-
2
-
-
44949274046
-
The theory of planned behavior
-
I. Ajzen, "The Theory of Planned Behavior", Organizational Behavior and Human Decision Processes, Vol. 50, No. 2, pp.179-211, 1991.
-
(1991)
Organizational Behavior and Human Decision Processes
, vol.50
, Issue.2
, pp. 179-211
-
-
Ajzen, I.1
-
3
-
-
84857961943
-
Security policy compliance: User acceptance perspective
-
A. Al-Omari, O. El.Gayar, A. Deokar, "Security Policy Compliance: User Acceptance Perspective", Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS), pp. 3317-3316, 2012.
-
(2012)
Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS)
, pp. 3317-3316
-
-
Al-Omari, A.1
El Gayar, O.2
Deokar, A.3
-
4
-
-
77957077814
-
Practicing Safe Computing: A multimethod empirical examination of home computer user behavioral intentions
-
2010
-
C.L. Anderson, and R. Agarwal, "Practicing Safe Computing: A multimethod empirical examination of home computer user behavioral intentions", MIS Quarterly, Vol. 34, No. 3, 2010, pp. 613-643, 2010.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 613-643
-
-
Anderson, C.L.1
Agarwal, R.2
-
7
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
B. Bulgurcu, H. Cavusoglu, I. Benbasat, "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness", MIS Quarterly, Vol. 34, pp. 523-548, 2010.
-
(2010)
MIS Quarterly
, vol.34
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
9
-
-
61349159889
-
Perceptions of information security in the workplace: Linking information security climate to compliant behavior
-
M. Chan, I. Woon A. Kankanhalli, "Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior", Journal of Information Privacy Security, Vol. 1, pp. 18-41, 2005.
-
(2005)
Journal of Information Privacy Security
, vol.1
, pp. 18-41
-
-
Chan, M.1
Woon, I.2
Kankanhalli, A.3
-
10
-
-
84936823933
-
User acceptance of computer technology: A comparison of two theoretical models
-
1989
-
Davis, F. D., Bagozzi, R. P., and Warshaw, P. R. 1989. "User Acceptance of Computer Technology: A Comparison of Two Theoretical Models," Management Science, Vol. 35, no. 8, pp. 982-1003, 1989.
-
(1989)
Management Science
, vol.35
, Issue.8
, pp. 982-1003
-
-
Davis, F.D.1
Bagozzi, R.P.2
Warshaw, P.R.3
-
11
-
-
67349280492
-
Does one size fit all? Examining the differential effects of is security countermeasures
-
J. D'Arcy, A. Hovav, "Does One Size Fit All? Examining the Differential Effects of IS Security Countermeasures", Journal of Business Ethics, Vol. 89, pp. 59-71, 2009.
-
(2009)
Journal of Business Ethics
, vol.89
, pp. 59-71
-
-
D'arcy, J.1
Hovav, A.2
-
12
-
-
67649551429
-
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
-
J. D'Arcy, A. Hovav, D. Galletta, "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach", Information Systems Research, Vol. 20, No. 1, pp. 79-98, 2009.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 79-98
-
-
D'arcy, J.1
Hovav, A.2
Galletta, D.3
-
13
-
-
0003551671
-
-
MA, Addison-Wesley
-
M. Fishbein, I. Ajzen, "Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research", MA, Addison-Wesley, 1975.
-
(1975)
Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research
-
-
Fishbein, M.1
Ajzen, I.2
-
14
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organizations
-
T. Herath, H.R. Rao, "Protection motivation and deterrence: a framework for security policy compliance in organizations", European Journal on Information Systems, Vol. 18, No. 2, pp. 106-125, 2009
-
(2009)
European Journal on Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
15
-
-
80052902327
-
Toward a new meta-theory for designing information systems (IS) security training approaches
-
M. Karjalainen, M.T. Siponen, "Toward a New Meta-Theory for Designing Information Systems (IS) Security Training Approaches", Journal of the Association for Information Systems (JAIS), Vol. 12, pp. 518-555, 2011.
-
(2011)
Journal of the Association for Information Systems (JAIS)
, vol.12
, pp. 518-555
-
-
Karjalainen, M.1
Siponen, M.T.2
-
16
-
-
1242263532
-
Why there aren't more information security research studies
-
2004
-
A.G. Kotulic, and J.G. Clark, "Why there aren't more information security research studies", Information & Management, Vol. 41, 2004, pp. 597-607, 2004.
-
(2004)
Information & Management
, vol.41
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, J.G.2
-
17
-
-
0242521674
-
Grounding a new information technology implementation framework in behavioral science: A systematic analysis of the literature on IT use
-
R. Kukafka, S.B. Johnson, A. Linfante, J.P. Allegrantec, "Grounding a new information technology implementation framework in behavioral science: a systematic analysis of the literature on IT use", Journal of Biomedical Informatics, Vol. 36, pp. 218-227, 2003.
-
(2003)
Journal of Biomedical Informatics
, vol.36
, pp. 218-227
-
-
Kukafka, R.1
Johnson, S.B.2
Linfante, A.3
Allegrantec, J.P.4
-
19
-
-
0002172779
-
A comparison of the theory of planned behavior and the theory of reasoned action
-
T.J. Madden, P.S. Scholder, I. Ajzen, "A Comparison of the Theory of Planned Behavior and the Theory of Reasoned Action", Personality and Social Psychology Bulletin, Vol. 18, pp. 3-9, 1992.
-
(1992)
Personality and Social Psychology Bulletin
, vol.18
, pp. 3-9
-
-
Madden, T.J.1
Scholder, P.S.2
Ajzen, I.3
-
21
-
-
77249087157
-
Information systems security governance research: A behavioral perspective
-
S. Mishra, G. Dhillon, "Information systems security governance research: A behavioral perspective", Proceedings of the 1st Annual Symposium on Information Assurance, Academic Track of 9th Annual NYS Cyber Security Conference, pp. 18-26, 2005.
-
(2005)
Proceedings of the 1st Annual Symposium on Information Assurance, Academic Track of 9th Annual NYS Cyber Security Conference
, pp. 18-26
-
-
Mishra, S.1
Dhillon, G.2
-
23
-
-
84970235764
-
Self-reports in organizational research: Problems and prospects
-
P.M. Podsakoff, D. Organ, "Self-reports in organizational research: Problems and prospects", Journal of Management, Vol. 12 No. 4, pp. 531-544, 1986.
-
(1986)
Journal of Management
, vol.12
, Issue.4
, pp. 531-544
-
-
Podsakoff, P.M.1
Organ, D.2
-
24
-
-
0002247369
-
Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation theory
-
Guilford, New York
-
R.W. Rogers, "Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation Theory", in Social Psychophysiology, J. Cacioppo and R. Petty (Eds.), Guilford, New York, 1983.
-
(1983)
Social Psychophysiology, J. Cacioppo and R. Petty (Eds.)
-
-
Rogers, R.W.1
-
25
-
-
40749085237
-
Toward improving the relevance of information systems research to practice: The role of applicability checks
-
M. Rosemann, I. Vessey, "Toward Improving the Relevance of Information Systems Research to Practice: The Role of Applicability Checks" MIS Quarterly, Vol. 32, No. 1, 2008.
-
(2008)
MIS Quarterly
, vol.32
, Issue.1
-
-
Rosemann, M.1
Vessey, I.2
-
26
-
-
77957070672
-
User participation in information systems security risk management
-
J.L. Spears, H. Barki, "User Participation in Information Systems Security Risk Management", MIS Quarterly, Vol. 34, No. 3, pp. 503-522, 2010
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 503-522
-
-
Spears, J.L.1
Barki, H.2
-
27
-
-
0000280419
-
Effective IS security: An empirical study
-
D.W. Straub, "Effective IS security: An empirical study", Information Systems Research, Vol. 1, No. 3, pp. 255-276, 1990.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
28
-
-
1542382496
-
User acceptance of information technology: Toward a unified view
-
V. Venkatesh, M.G. Morris, G.B. Davis, F.D. Davis, "User Acceptance of Information Technology: Toward a Unified View", MIS Quarterly, Vol. 27, No. 3, pp. 425-478, 2003.
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.G.2
Davis, G.B.3
Davis, F.D.4
-
29
-
-
8744290801
-
Critical analysis of different approaches to minimizing user-related faults in information systems security: Implications for research and practice
-
M.T. Siponen, "Critical analysis of different approaches to minimizing user-related faults in information systems security: implications for research and practice", Information Management & Computer Security, Vol. 8, pp. 197-209, 2000.
-
(2000)
Information Management & Computer Security
, vol.8
, pp. 197-209
-
-
Siponen, M.T.1
-
31
-
-
77957068563
-
Neutralization: New insights into the problem of employee systems security policy violations
-
M.T. Siponen, A. Osborn Vance, "Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations", MIS Quarterly, Vol. 34 No. 3, pp. 487-502, 2010.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 487-502
-
-
Siponen, M.T.1
Osborn Vance, A.2
-
32
-
-
34548066397
-
How low should you go? Low response rates and the validity of inference in IS questionnaire research
-
S. Sivo, S. Saunders, Q. Chang, and J.J. Jiang, "How low should you go? Low response rates and the validity of inference in IS questionnaire research", Journal of the Association for Information Systems, Vol. 7, No. 6, pp. 351-414, 2004.
-
(2004)
Journal of the Association for Information Systems
, vol.7
, Issue.6
, pp. 351-414
-
-
Sivo, S.1
Saunders, S.2
Chang, Q.3
Jiang, J.J.4
-
33
-
-
2342475711
-
Towards information security behavioral compliance
-
C. Vroom, and R. von Solms, "Towards information security behavioral compliance", Computer & Security, Vol. 23, No. 3, pp. 191-198, 2004.
-
(2004)
Computer & Security
, vol.23
, Issue.3
, pp. 191-198
-
-
Vroom, C.1
Von Solms, R.2
-
34
-
-
84870674396
-
Reconstructing the giant: On the importance of rigour in documenting the literature search process
-
J. vom Brocke, A. Simons, B. Niehaves, K. Riemer, R. Plattfaut, A. Cleven, "Reconstructing the Giant: On the Importance of Rigour in Documenting the Literature Search Process", Proceedings of the European Conference on Information Systems (ECIS), 2009.
-
(2009)
Proceedings of the European Conference on Information Systems (ECIS)
-
-
Vom Brocke, J.1
Simons, A.2
Niehaves, B.3
Riemer, K.4
Plattfaut, R.5
Cleven, A.6
-
35
-
-
0035546509
-
Forums for information systems scholars: III
-
K.A. Walstrom, B.V. Hardgrave, "Forums for Information Systems Scholars: III", Infromation & Management, Vol.39, pp. 117-124, 2001.
-
(2001)
Infromation & Management
, vol.39
, pp. 117-124
-
-
Walstrom, K.A.1
Hardgrave, B.V.2
-
36
-
-
33645110997
-
Does changing behavioral intentions engender behavior change? A meta-analysis of the experimental evidence
-
T.L. Webb, P Sheeran, "Does Changing Behavioral Intentions Engender Behavior Change? A Meta-Analysis of the Experimental Evidence", Psychological Bulletin, Vol. 132, No. 2, pp. 249-268, 2006.
-
(2006)
Psychological Bulletin
, vol.132
, Issue.2
, pp. 249-268
-
-
Webb, T.L.1
Sheeran, P.2
-
37
-
-
0012903874
-
Analyzing the past to prepare for the future: Writing a literature review
-
J. Webster, R.T. Watson, "Analyzing the Past to Prepare for the Future: Writing a Literature Review", MIS Quarterly, Vol. 26, pp. xiii-xxiii, 2002.
-
(2002)
MIS Quarterly
, vol.26
-
-
Webster, J.1
Watson, R.T.2
-
38
-
-
42549090774
-
The ranking of top is journals: A perspective from the London school of economics
-
L. Willcocks, E.A. Whitley, C. Avgerou, "The Ranking of Top IS Journals: A Perspective from the London School of Economics", European Journal of Information Systems (EJIS), Vol. 17, pp. 163-168, 2008.
-
(2008)
European Journal of Information Systems (EJIS)
, vol.17
, pp. 163-168
-
-
Willcocks, L.1
Whitley, E.A.2
Avgerou, C.3
-
39
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
M. Workman, W.H. Bommer, D. Straub, "Security lapses and the omission of information security measures: A threat control model and empirical test", Computers in Human Behavior, Vol. 24, pp. 2799-2816, 2008.
-
(2008)
Computers in Human Behavior
, vol.24
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.H.2
Straub, D.3
|