-
3
-
-
84876559418
-
Neural correlates of gender differences in distinguishing malware warnings and legitimate websites: A NeuroIS study
-
Provo, UT, USA. IFIP WG 8.11/11.13
-
Anderson B, Hansen J, Vance A, Kirwan B, Eargle D, Hinkle LJ, et al. Neural correlates of gender differences in distinguishing malware warnings and legitimate websites: a NeuroIS study. The Dewald Roode Information Security Workshop. Provo, UT, USA. IFIP WG 8.11/11.13; 2012.
-
(2012)
The Dewald Roode Information Security Workshop
-
-
Anderson, B.1
Hansen, J.2
Vance, A.3
Kirwan, B.4
Eargle, D.5
Hinkle, L.J.6
-
4
-
-
77957077814
-
Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions
-
Anderson CL, Agarwal R. Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly 2010;34(3): 613-43.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 613-643
-
-
Anderson, C.L.1
Agarwal, R.2
-
5
-
-
84861098483
-
A cluster-based fault-tolerant architecture for stateful firewalls
-
Ayuso PN, Gasca RM, Lefevre LFT-FW. A cluster-based fault-tolerant architecture for stateful firewalls. Computers & Security 2012;31(4):524-39.
-
(2012)
Computers & Security
, vol.31
, Issue.4
, pp. 524-539
-
-
Ayuso, P.N.1
Gasca, R.M.2
Lefevre, L.F.T.-F.W.3
-
6
-
-
77952903083
-
-
Baker W, Goudie M, Hutton A, Hylender C, Niemantsverdriet J, Novak C, et al. Verizon 2010 data breach investigations report, http://www.verizonbusiness. com/resources/reports/rp-2010-data-breach-report-en-xg.pdf; 2010.
-
(2010)
Verizon 2010 Data Breach Investigations Report
-
-
Baker, W.1
Goudie, M.2
Hutton, A.3
Hylender, C.4
Niemantsverdriet, J.5
Novak, C.6
-
7
-
-
33646563519
-
Hackers profiled - Who are they and what are their motivations?
-
Barber R. Hackers profiled - who are they and what are their motivations? Computer Fraud & Security 2001;2001(2):14-7.
-
(2001)
Computer Fraud & Security
, vol.2001
, Issue.2
, pp. 14-17
-
-
Barber, R.1
-
8
-
-
84899252279
-
The general theory of crime and computer hacking: Low self-control hackers?
-
Holt TJ, Schell BH, editors Hershey: Information Science Reference
-
Bossler AM, Burruss GW. The general theory of crime and computer hacking: low self-control hackers? In: Holt TJ, Schell BH, editors. Corporate hacking and technology-driven crime: social dynamics and implications. Hershey: Information Science Reference; 2011. p. 38-67.
-
(2011)
Corporate Hacking and Technology-driven Crime: Social Dynamics and Implications
, pp. 38-67
-
-
Bossler, A.M.1
Burruss, G.W.2
-
9
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
Bulgurcu B, Cavusoglu H, Benbasat I. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Quarterly 2010;34(3): 523-48.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
10
-
-
80955142795
-
The cyber threat landscape: Challenges and future research directions
-
Choo K-KR. The cyber threat landscape: challenges and future research directions. Computers & Security 2011;30(8):719-31.
-
(2011)
Computers & Security
, vol.30
, Issue.8
, pp. 719-731
-
-
Choo, K.-K.R.1
-
11
-
-
0000204509
-
Social change and crime rate trends: A routine activity approach
-
Cohen LE, Felson M. Social change and crime rate trends: a routine activity approach. American Sociological Review 1979;44(4):588-608.
-
(1979)
American Sociological Review
, vol.44
, Issue.4
, pp. 588-608
-
-
Cohen, L.E.1
Felson, M.2
-
13
-
-
67649551429
-
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
-
D'Arcy J, Hovav A, Galletta D. User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Information Systems Research 2009;20(1):79-98.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 79-98
-
-
D'Arcy, J.1
Hovav, A.2
Galletta, D.3
-
14
-
-
80455178572
-
A review and analysis of deterrence theory in the IS security literature: Making sense of the disparate findings
-
D'Arcy J, Herath T. A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings. European Journal of Information Systems 2011;20(6): 643-58.
-
(2011)
European Journal of Information Systems
, vol.20
, Issue.6
, pp. 643-658
-
-
D'Arcy, J.1
Herath, T.2
-
15
-
-
34848873123
-
Deterring internal information systems misuse
-
DOI 10.1145/1290958.1290971, 1290971
-
D'Arcy J, Hovav A. Deterring internal information systems misuse. Communications of the ACM 2007;50(10):113-7. (Pubitemid 47505008)
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 113-117
-
-
D'Arcy, J.1
Hovav, A.2
-
16
-
-
77956856870
-
What does the brain tell us about trust and distrust? Evidence from a functional neuroimaging study
-
Dimoka A. What does the brain tell us about trust and distrust? Evidence from a functional neuroimaging study. MIS Quarterly 2010;34(2):373-96.
-
(2010)
MIS Quarterly
, vol.34
, Issue.2
, pp. 373-396
-
-
Dimoka, A.1
-
17
-
-
84864914540
-
How to conduct a functional magnetic resonance (fMRI) study in social science research
-
Dimoka A. How to conduct a functional magnetic resonance (fMRI) study in social science research. MIS Quarterly 2012; 36(3):811-40.
-
(2012)
MIS Quarterly
, vol.36
, Issue.3
, pp. 811-840
-
-
Dimoka, A.1
-
18
-
-
84864958498
-
On the use of neurophysiological tools in information systems research: Developing a research agenda for NeuroIS
-
Dimoka A, Banker RD, Benbasat I, Davis FD, Dennis AR, Gefen D, et al. On the use of neurophysiological tools in information systems research: developing a research agenda for Neuro IS. MIS Quarterly 2012;36(3):679-702.
-
(2012)
MIS Quarterly
, vol.36
, Issue.3
, pp. 679-702
-
-
Dimoka, A.1
Banker, R.D.2
Benbasat, I.3
Davis, F.D.4
Dennis, A.R.5
Gefen, D.6
-
22
-
-
84880196111
-
Behavioral information security
-
Janczewski LJ, Colarik AM, editors Hershey, PA: USA: Information Science Reference
-
Fagnot IJ. Behavioral information security. In: Janczewski LJ, Colarik AM, editors. Encyclopedia of cyber warfare and cyber terrorism. Hershey, PA: USA: Information Science Reference; 2008. p. 199-205.
-
(2008)
Encyclopedia of Cyber Warfare and Cyber Terrorism
, pp. 199-205
-
-
Fagnot, I.J.1
-
24
-
-
81255163048
-
Understanding nonmalicious security violations in the workplace: A composite behavior model
-
Guo KH, Yuan Y, Archer NP, Connelly CE. Understanding nonmalicious security violations in the workplace: a composite behavior model. Journal of Management Information Systems 2011;28(2):203-36.
-
(2011)
Journal of Management Information Systems
, vol.28
, Issue.2
, pp. 203-236
-
-
Guo, K.H.1
Yuan, Y.2
Archer, N.P.3
Connelly, C.E.4
-
25
-
-
21944448888
-
Discourses of Danger and the Computer Hacker
-
Social Identify and Computer Networks
-
Halbert D. Discourses of danger and the computer hacker. The Information Society 1997;13(4):361-74. (Pubitemid 128001895)
-
(1997)
Information Society
, vol.13
, Issue.4
, pp. 361-374
-
-
Halbert, D.1
-
26
-
-
34547798962
-
Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection
-
DOI 10.1016/j.dss.2006.04.004, PII S0167923606000625
-
Hansen JV, Lowry PB, Meservy R, McDonald D. Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection. Decision Support Systems 2007;43(4):1362-74. (Pubitemid 47225189)
-
(2007)
Decision Support Systems
, vol.43
, Issue.4
, pp. 1362-1374
-
-
Hansen, J.V.1
Lowry, P.B.2
Meservy, R.D.3
McDonald, D.M.4
-
27
-
-
67349144062
-
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
-
Herath T, Rao H. Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness. Decision Support Systems 2009a;47(2):154-65.
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 154-165
-
-
Herath, T.1
Rao, H.2
-
28
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
Herath T, Rao H. Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems 2009b;18(2):106-25.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.2
-
29
-
-
84876551709
-
Lie to me: Gender deception and detection in computer-mediated communications
-
Provo, UT, USA. IFIP WG 8.11/11.13
-
Ho SM, McDonald N, Warkentin M. Lie to me: gender deception and detection in computer-mediated communications. The Dewald Roode Information Security Workshop. Provo, UT, USA. IFIP WG 8.11/11.13; 2012.
-
(2012)
The Dewald Roode Information Security Workshop
-
-
Ho, S.M.1
McDonald, N.2
Warkentin, M.3
-
31
-
-
0039803550
-
Hackers: Computer heroes or electronic highwaymen?
-
Hollinger RC. Hackers: computer heroes or electronic highwaymen? ACM SIGCAS Computers and Society 1991;21(1):6-17.
-
(1991)
ACM SIGCAS Computers and Society
, vol.21
, Issue.1
, pp. 6-17
-
-
Hollinger, R.C.1
-
32
-
-
84863542038
-
Managing employee compliance with information security policies: The role of top management and organizational culture
-
Hu Q, Dinev T, Hart P, Cooke D. Managing employee compliance with information security policies: the role of top management and organizational culture. Decision Sciences 2012;43(4):615-60.
-
(2012)
Decision Sciences
, vol.43
, Issue.4
, pp. 615-660
-
-
Hu, Q.1
Dinev, T.2
Hart, P.3
Cooke, D.4
-
33
-
-
79959944364
-
Does deterrence work in reducing information security policy abuse by employees?
-
Hu Q, Xu Z, Dinev T, Ling H. Does deterrence work in reducing information security policy abuse by employees? Communications of the ACM 2011a;54(6):54-60.
-
(2011)
Communications of the ACM
, vol.54
, Issue.6
, pp. 54-60
-
-
Hu, Q.1
Xu, Z.2
Dinev, T.3
Ling, H.4
-
34
-
-
84876522913
-
How can you tell a hacker from a geek? Ask whether he spends more time on computer games than sports!
-
Blacksburg, VA, USA. IFIP WG 8.11/11.13
-
Hu Q, Zhang C, Xu Z. How can you tell a hacker from a geek? Ask whether he spends more time on computer games than sports!. The Dewald Roode Information Security Workshop. Blacksburg, VA, USA. IFIP WG 8.11/11.13; 2011b.
-
(2011)
The Dewald Roode Information Security Workshop
-
-
Hu, Q.1
Zhang, C.2
Xu, Z.3
-
35
-
-
84856018908
-
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
-
Ifinedo P. Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Computers & Security 2012;31(1):83-95.
-
(2012)
Computers & Security
, vol.31
, Issue.1
, pp. 83-95
-
-
Ifinedo, P.1
-
36
-
-
77955043195
-
Technology dominance in complex decision making: The case of aided credibility assessment
-
Jensen ML, Lowry PB, Burgoon JK, Nunamaker JF. Technology dominance in complex decision making: the case of aided credibility assessment. Journal of Management Information Systems 2010;27(1):175-202.
-
(2010)
Journal of Management Information Systems
, vol.27
, Issue.1
, pp. 175-202
-
-
Jensen, M.L.1
Lowry, P.B.2
Burgoon, J.K.3
Nunamaker, J.F.4
-
37
-
-
80051745905
-
Effects of automated and participative decision support in computer-aided credibility assessment
-
Jensen ML, Lowry PB, Jenkins JL. Effects of automated and participative decision support in computer-aided credibility assessment. Journal of Management Information Systems 2011;28(1):201-34.
-
(2011)
Journal of Management Information Systems
, vol.28
, Issue.1
, pp. 201-234
-
-
Jensen, M.L.1
Lowry, P.B.2
Jenkins, J.L.3
-
38
-
-
77957057727
-
Fear appeals and information security behaviors: An empirical study
-
Johnston AC, Warkentin M. Fear appeals and information security behaviors: an empirical study. MIS Quarterly 2010;34(3): 549-66.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 549-566
-
-
Johnston, A.C.1
Warkentin, M.2
-
39
-
-
20944439353
-
A longitudinal model of continued IS use: An integrative view of four mechanisms underlying postadoption phenomena
-
DOI 10.1287/mnsc.1040.0326
-
Kim SS, Malhotra NK. A longitudinal model of continued IS use: an integrative view of four mechanisms underlying postadoption phenomena. Management Science 2005;51(5): 741-55. (Pubitemid 40867141)
-
(2005)
Management Science
, vol.51
, Issue.5
, pp. 741-755
-
-
Kim, S.S.1
Malhotra, N.K.2
-
40
-
-
84863328368
-
A framework for theory development in design science research: Multiple perspectives
-
Kuechler W, Vaishnavi V. A framework for theory development in design science research: multiple perspectives. Journal of the Association for Information Systems 2012;13(6):395-423.
-
(2012)
Journal of the Association for Information Systems
, vol.13
, Issue.6
, pp. 395-423
-
-
Kuechler, W.1
Vaishnavi, V.2
-
41
-
-
0345764837
-
Improving user security behaviour
-
Leach J. Improving user security behaviour. Computers & Security 2003;22(8):685-92.
-
(2003)
Computers & Security
, vol.22
, Issue.8
, pp. 685-692
-
-
Leach, J.1
-
42
-
-
2342489402
-
An integrative model of computer abuse based on social control and general deterrence theories
-
Lee SM, Lee SG, Yoo S. An integrative model of computer abuse based on social control and general deterrence theories. Information & Management 2004;41(6):707-18.
-
(2004)
Information & Management
, vol.41
, Issue.6
, pp. 707-718
-
-
Lee, S.M.1
Lee, S.G.2
Yoo, S.3
-
43
-
-
78650169218
-
Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective
-
Lee Y. Understanding anti-plagiarism software adoption: an extended protection motivation theory perspective. Decision Support Systems 2011;50(2):361-9.
-
(2011)
Decision Support Systems
, vol.50
, Issue.2
, pp. 361-369
-
-
Lee, Y.1
-
44
-
-
67650166189
-
Threat or coping appraisal: Determinants of SMB executive's decision to adopt anti-malware software
-
Lee Y, Larsen KR. Threat or coping appraisal: determinants of SMB executive's decision to adopt anti-malware software. European Journal of Information Systems 2009;18(2): 177-87.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 177-187
-
-
Lee, Y.1
Larsen, K.R.2
-
45
-
-
33750041304
-
The Relative Impact of Violation Type and Lie Severity on Judgments of Message Deceitfulness
-
Levine TR, Asada KJK, Lindsey LLM. The relative impact of violation type and lie severity on judgments of message deceitfulness. Communication Research Reports 2003;20(3): 208-18. (Pubitemid 38061640)
-
(2003)
Communication Research Reports
, vol.20
, Issue.3
, pp. 208-218
-
-
Levine, T.R.1
Asada, K.J.K.2
Lindsey, L.L.M.3
-
47
-
-
77955121478
-
Understanding security behaviors in personal computer usage: A threat avoidance perspective
-
Liang H, Xue Y. Understanding security behaviors in personal computer usage: a threat avoidance perspective. Journal of the Association for Information Systems 2010;11(7):394-413.
-
(2010)
Journal of the Association for Information Systems
, vol.11
, Issue.7
, pp. 394-413
-
-
Liang, H.1
Xue, Y.2
-
48
-
-
79955636557
-
Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures
-
Lowry PB, Cao J, Everard A. Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: the case of instant messaging in two cultures. Journal of Management Information Systems 2011;27(4): 165-204.
-
(2011)
Journal of Management Information Systems
, vol.27
, Issue.4
, pp. 165-204
-
-
Lowry, P.B.1
Cao, J.2
Everard, A.3
-
49
-
-
84863337613
-
Effects of culture, social presence, and group composition on trust in technology-supported decision-making groups
-
Lowry PB, Zhang D, Zhou L, Fu X. Effects of culture, social presence, and group composition on trust in technology-supported decision-making groups. Information Systems Journal 2010;20(3):297-315.
-
(2010)
Information Systems Journal
, vol.20
, Issue.3
, pp. 297-315
-
-
Lowry, P.B.1
Zhang, D.2
Zhou, L.3
Fu, X.4
-
50
-
-
77957096376
-
Moving toward black hat research in information systems security: An editorial introduction to the special issue
-
Mahmood MA, Siponen M, Straub D, Rao HR, Raghu T. Moving toward black hat research in information systems security: an editorial introduction to the special issue. MIS Quarterly 2010; 34(3):431-3.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 431-433
-
-
Mahmood, M.A.1
Siponen, M.2
Straub, D.3
Rao, H.R.4
Raghu, T.5
-
51
-
-
84933491052
-
Information manipulation theory
-
McCornack SA. Information manipulation theory. Communication Monographs 1992;59(1):1-16.
-
(1992)
Communication Monographs
, vol.59
, Issue.1
, pp. 1-16
-
-
McCornack, S.A.1
-
52
-
-
84933490021
-
When the alteration of information is viewed as deception: An empirical test of information manipulation theory
-
McCornack SA, Levine TR, Solowczuk KA, Torres HI, Campbell DM. When the alteration of information is viewed as deception: an empirical test of information manipulation theory. Communication Monographs 1992;59(1):17-29.
-
(1992)
Communication Monographs
, vol.59
, Issue.1
, pp. 17-29
-
-
McCornack, S.A.1
Levine, T.R.2
Solowczuk, K.A.3
Torres, H.I.4
Campbell, D.M.5
-
53
-
-
33846313618
-
The qualitative interview in IS research: Examining the craft
-
Myers MD, Newman M. The qualitative interview in IS research: examining the craft. Information and Organization 2007;17(1): 2-26.
-
(2007)
Information and Organization
, vol.17
, Issue.1
, pp. 2-26
-
-
Myers, M.D.1
Newman, M.2
-
54
-
-
67650143327
-
What levels of moral reasoning and values explain adherence to information security rules an empirical study
-
Myyry L, Siponen M, Pahnila S, Vartiainen T, Vance A. What levels of moral reasoning and values explain adherence to information security rules an empirical study. European Journal of Information Systems 2009;18(2):126-39.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 126-139
-
-
Myyry, L.1
Siponen, M.2
Pahnila, S.3
Vartiainen, T.4
Vance, A.5
-
55
-
-
84861093550
-
SCADA security in the light of cyber-warfare
-
Nicholson A, Webber S, Dyer S, Patel T, Janicke H. SCADA security in the light of cyber-warfare. Computers & Security 2012;31(4): 418-36.
-
(2012)
Computers & Security
, vol.31
, Issue.4
, pp. 418-436
-
-
Nicholson, A.1
Webber, S.2
Dyer, S.3
Patel, T.4
Janicke, H.5
-
57
-
-
1642602843
-
Projected offending and contemporaneous rule-violation: Implications for heterotypic continuity
-
Pogarsky G. Projected offending and contemporaneous rule-violation: implications for heterotypic continuity. Criminology 2004;42(1):111-36.
-
(2004)
Criminology
, vol.42
, Issue.1
, pp. 111-136
-
-
Pogarsky, G.1
-
58
-
-
84875487357
-
When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse
-
Posey C, Bennett R, Roberts TL, Lowry PB. When computer monitoring backfires: invasion of privacy and organizational injustice as precursors to computer abuse. Journal of Information System Security 2011a;7(1):24-47.
-
(2011)
Journal of Information System Security
, vol.7
, Issue.1
, pp. 24-47
-
-
Posey, C.1
Bennett, R.2
Roberts, T.L.3
Lowry, P.B.4
-
59
-
-
80051795854
-
Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes
-
Posey C, Bennett RJ, Roberts TL. Understanding the mindset of the abusive insider: an examination of insiders' causal reasoning following internal security changes. Computers & Security 2011b;30(6-7):486-97.
-
(2011)
Computers & Security
, vol.30
, Issue.6-7
, pp. 486-497
-
-
Posey, C.1
Bennett, R.J.2
Roberts, T.L.3
-
60
-
-
77952042701
-
The culture-influenced online community self-disclosure model: The case of working professionals in France and the UK whouse online communities
-
Posey C, Lowry PB, Roberts TL, Ellis S. The culture-influenced online community self-disclosure model: the case of working professionals in France and the UK whouse online communities. European Journal of Information Systems 2010;19(2):181-95.
-
(2010)
European Journal of Information Systems
, vol.19
, Issue.2
, pp. 181-195
-
-
Posey, C.1
Lowry, P.B.2
Roberts, T.L.3
Ellis, S.4
-
61
-
-
84876548646
-
Motivating the insider to protect organizational information assets: Evidence from protection motivation theory and rival explanations
-
Blacksburg, VA, USA. IFIP WG 8.11/11.13
-
Posey C, Roberts TL, Lowry PB. Motivating the insider to protect organizational information assets: evidence from protection motivation theory and rival explanations. The Dewald Roode Information Security Workshop. Blacksburg, VA, USA. IFIP WG 8.11/11.13; 2011c.
-
(2011)
The Dewald Roode Information Security Workshop
-
-
Posey, C.1
Roberts, T.L.2
Lowry, P.B.3
-
64
-
-
33745740196
-
Self-reported deviant computer behavior: A big-5, moral choice, and manipulative exploitive behavior analysis
-
DOI 10.1080/01639620600605333, PII K5T326TU3661172R
-
Rogers M, Smoak ND, Liu J. Self-reported deviant computer behavior: a big-5, moral choice, and manipulative exploitive behavior analysis. Deviant Behavior 2006a;27(3):245-68. (Pubitemid 44011812)
-
(2006)
Deviant Behavior
, vol.27
, Issue.3
, pp. 245-268
-
-
Rogers, M.1
Smoak, N.D.2
Liu, J.3
-
65
-
-
84868347410
-
Self-reported computer criminal behavior: A psychological analysis
-
DOI 10.1016/j.diin.2006.06.002, PII S1742287606000636
-
Rogers MK, Seigfried K, Tidke K. Self-reported computer criminal behavior: a psychological analysis. Digital Investigation 2006b; 3(Suppl.):116-20. (Pubitemid 44066904)
-
(2006)
Digital Investigation
, vol.3
, Issue.SUPPL.
, pp. 116-120
-
-
Rogers, M.K.1
Seigfried, K.2
Tidke, K.3
-
66
-
-
0002247369
-
Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation
-
Cacioppo JT, Petty RE, editors New York, NY, USA: Guilford
-
Rogers RW. Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation. In: Cacioppo JT, Petty RE, editors. Social psychophysiology: a sourcebook. New York, NY, USA: Guilford; 1983. p. 153-76.
-
(1983)
Social Psychophysiology: A Sourcebook
, pp. 153-176
-
-
Rogers, R.W.1
-
67
-
-
0035387175
-
Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
-
DOI 10.1023/A:1011902718709
-
Sasse MA, Brostoff S, Weirich D. Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT Technology Journal 2001;19(3): 122-31. (Pubitemid 32903117)
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
69
-
-
77957068563
-
Neutralization: New insights into the problem of employee information systems security policy violations
-
Siponen M, Vance A. Neutralization: new insights into the problem of employee information systems security policy violations. MIS Quarterly 2010;34(3):487-502.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 487-502
-
-
Siponen, M.1
Vance, A.2
-
70
-
-
84869427548
-
A critical assessment of IS security research between 1990-2004
-
St. Gallen, Switzerland
-
Siponen M, Willison R. A critical assessment of IS security research between 1990-2004. In: 15th European conference on information systems. St. Gallen, Switzerland; 2007. p. 1551-9.
-
(2007)
15th European Conference on Information Systems
, pp. 1551-1559
-
-
Siponen, M.1
Willison, R.2
-
71
-
-
67651102640
-
Information security management standards: Problems and solutions
-
Siponen M, Willison R. Information security management standards: problems and solutions. Information & Management 2009;46(5):267-70.
-
(2009)
Information & Management
, vol.46
, Issue.5
, pp. 267-270
-
-
Siponen, M.1
Willison, R.2
-
73
-
-
17844366573
-
Analysis of end user security behaviors
-
DOI 10.1016/j.cose.2004.07.001, PII S0167404804001841
-
Stanton JM, Stam KR, Mastrangelo P, Jolton J. Analysis of end user security behaviors. Computers & Security 2005;24(2):124-33. (Pubitemid 40583824)
-
(2005)
Computers and Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
74
-
-
85139599019
-
Behavioral information security: An overview, results, and research agenda
-
Zhang P, Galletta DF, editors foundations. Armonk, NY, USA: M.E. Sharpe
-
Stanton JM, Stam KR, Mastrangelo PM, Jolton JA. Behavioral information security: an overview, results, and research agenda. In: Zhang P, Galletta DF, editors. Humanecomputer interaction and management information systems: foundations. Armonk, NY, USA: M.E. Sharpe; 2006. p. 262-80.
-
(2006)
Humanecomputer Interaction and Management Information Systems
, pp. 262-280
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.M.3
Jolton, J.A.4
-
75
-
-
0003196246
-
Measuring system usage: Implications for IS theory testing
-
Straub D, Limayem M, Karahanna-Evaristo E. Measuring system usage: implications for IS theory testing. Management Science 1995;41(8):1328-42.
-
(1995)
Management Science
, vol.41
, Issue.8
, pp. 1328-1342
-
-
Straub, D.1
Limayem, M.2
Karahanna-Evaristo, E.3
-
77
-
-
0002699431
-
Discovering and disciplining computer abuse in organization
-
Straub DW, Nance WD. Discovering and disciplining computer abuse in organization. MIS Quarterly 1990;14(1):45.
-
(1990)
MIS Quarterly
, vol.14
, Issue.1
, pp. 45
-
-
Straub, D.W.1
Nance, W.D.2
-
78
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub DW, Welke RJ. Coping with systems risk: security planning models for management decision making. MIS Quarterly 1998; 22(4):441-69.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
80
-
-
24644470542
-
The insider threat to information systems and the effectiveness of ISO17799
-
DOI 10.1016/j.cose.2005.05.002, PII S0167404805000684
-
Theoharidou M, Kokolakis S, Karyda M, Kiountouzis E. The insider threat to information systems and the effectiveness of ISO17799. Computers & Security 2005;24(6):472-84. (Pubitemid 41277034)
-
(2005)
Computers and Security
, vol.24
, Issue.6
, pp. 472-484
-
-
Theoharidou, M.1
Kokolakis, S.2
Karyda, M.3
Kiountouzis, E.4
-
81
-
-
84876558911
-
A new approach to the problem of unauthorized access: Raising perceptions of accountability through user interface design features
-
Blacksburg, VA, USA. IFIP WG 8.11/11.13
-
Vance A, Molyneux B, Lowry PB. A new approach to the problem of unauthorized access: raising perceptions of accountability through user interface design features. The Dewald Roode Information Security Workshop. Blacksburg, VA, USA. IFIP WG 8.11/11.13; 2011.
-
(2011)
The Dewald Roode Information Security Workshop
-
-
Vance, A.1
Molyneux, B.2
Lowry, P.B.3
-
84
-
-
0033872521
-
Theoretical extension of the Technology Acceptance Model: Four longitudinal field studies
-
Venkatesh V, Davis FD. A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science 2000;46(2):186-204. (Pubitemid 30594361)
-
(2000)
Management Science
, vol.46
, Issue.2
, pp. 186-204
-
-
Venkatesh, V.1
Davis, F.D.2
-
85
-
-
2342475711
-
Towards information security behavioural compliance
-
Vroom C, von Solms R. Towards information security behavioural compliance. Computers & Security 2004;23(3):191-8.
-
(2004)
Computers & Security
, vol.23
, Issue.3
, pp. 191-198
-
-
Vroom, C.1
Von Solms, R.2
-
86
-
-
84861553944
-
Are we making a better world with ICTs? Reflections on a future agenda for the IS field
-
Walsham G. Are we making a better world with ICTs? Reflections on a future agenda for the IS field. Journal of Information Technology 2012;27(2):87-93.
-
(2012)
Journal of Information Technology
, vol.27
, Issue.2
, pp. 87-93
-
-
Walsham, G.1
-
87
-
-
79955622246
-
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention
-
Warkentin M, Johnston AC, Shropshire J. The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. European Journal of Information Systems 2011a;20(3):267-84.
-
(2011)
European Journal of Information Systems
, vol.20
, Issue.3
, pp. 267-284
-
-
Warkentin, M.1
Johnston, A.C.2
Shropshire, J.3
-
92
-
-
67650170305
-
Behavioral and policy issues in information systems security: The insider threat
-
Warkentin M, Willison R. Behavioral and policy issues in information systems security: the insider threat. European Journal of Information Systems 2009;18(2):101-5.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 101-105
-
-
Warkentin, M.1
Willison, R.2
-
93
-
-
17444408257
-
Crime as alternative: Towards a cross-level situational action theory of crime causation
-
McCord J, editor New Brunswick, NJ: Transaction Publishers
-
Wikström PO. Crime as alternative: towards a cross-level situational action theory of crime causation. In: McCord J, editor. Beyond empiricism: institutions and intentions in the study of crime. New Brunswick, NJ: Transaction Publishers; 2004. p. 1-38.
-
(2004)
Beyond Empiricism: Institutions and Intentions in the Study of Crime
, pp. 1-38
-
-
Wikström, P.O.1
-
94
-
-
84927964522
-
Linking individual, setting, and acts of crime. Situational mechanisms and the explanation of crime
-
Wikström H, Sampson RJ, editors Cambridge, UK: Cambridge University Press
-
Wikström PO. Linking individual, setting, and acts of crime. situational mechanisms and the explanation of crime. In: Wikström H, Sampson RJ, editors. The explanation of crime: contexts, mechanisms, and development. Cambridge, UK: Cambridge University Press; 2006.
-
(2006)
The Explanation of Crime: Contexts, Mechanisms, and Development
-
-
Wikström, P.O.1
-
95
-
-
33750683067
-
Understanding the perpetration of employee computer crime in the organisational context
-
DOI 10.1016/j.infoandorg.2006.08.001, PII S1471772706000224
-
Willison R. Understanding the perpetration of employee computer crime in the organisational context. Information and Organization 2006;16(4):304-24. (Pubitemid 44698429)
-
(2006)
Information and Organization
, vol.16
, Issue.4
, pp. 304-324
-
-
Willison, R.1
-
96
-
-
33749351964
-
Opportunities for computer crime: Considering systems risk from a criminological perspective
-
DOI 10.1057/palgrave.ejis.3000592, PII 3000592
-
Willison R, Backhouse J. Opportunities for computer crime: considering systems risk from a criminological perspective. European Journal of Information Systems 2006;15(4): 403-14. (Pubitemid 44494839)
-
(2006)
European Journal of Information Systems
, vol.15
, Issue.4
, pp. 403-414
-
-
Willison, R.1
Backhouse, J.2
-
97
-
-
84873974226
-
Beyond deterrence: An expanded view of employee computer abuse
-
Willison R, Warkentin M. Beyond deterrence: an expanded view of employee computer abuse. MIS Quarterly; 2013;37(1).
-
(2013)
MIS Quarterly
, vol.37
, Issue.1
-
-
Willison, R.1
Warkentin, M.2
-
99
-
-
77955042436
-
The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived
-
Wright RT, Marett K. The influence of experiential and dispositional factors in phishing: an empirical investigation of the deceived. Journal of Management Information Systems 2010;27(1):273-303.
-
(2010)
Journal of Management Information Systems
, vol.27
, Issue.1
, pp. 273-303
-
-
Wright, R.T.1
Marett, K.2
-
100
-
-
85045160218
-
Computer hacking: Just another case of juvenile delinquency?
-
Yar M. Computer hacking: just another case of juvenile delinquency? The Howard Journal of Criminal Justice 2005; 44(4):387-99.
-
(2005)
The Howard Journal of Criminal Justice
, vol.44
, Issue.4
, pp. 387-399
-
-
Yar, M.1
-
101
-
-
0003673547
-
Case study research: Design and methods
-
CA: Sage Publications
-
Yin RK. Case study research: design and methods. Newbury Park, CA: Sage Publications; 2009.
-
(2009)
Newbury Park
-
-
Yin, R.K.1
-
104
-
-
49249108825
-
Issues, limitations, and opportunities in cross-cultural research on collaborative software in information systems
-
Zhang D, Lowry PB. Issues, limitations, and opportunities in cross-cultural research on collaborative software in information systems. Journal of Global Information Management 2008;16(1):61-92.
-
(2008)
Journal of Global Information Management
, vol.16
, Issue.1
, pp. 61-92
-
-
Zhang, D.1
Lowry, P.B.2
-
105
-
-
38349101624
-
The impact of individualism-collectivism, social presence, and group diversity on group decision making under majority influence
-
Zhang D, Lowry PB, Zhou L, Fu X. The impact of individualism- collectivism, social presence, and group diversity on group decision making under majority influence. Journal of Management Information Systems 2007;23(4):53-80.
-
(2007)
Journal of Management Information Systems
, vol.23
, Issue.4
, pp. 53-80
-
-
Zhang, D.1
Lowry, P.B.2
Zhou, L.3
Fu, X.4
-
106
-
-
84861098336
-
MSABMS-based approach of detecting LDoS attack
-
Zhi-jun W, Hai-tao Z, Ming-hua W, Bao-song P. MSABMS-based approach of detecting LDoS attack. Computers & Security 2012;31(4):402-17.
-
(2012)
Computers & Security
, vol.31
, Issue.4
, pp. 402-417
-
-
Zhi-Jun, W.1
Hai-Tao, Z.2
Ming-Hua, W.3
Bao-Song, P.4
|