-
3
-
-
0035063716
-
Violation of safeguards by trusted personnel and understanding related information security concerns
-
Dhillon, G. (2001). Violation of safeguards by trusted personnel and understanding related information security concerns. Computers & Security, 20:165-172.
-
(2001)
Computers & Security
, vol.20
, pp. 165-172
-
-
Dhillon, G.1
-
4
-
-
39749131907
-
Identifying governance dimensions to evaluate information systems security in organizations
-
Dhillon, G., Tejay, G., and Hong, W. (2007). Identifying governance dimensions to evaluate information systems security in organizations. Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS'07), comuter security,IEEE.
-
(2007)
Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS'07), comuter security, IEEE
-
-
Dhillon, G.1
Tejay, G.2
Hong, W.3
-
5
-
-
33744830087
-
Valuefocused assessment of information system security in organizations
-
Dhillon, G. and Torkzadeh (2006). Valuefocused assessment of information system security in organizations. Information Systems Journal, 16:293-314.
-
(2006)
Information Systems Journal
, vol.16
, pp. 293-314
-
-
Torkzadeh, D.G.1
-
6
-
-
0003551671
-
-
Addison-Wesley, Reading, MA
-
Fishbein, M. and Ajzen, I. (1975). Belief, attitude, intention and behavior: an introduction to theory and research. Addison-Wesley, Reading, MA.
-
(1975)
Belief, attitude, intention and behavior: an introduction to theory and research
-
-
Fishbein, M.1
Ajzen, I.2
-
7
-
-
0000418866
-
The utility analysis of choices involving risk
-
Friedman, M. and Savage, L. (1948). The utility analysis of choices involving risk. Journal of Political Economy, 56:279-304.
-
(1948)
Journal of Political Economy
, vol.56
, pp. 279-304
-
-
Friedman, M.1
Savage, L.2
-
9
-
-
0030262974
-
An information model based on classication theory
-
Parsons, J. (1996). An information model based on classication theory. Management Science, 42(10):1437-1453.
-
(1996)
Management Science
, vol.42
, Issue.10
, pp. 1437-1453
-
-
Parsons, J.1
-
11
-
-
33846849570
-
Organisational security culture: Extending the enduser perspective
-
Ruighaver, A., Maynard, S., and Chang, S. (2007). Organisational security culture: Extending the enduser perspective. Computers & Security, 26(1):56-62.
-
(2007)
Computers & Security
, vol.26
, Issue.1
, pp. 56-62
-
-
Ruighaver, A.1
Maynard, S.2
Chang, S.3
-
12
-
-
78650874414
-
Information security culture the sociocultural dimension in information security management
-
Cairo, Egypt; 7-9 May 2002
-
Schlienger, T. and Teufel, S. (2002.). Information security culture the sociocultural dimension in information security management. FIP TC11 international conference on information security, Cairo, Egypt; 7-9 May 2002.
-
(2002)
FIP TC11 international conference on information security
-
-
Schlienger, T.1
Teufel, S.2
-
13
-
-
84942754786
-
Analyzing information security culture: increased trust by an appropriate information security culture
-
Proceedings. 14th International Workshop on
-
Schlienger, T. and Teufel, S. (2003). Analyzing information security culture: increased trust by an appropriate information security culture. Database and Expert Systems Applications, 2003. Proceedings. 14th International Workshop on, pages 405-409.
-
(2003)
Database and Expert Systems Applications, 2003
, pp. 405-409
-
-
Schlienger, T.1
Teufel, S.2
-
14
-
-
8744290801
-
Critical analysis of different approaches to minimizing userrelated faults in information systems security: implications for research and practice
-
Siponen, M. (2000). Critical analysis of different approaches to minimizing userrelated faults in information systems security: implications for research and practice. Information Management & Computer Security, 8(5):197-209.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.5
, pp. 197-209
-
-
Siponen, M.1
-
15
-
-
85019433170
-
A review of information security issues and respective research contributions
-
Siponen, M. and Oinas-Kukkonen, H. (2007). A review of information security issues and respective research contributions. SIGMIS Database, 38(1):60-80.
-
(2007)
SIGMIS Database
, vol.38
, Issue.1
, pp. 60-80
-
-
Siponen, M.1
Oinas-Kukkonen, H.2
-
16
-
-
0003806186
-
-
Harvard University Press, Cambridge, MA
-
Smith, E. and Medin, D. (1981). Categoriesa nd Concepts. Harvard University Press, Cambridge, MA. Stanton, M., Stam, R., Mastrangelo, P., and Jolton,.
-
(1981)
Categoriesa nd Concepts
-
-
Smith, E.1
Medin, D.2
-
17
-
-
17844366573
-
Analysis of end user security behaviors
-
Stanton, M., Stam, R., Mastrangelo, P., and Jolton, J. (2005). Analysis of end user security behaviors. Journal of Computers and Security, 24:124-133.
-
(2005)
Journal of Computers and Security
, vol.24
, pp. 124-133
-
-
Stanton, M.1
Stam, R.2
Mastrangelo, P.3
Jolton, J.4
-
18
-
-
84871193075
-
Trust, trustworthiness, and the behavioral foundations of corporate law
-
Stout, L., Blair, and Margaret, M. (2001). Trust, trustworthiness, and the behavioral foundations of corporate law. SSRN eLibrary.
-
(2001)
SSRN eLibrary
-
-
Stout, L.1
Margaret, M.B.2
-
19
-
-
0141463342
-
Deterring cheating by student programmers: A eld experiment in computer security
-
Straub, D. W., Carlson, P. J., and Jones, E. H. (1993). Deterring cheating by student programmers: A eld experiment in computer security. Journal of Management Systems, 5:33-48.
-
(1993)
Journal of Management Systems
, vol.5
, pp. 33-48
-
-
Straub, D.W.1
Carlson, P.J.2
Jones, E.H.3
-
20
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations: A eld study
-
Straub, D. W. and Nance, W. D. (1990). Discovering and disciplining computer abuse in organizations: A eld study. MIS Quarterly, 14:45-62.
-
(1990)
MIS Quarterly
, vol.14
, pp. 45-62
-
-
Straub, D.W.1
Nance, W.D.2
-
21
-
-
34547155502
-
Armed, and dangerous (?): Motivating rule adherence among agents of social control
-
Tyler, T., Patrick, C., and Jeffrey, F. (2007). Armed, and dangerous (?): Motivating rule adherence among agents of social control. Law & Society Review.
-
(2007)
Law & Society Review
-
-
Tyler, T.1
Patrick, C.2
Jeffrey, F.3
-
22
-
-
3042812983
-
The 10 deadly sins of information security management. Computers and security
-
von Solms, B. and von Solms, R. (2004). The 10 deadly sins of information security management. computers and security. Computers and Security, 23:371-376.
-
(2004)
Computers and Security
, vol.23
, pp. 371-376
-
-
Solms, B.V.1
Solms, R.V.2
-
23
-
-
2342475711
-
Towards information security behavioral compliance
-
Vroom, C. and von Solms, R. (2004). Towards information security behavioral compliance. Computers & Security, 23(3):191-198.
-
(2004)
Computers & Security
, vol.23
, Issue.3
, pp. 191-198
-
-
Vroom, C.1
Solms, R.V.2
-
24
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
Workman, M., Bommer, W. H., and Straub, D. (2008). Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior, 24:2799-2816.
-
(2008)
Computers in Human Behavior
, vol.24
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.H.2
Straub, D.3
-
25
-
-
84871256586
-
Understanding challenges of information security culture: a methodological issue
-
Perth, Australia; 26 November 2004
-
Zakaria (2004). Understanding challenges of information security culture: a methodological issue. In the second Australian information security management conference, Perth, Australia; 26 November 2004.
-
(2004)
The second Australian information security management conference
-
-
Zakaria1
|