-0277-2 (Pubitemid 41433516)
-
(2005)
Journal of Business Ethics
, vol.61
, Issue.2
, pp. 165-181
-
-
Buchan, H.F.1
-
12
-
-
33750922314
-
Ethics in information technology and software use
-
V.J. Calluzzo, and C.J. Cante Ethics in information technology and software use Journal of Business Ethics 51 2004 301 312
-
(2004)
Journal of Business Ethics
, vol.51
, pp. 301-312
-
-
Calluzzo, V.J.1
Cante, C.J.2
-
13
-
-
10044295171
-
Narcissism, confidence, and risk attitude
-
DOI 10.1002/bdm.475
-
W.K. Campbell, A.S. Goodie, and J.D. Foster Narcissism, confidence, and risk attitude Journal of Behavioral Decision Making 17 2004 297 311 10.1002/bdm.475 (Pubitemid 39604572)
-
(2004)
Journal of Behavioral Decision Making
, vol.17
, Issue.4
, pp. 297-311
-
-
Campbell, W.K.1
Goodie, A.S.2
Foster, J.D.3
-
14
-
-
38049065466
-
It's all about me: Narcissistic chief executive officers and their effects on company strategy and performance
-
A. Chatterjee, and D.C. Hambrick It's all about me: Narcissistic chief executive officers and their effects on company strategy and performance Administrative Science Quarterly 52 2007 351 386
-
(2007)
Administrative Science Quarterly
, vol.52
, pp. 351-386
-
-
Chatterjee, A.1
Hambrick, D.C.2
-
15
-
-
0002042337
-
Issues and opinion on structural equation modeling
-
W.W. Chin Issues and opinion on structural equation modeling MIS Quarterly 1 1998 vii xvi
-
(1998)
MIS Quarterly
, vol.1
-
-
Chin, W.W.1
-
16
-
-
16244391780
-
An empirical validation of perceived importance and behavior intention in IT ethics
-
DOI 10.1007/s10551-004-2727-7
-
T.P. Cronan, L.N.K. Leonard, and J. Kreie An empirical validation of perceived importance and behavior intention in it ethics Journal of Business Ethics 56 2005 231 238 (Pubitemid 40465274)
-
(2005)
Journal of Business Ethics
, vol.56
, Issue.3
, pp. 231-238
-
-
Cronan, T.P.1
Leonard, L.N.K.2
Kreie, J.3
-
18
-
-
49049114397
-
The centrality of awareness in the formation of user behavioral intention toward protective information technologies
-
T. Dinev, and Q. Hu The centrality of awareness in the formation of user behavioral intention toward protective information technologies Journal of the Association for Information Systems 8 2007 386 408
-
(2007)
Journal of the Association for Information Systems
, vol.8
, pp. 386-408
-
-
Dinev, T.1
Hu, Q.2
-
19
-
-
54049117123
-
Organizational narcissism
-
10.1016/j.orgdyn.2008.07.004
-
D. Duchon, and M. Burns Organizational narcissism Organizational Dynamics 37 2008 354 364 10.1016/j.orgdyn.2008.07.004
-
(2008)
Organizational Dynamics
, vol.37
, pp. 354-364
-
-
Duchon, D.1
Burns, M.2
-
22
-
-
69849097162
-
Why do narcissists take more risks? Testing the roles of perceived risks and benefits of risky behaviors
-
10.1016/j.paid.2009.07.008
-
J.D. Foster, J.W. Shenesey, and J.S. Goff Why do narcissists take more risks? Testing the roles of perceived risks and benefits of risky behaviors Personality and Individual Differences 47 2009 885 889 10.1016/j.paid.2009.07. 008
-
(2009)
Personality and Individual Differences
, vol.47
, pp. 885-889
-
-
Foster, J.D.1
Shenesey, J.W.2
Goff, J.S.3
-
24
-
-
0031498112
-
Truth or consequences: A study of critical issues and decision making in accounting
-
A.M. Gibson, and A.H. Frakes Truth or consequences: A study of critical issues and decision making in accounting Journal of Business Ethics 16 1997 161 171 (Pubitemid 127173108)
-
(1997)
Journal of Business Ethics
, vol.16
, Issue.2
, pp. 161-171
-
-
Gibson, A.M.1
Frakes, A.H.2
-
25
-
-
51349120627
-
Probing the link between narcissism and gambling: The mediating role of judgment and decision-making biases
-
10.1002/bdm.582
-
C.E. Lakey, P. Rose, W.K. Campbell, and A.S. Goodie Probing the link between narcissism and gambling: the mediating role of judgment and decision-making biases Journal of Behavioral Decision Making 21 2008 113 137 10.1002/bdm.582
-
(2008)
Journal of Behavioral Decision Making
, vol.21
, pp. 113-137
-
-
Lakey, C.E.1
Rose, P.2
Campbell, W.K.3
Goodie, A.S.4
-
26
-
-
27544432825
-
Why employees do non-work-related computing: An exploratory investigation through multiple theoretical perspectives
-
Computer Society Press
-
O.D. Lee, K.H. Lim, and W.M. Wong Why employees do non-work-related computing: an exploratory investigation through multiple theoretical perspectives Proceedings of the 38th Hawaii international conference on system Sciences Vol. 7 2005 Computer Society Press 1 9
-
(2005)
Proceedings of the 38th Hawaii International Conference on System Sciences
, vol.7 VOL.
, pp. 1-9
-
-
Lee, O.D.1
Lim, K.H.2
Wong, W.M.3
-
28
-
-
28644441165
-
Attitude toward ethical behavior in computer use: A shifting model
-
DOI 10.1108/02635570510633239
-
L. Leonard, and T. Cronan Attitude toward ethical behavior in computer use: A shifting model Industrial Management & Data Systems 105 2005 1150 1171 10.1108/02635570510633239 (Pubitemid 41751761)
-
(2005)
Industrial Management and Data Systems
, vol.105
, Issue.9
, pp. 1150-1171
-
-
Leonard, L.N.K.1
Cronan, T.P.2
-
29
-
-
0036479255
-
The long-term organizational impact of destructively narcissistic managers
-
R. Lubit The long-term organizational impact of destructively narcissistic managers Academy of Management Executive 16 2002 127 138
-
(2002)
Academy of Management Executive
, vol.16
, pp. 127-138
-
-
Lubit, R.1
-
30
-
-
0035623459
-
Unraveling the paradoxes of narcissism: A dynamic self-regulatory processing model
-
C.C. Morf, and F. Rhodewalt Unraveling the paradoxes of narcissism: A dynamic self-regulatory processing model Psychological Inquiry 12 2001 177 196
-
(2001)
Psychological Inquiry
, vol.12
, pp. 177-196
-
-
Morf, C.C.1
Rhodewalt, F.2
-
31
-
-
0001354917
-
Ethical decision making in the medical profession: An application of the theory of planned behavior
-
D.M. Randall, and A.M. Gibson Ethical decision making in the medical profession: An application of the theory of planned behavior Journal of Business Ethics 10 1991 111 122
-
(1991)
Journal of Business Ethics
, vol.10
, pp. 111-122
-
-
Randall, D.M.1
Gibson, A.M.2
-
32
-
-
0024004572
-
A principal-components analysis of the narcissistic personality inventory and further evidence of its construct validity
-
R. Raskin, and H. Terry A principal-components analysis of the narcissistic personality inventory and further evidence of its construct validity Journal of Personality and Social Psychology 54 1988 890 902
-
(1988)
Journal of Personality and Social Psychology
, vol.54
, pp. 890-902
-
-
Raskin, R.1
Terry, H.2
-
33
-
-
0009112512
-
Sex, locus of control, and job involvement: A six-country investigation
-
H.J. Reitz, and L.N. Jewell Sex, locus of control, and job involvement: A six-country investigation Academy of Management Journal 22 1979 72 80
-
(1979)
Academy of Management Journal
, vol.22
, pp. 72-80
-
-
Reitz, H.J.1
Jewell, L.N.2
-
34
-
-
71949094501
-
Self-efficacy in information security: Its influence on end users' information security practice behavior
-
10.1016/j.cose.2009.05.008
-
H. -S. Rhee, C. Kim, and Y.U. Ryu Self-efficacy in information security: Its influence on end users' information security practice behavior Computers & Security 28 2009 816 826 10.1016/j.cose.2009.05.008
-
(2009)
Computers & Security
, vol.28
, pp. 816-826
-
-
Rhee, H.-S.1
Kim, C.2
Ryu, Y.U.3
-
35
-
-
0023304222
-
Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat
-
P.A. Rippetoe, and R.W. Rogers Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat Journal of Personality and Social Psychology 52 1987 596 604
-
(1987)
Journal of Personality and Social Psychology
, vol.52
, pp. 596-604
-
-
Rippetoe, P.A.1
Rogers, R.W.2
-
37
-
-
0000747474
-
Internal versus external control of reinforcement: A case history of a variable
-
J.B. Rotter Internal versus external control of reinforcement: A case history of a variable American Psychologist 45 1990 489 493
-
(1990)
American Psychologist
, vol.45
, pp. 489-493
-
-
Rotter, J.B.1
-
38
-
-
1242263792
-
Security training and awareness - Fitting a square peg in a round hole
-
E. Schultz Security training and awareness - fitting a square peg in a round hole Computers & Security 23 2004 1 2
-
(2004)
Computers & Security
, vol.23
, pp. 1-2
-
-
Schultz, E.1
-
39
-
-
71149100808
-
Are employees putting your company at risk by not following information security policies?
-
10.1145/1610252.1610289
-
M. Siponen, M.A. Mahmood, and S. Pahnila Are employees putting your company at risk by not following information security policies? Communications of the ACM 52 2009 145 147 10.1145/1610252.1610289
-
(2009)
Communications of the ACM
, vol.52
, pp. 145-147
-
-
Siponen, M.1
Mahmood, M.A.2
Pahnila, S.3
-
40
-
-
84995542671
-
An introduction to insider threat management
-
S. Steele, and C. Wargo An introduction to insider threat management Information Systems Security 16 2007 23 34
-
(2007)
Information Systems Security
, vol.16
, pp. 23-34
-
-
Steele, S.1
Wargo, C.2
-
42
-
-
33646779531
-
Impulsivity and the self-defeating behavior of narcissists
-
DOI 10.1207/s15327957pspr1002-4
-
S. Vazire, and D.C. Funder Impulsivity and the self-defeating behavior of narcissists Personality & Social Psychology Review (Lawrence Erlbaum Associates) 10 2006 154 165 (Pubitemid 43764488)
-
(2006)
Personality and Social Psychology Review
, vol.10
, Issue.2
, pp. 154-165
-
-
Vazire, S.1
Funder, D.C.2
-
43
-
-
0041524980
-
Information Security Governance
-
DOI 10.1016/S1363-4127(01)00309-0
-
P. Williams Information security governance Information Security Technical Report 6 2001 60 70 10.1016/S1363-4127(01)00309-0 (Pubitemid 33663935)
-
(2001)
Information Security Technical Report
, vol.6
, Issue.3
, pp. 60-70
-
-
Williams, P.1
-
44
-
-
57649095360
-
In a 'trusting' environment, everyone is responsible for information security
-
10.1016/j.istr.2008.10.009
-
P. Williams In a 'trusting' environment, everyone is responsible for information security Information Security Technical Report 13 2008 207 215 10.1016/j.istr.2008.10.009
-
(2008)
Information Security Technical Report
, vol.13
, pp. 207-215
-
-
Williams, P.1
-
45
-
-
84995871700
-
Gaining access with social engineering: An empirical study of the threat
-
10.1080/1065890701788165
-
M. Workman Gaining access with social engineering: An empirical study of the threat Information Systems Security 16 2007 315 331 10.1080/1065890701788165
-
(2007)
Information Systems Security
, vol.16
, pp. 315-331
-
-
Workman, M.1
-
46
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
10.1016/j.chb.2008.04.005
-
M. Workman, W.H. Bommer, and D. Straub Security lapses and the omission of information security measures: A threat control model and empirical test Computers in Human Behavior 24 2008 2799 2816 10.1016/j.chb.2008.04.005
-
(2008)
Computers in Human Behavior
, vol.24
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.H.2
Straub, D.3
|