-
1
-
-
18044366933
-
Codes of ethics as signals for ethical behavior
-
Adams, J.S., Tashchian, A., Shore, T.H. Codes of ethics as signals for ethical behavior Journal of Business Ethics 29 3 2001 199-211
-
(2001)
Journal of Business Ethics
, vol.29
, Issue.3
, pp. 199-211
-
-
Adams, J.S.1
Tashchian, A.2
Shore, T.H.3
-
2
-
-
67649708310
-
The information security digital divide between information security managers and users
-
Albrechtsen, E., Hovden, J. The information security digital divide between information security managers and users Computers & Security 28 6 2009 476-90
-
(2009)
Computers & Security
, vol.28
, Issue.6
, pp. 476-490
-
-
Albrechtsen, E.1
Hovden, J.2
-
3
-
-
0037314121
-
Risk in rural development: Challenges for managers and policy makers
-
Anderson, J.R. Risk in rural development: challenges for managers and policy makers Agricultural Systems 75 2/3 2003 161-97
-
(2003)
Agricultural Systems
, vol.75
, Issue.2-3
, pp. 161-197
-
-
Anderson, J.R.1
-
4
-
-
12244306739
-
An information security meta-policy for emergent organisations
-
Baskerville, R., Siponen, M. An information security meta-policy for emergent organisations Logistics Information Management 15 5/6 2002 337-46
-
(2002)
Logistics Information Management
, vol.15
, Issue.5-6
, pp. 337-346
-
-
Baskerville, R.1
Siponen, M.2
-
5
-
-
0024436761
-
Asthma information: Can it be understood
-
Bauman, A.E., Smith, N.A., Braithwaite, A., Free, A., Saunders, A. Asthma information: can it be understood Health Education Research 4 3 1989 377-82
-
(1989)
Health Education Research
, vol.4
, Issue.3
, pp. 377-382
-
-
Bauman, A.E.1
Smith, N.A.2
Braithwaite, A.3
Free, A.4
Saunders, A.5
-
7
-
-
84867022900
-
-
paper presented at New Security Paradigms Workshop (NSPW), Lake Tahoe, CA
-
Beautement, A., Sasse, M.A., Wonham, M. The compliance budget: managing security behaviour in organisations 2008 47-58 paper presented at New Security Paradigms Workshop (NSPW), Lake Tahoe, CA
-
(2008)
The Compliance Budget: Managing Security Behaviour in Organisations
, pp. 47-58
-
-
Beautement, A.1
Sasse, M.A.2
Wonham, M.3
-
9
-
-
2342598277
-
Computer security impaired by legitimate users
-
Besnard, D., Arief, B. Computer security impaired by legitimate users Computers & Security 23 3 2004 253-64
-
(2004)
Computers & Security
, vol.23
, Issue.3
, pp. 253-264
-
-
Besnard, D.1
Arief, B.2
-
11
-
-
33847010583
-
Breaching the security of the kaiser permanente internet patient portal: The organizational foundations of information security
-
Collman, J., Cooper, T. Breaching the security of the kaiser permanente internet patient portal: the organizational foundations of information security Journal of the American Medical Informatics Association 14 2 2007 239-43
-
(2007)
Journal of the American Medical Informatics Association
, vol.14
, Issue.2
, pp. 239-243
-
-
Collman, J.1
Cooper, T.2
-
13
-
-
33847280457
-
The roles of policy and professionalism in the protection of processed clinical data: A literature review
-
de Lusignan, S., Chan, T., Dhoul, N. The roles of policy and professionalism in the protection of processed clinical data: a literature review International Journal of Medical Informatics 76 4 2007 261-8
-
(2007)
International Journal of Medical Informatics
, vol.76
, Issue.4
, pp. 261-268
-
-
De Lusignan, S.1
Chan, T.2
Dhoul, N.3
-
14
-
-
0035063716
-
Violation of safeguards by trusted personnel and understanding related information security concerns
-
Dhillon, G. Violation of safeguards by trusted personnel and understanding related information security concerns Computers & Security 20 2 2001 165-72
-
(2001)
Computers & Security
, vol.20
, Issue.2
, pp. 165-172
-
-
Dhillon, G.1
-
15
-
-
70449596008
-
The information security policy unpacked: A critical study of the content of university policies
-
Doherty, N.F., Anastasakis, L., Fulford, H. The information security policy unpacked: a critical study of the content of university policies International Journal of Information Management 29 6 2009 449-57
-
(2009)
International Journal of Information Management
, vol.29
, Issue.6
, pp. 449-457
-
-
Doherty, N.F.1
Anastasakis, L.2
Fulford, H.3
-
19
-
-
23344437282
-
Why organizations continue to create patient information leaflets with readability and usability problems: An exploratory study
-
Gal, I., Prigat, A. Why organizations continue to create patient information leaflets with readability and usability problems: an exploratory study Health Education Research 20 4 2004 485-93
-
(2004)
Health Education Research
, vol.20
, Issue.4
, pp. 485-493
-
-
Gal, I.1
Prigat, A.2
-
20
-
-
84866994036
-
-
paper presented at 1st Australian Security Management Workshop, Deakin University, Geelang
-
Gaskell, G. Simplifying the onerous task of writing security policies 2000 paper presented at 1st Australian Security Management Workshop, Deakin University, Geelang
-
(2000)
Simplifying the Onerous Task of Writing Security Policies
-
-
Gaskell, G.1
-
22
-
-
33646507814
-
The role of learning and risk perception in compliance
-
Gonzalez, J.J. Norwegian Academic Press Kristiansand Forskningsserien
-
Gonzalez, J.J., Sawicka, A. Gonzalez, J.J. The role of learning and risk perception in compliance From Modeling to Managing Security: A System Dynamics Approach 35 Norwegian Academic Press Kristiansand 2003 Forskningsserien
-
(2003)
From Modeling to Managing Security: A System Dynamics Approach
, vol.35
-
-
Gonzalez, J.J.1
Sawicka, A.2
-
24
-
-
82955187759
-
Value conflicts for information security management
-
Hedström, K., Kolkowska, E., Allen, J.P. Value conflicts for information security management Journal of Strategic Information Systems 20 4 2011 373-84
-
(2011)
Journal of Strategic Information Systems
, vol.20
, Issue.4
, pp. 373-384
-
-
Hedström, K.1
Kolkowska, E.2
Allen, J.P.3
-
25
-
-
67349144062
-
Encouraging information security behaviors: Role of penalties, pressures and perceived effectiveness
-
Herath, T., Rao, H.R. Encouraging information security behaviors: role of penalties, pressures and perceived effectiveness Decision Support Systems 47 2 2009 154-65
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 154-165
-
-
Herath, T.1
Rao, H.R.2
-
27
-
-
0036613095
-
What makes an effective information security policy?
-
Hone, K., Eloff, J. What makes an effective information security policy? Network Security 6 1 2002 14-16
-
(2002)
Network Security
, vol.6
, Issue.1
, pp. 14-16
-
-
Hone, K.1
Eloff, J.2
-
29
-
-
84867030324
-
-
Identity Theft Resource Centre San Diego, CA 26 March
-
Identity Theft Resource Centre Breaches 2008 Identity Theft Resource Centre San Diego, CA 2009 26 March, available at: www.idtheftcenter.org/artman2/ publish/lib-survey/Breaches-2008.shtml
-
(2009)
Breaches 2008
-
-
-
30
-
-
18844431067
-
Information systems security policies: A contextual perspective
-
Karyda, M., Kiountouzis, E., Kokolakis, S. Information systems security policies: a contextual perspective Computers & Security 24 3 2005 246-60
-
(2005)
Computers & Security
, vol.24
, Issue.3
, pp. 246-260
-
-
Karyda, M.1
Kiountouzis, E.2
Kokolakis, S.3
-
31
-
-
3242778734
-
Attitudes of doctors and nurses towards incident reporting: A qualitative analysis
-
Kingston, M.J., Evans, A.M., Smith, B.J., Berry, J.G. Attitudes of doctors and nurses towards incident reporting: a qualitative analysis The Medical Journal of Australia 181 1 2004 36-9
-
(2004)
The Medical Journal of Australia
, vol.181
, Issue.1
, pp. 36-39
-
-
Kingston, M.J.1
Evans, A.M.2
Smith, B.J.3
Berry, J.G.4
-
32
-
-
33644533141
-
Information security: Management's effect on culture and policy
-
Knapp, K.J., Marshall, T.E., Rainer, E.K., Ford, F.N. Information security: management's effect on culture and policy Information Management & Computer Security 14 1 2006 24-36
-
(2006)
Information Management & Computer Security
, vol.14
, Issue.1
, pp. 24-36
-
-
Knapp, K.J.1
Marshall, T.E.2
Rainer, E.K.3
Ford, F.N.4
-
33
-
-
79952552339
-
Intrinsic and extrinsic motivation
-
Peterson, P., Baker, E., McGaw, B. Elsevier Amsterdam
-
Levesque, C., Copeland, K.J., Pattie, M.D., Deci, E.L. Peterson, P., Baker, E., McGaw, B. Intrinsic and extrinsic motivation International Encyclopedia of Education 6 Elsevier Amsterdam 2010 618-23
-
(2010)
International Encyclopedia of Education
, vol.6
, pp. 618-623
-
-
Levesque, C.1
Copeland, K.J.2
Pattie, M.D.3
Deci, E.L.4
-
34
-
-
84925924591
-
Rewards and punishments as selective incentives for collective action: Theoretical investigations
-
Oliver, P. Rewards and punishments as selective incentives for collective action: theoretical investigations American Journal of Sociology 85 6 1980 1356-75
-
(1980)
American Journal of Sociology
, vol.85
, Issue.6
, pp. 1356-1375
-
-
Oliver, P.1
-
35
-
-
0034316956
-
Cognitive models in training health professionals to protect patients' confidential information
-
Patel, V.L., Arocha, J.F., Shortcliffe, E.H. Cognitive models in training health professionals to protect patients' confidential information International Journal of Medical Informatics 60 2 2000 143-50
-
(2000)
International Journal of Medical Informatics
, vol.60
, Issue.2
, pp. 143-150
-
-
Patel, V.L.1
Arocha, J.F.2
Shortcliffe, E.H.3
-
36
-
-
84867030325
-
-
Plymouth Herald 7 February
-
Plymouth Herald Man's Outrage as Jobcentre Gives Personal Details to Another Claimant Plymouth Herald 2012 7 February, available at: www.thisisplymouth.co.uk/Man-s-outrage-Jobcentre-gives-personal-details/ story-15155581-detail/story.html
-
(2012)
Man's Outrage As Jobcentre Gives Personal Details to Another Claimant
-
-
-
37
-
-
34248334263
-
Evaluating information security tradeoffs: Restricting access can interfere with user tasks
-
Post, G.-V., Kagan, A. Evaluating information security tradeoffs: restricting access can interfere with user tasks Computers & Security 26 3 2007 229-37
-
(2007)
Computers & Security
, vol.26
, Issue.3
, pp. 229-237
-
-
Post, G.-V.1
Kagan, A.2
-
39
-
-
84866972714
-
Hospital foundation: A SWOT analysis
-
Rego, G., Nunes, R. Hospital foundation: a SWOT analysis iBusiness 2 2010 210-17
-
(2010)
IBusiness
, vol.2
, pp. 210-217
-
-
Rego, G.1
Nunes, R.2
-
40
-
-
0037652052
-
Organisational justice, trust and the management of change: An exploration
-
Saunders, M.N.K., Thornhill, A. Organisational justice, trust and the management of change: an exploration Personnel Review 32 3 2003 360-75
-
(2003)
Personnel Review
, vol.32
, Issue.3
, pp. 360-375
-
-
Saunders, M.N.K.1
Thornhill, A.2
-
42
-
-
79952504145
-
The role of the corporate information security steering committee
-
Scholtz, T. The role of the corporate information security steering committee SC Magazine 2003 available at: www.scmagazineus.com/the-role-of-the- corporate-information-security-steering-committee/article/30595/
-
(2003)
SC Magazine
-
-
Scholtz, T.1
-
43
-
-
0002212518
-
The science of learning and the art of teaching
-
Skinner, B.F. The science of learning and the art of teaching Harvard Educational Review 24 2 1954 86-97
-
(1954)
Harvard Educational Review
, vol.24
, Issue.2
, pp. 86-97
-
-
Skinner, B.F.1
-
44
-
-
0025420772
-
Computer integrated manufacturing and the society
-
Sohlenius, G. Computer integrated manufacturing and the society Computers in Industry 14 1-3 1990 213-24
-
(1990)
Computers in Industry
, vol.14
, Issue.13
, pp. 213-224
-
-
Sohlenius, G.1
-
45
-
-
84866983627
-
Missing: Laptop with 8.6 million medical records
-
15 June (accessed 23 November)
-
Sullivan, M. Missing: Laptop with 8.6 million medical records The Sun 2011 15 June, available at: www.thesun.co.uk/sol/homepage/news/3637704/Missing- Laptop-with-86million-medical-records.html (accessed 23 November)
-
(2011)
The Sun
-
-
Sullivan, M.1
-
46
-
-
15744368808
-
Information security obedience: A definition
-
Thomson, K.-L., von Solms, R. Information security obedience: a definition Computers & Security 24 1 2005 69-75
-
(2005)
Computers & Security
, vol.24
, Issue.1
, pp. 69-75
-
-
Thomson, K.-L.1
Von Solms, R.2
-
47
-
-
84993102389
-
Critical upward feedback in organisations: Processes, problems and implications for communication management
-
Tourish, D., Robson, P. Critical upward feedback in organisations: processes, problems and implications for communication management Journal of Communication Management 8 2 2004 150-67
-
(2004)
Journal of Communication Management
, vol.8
, Issue.2
, pp. 150-167
-
-
Tourish, D.1
Robson, P.2
-
48
-
-
34547810494
-
Danger is in the eye of the beholders: Social representations in information systems security in healthcare
-
Vaast, E. Danger is in the eye of the beholders: social representations in information systems security in healthcare Journal of Strategic Information Systems 16 2 2007 130-52
-
(2007)
Journal of Strategic Information Systems
, vol.16
, Issue.2
, pp. 130-152
-
-
Vaast, E.1
-
49
-
-
77954000731
-
Using reinforcement to strengthen users' secure behaviors
-
Villamarín-Salomón, R.M., Brustoloni, J.C. Using reinforcement to strengthen users' secure behaviors Proceedings of the 28th International Conference on Human Factors in Computing Systems (CHI '10), ACM, New York, NY 2010 363-72
-
(2010)
Proceedings of the 28th International Conference on Human Factors in Computing Systems (CHI '10), ACM, New York, NY
, pp. 363-372
-
-
Villamarín-Salomón, R.M.1
Brustoloni, J.C.2
-
51
-
-
2342475711
-
Towards information security behavioural compliance
-
Vroom, C., von Solms, R. Towards information security behavioural compliance Computers & Security 23 3 2004 191-8
-
(2004)
Computers & Security
, vol.23
, Issue.3
, pp. 191-198
-
-
Vroom, C.1
Von Solms, R.2
-
52
-
-
18844458431
-
An unappreciated reason why information security policies fail
-
Wood, C. An unappreciated reason why information security policies fail Computer Fraud & Security 10 2000 13-14
-
(2000)
Computer Fraud & Security
, vol.10
, pp. 13-14
-
-
Wood, C.1
|