-
1
-
-
77957061746
-
Information Security Policy Compliance: An Empirical Study of Rationality-based Beliefs and Information Security Awareness
-
Sep
-
Bulgurcu, B., Cavusoglu, H., and Benbasat, I. "Information Security Policy Compliance: An Empirical Study of Rationality-based Beliefs and Information Security Awareness," MIS Quarterly (34:3), Sep 2010, pp 523-548.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
2
-
-
67649551429
-
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
-
D'Arcy, J., Hovav, A., and Galletta, D. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research (20:1) 2009, pp 79-98.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 79-98
-
-
D'Arcy, J.1
Hovav, A.2
Galletta, D.3
-
3
-
-
34247541615
-
Releasing individually identifiable microdata with privacy protection against Stochastic threat: An application to health information
-
Garfinkel, R., Gopal, R., and Thompson, S. "Releasing individually identifiable microdata with privacy protection against Stochastic threat: An application to health information," Information Systems Research (18:1) 2007, pp 23-41.
-
(2007)
Information Systems Research
, vol.18
, Issue.1
, pp. 23-41
-
-
Garfinkel, R.1
Gopal, R.2
Thompson, S.3
-
4
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
Apr
-
Herath, T., and Rao, H.R. "Protection motivation and deterrence: a framework for security policy compliance in organisations," European Journal of Information Systems (18:2), Apr 2009, pp 106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
5
-
-
0345327795
-
An Integrated System Theory of Information Security Management
-
Hong, K., Chi, Y., Chag, L.R., and Tang, J. "An Integrated System Theory of Information Security Management," Information Management & Computer Security (11:5) 2003, p 243.
-
(2003)
Information Management & Computer Security
, vol.11
, Issue.5
, pp. 243
-
-
Hong, K.1
Chi, Y.2
Chag, L.R.3
Tang, J.4
-
6
-
-
0035322353
-
An Empirical Examination of Dynamic Quality-based Learning Models
-
April
-
Ittner, CD., Nagar, V., and Rajan, M.V. 2001."An Empirical Examination of Dynamic Quality-based Learning Models," Management Science (47:4), April, pp. 563-578.
-
(2001)
Management Science
, vol.47
, Issue.4
, pp. 563-578
-
-
Ittner, C.D.1
Nagar, V.2
Rajan, M.V.3
-
8
-
-
58849149565
-
Improved Security through Information Security Governance
-
Johnston, A.C., and Hale, R "Improved Security through Information Security Governance," Communications oftheACM (52:1) 2009, pp 126-129.
-
(2009)
Communications OftheACM
, vol.52
, Issue.1
, pp. 126-129
-
-
Johnston, A.C.1
Hale, R.2
-
9
-
-
77957057727
-
Fear Appeals and Information Security Behaviors: An Empirical Study
-
Sep
-
Johnston, A.C., and Warkentin, M. "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly (34:3), Sep 2010, pp 549-566.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 549-566
-
-
Johnston, A.C.1
Warkentin, M.2
-
10
-
-
78751472118
-
Effective Information Security Requires a Balance of Social and Technology Factors
-
Sep
-
Kayworth, T., and Whitten, D. "Effective Information Security Requires a Balance of Social and Technology Factors," MIS Quarterly Executive (9:3), Sep 2010, pp 163-175.
-
(2010)
MIS Quarterly Executive
, vol.9
, Issue.3
, pp. 163-175
-
-
Kayworth, T.1
Whitten, D.2
-
11
-
-
84947287562
-
Survey Results: Reduce the Cost of Compliance While Strengthening Security
-
Liberti, L. "Survey Results: Reduce the Cost of Compliance While Strengthening Security," in: Security Management Newsletter, 2008.
-
(2008)
Security Management Newsletter
-
-
Liberti, L.1
-
12
-
-
35348859021
-
Perception of risk and the strategic impact of existing IT on information security strategy at board level
-
McFadzean, E., Ezingeard, J.N., and Birchall, D. "Perception of risk and the strategic impact of existing IT on information security strategy at board level," Online Information Review (31) 2007, pp 622-660.
-
(2007)
Online Information Review
, vol.31
, pp. 622-660
-
-
McFadzean, E.1
Ezingeard, J.N.2
Birchall, D.3
-
13
-
-
78650770842
-
Improving Employees' Compliance through Information Systems Security Training: An Action Research Study
-
Dec
-
Puhakainen, P., and Siponen, M. "Improving Employees' Compliance through Information Systems Security Training: An Action Research Study," MIS Quarterly (34:4), Dec 2010, pp 757-778.
-
(2010)
MIS Quarterly
, vol.34
, Issue.4
, pp. 757-778
-
-
Puhakainen, P.1
Siponen, M.2
-
14
-
-
77957068563
-
Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations
-
Sep
-
Siponen, M., and Vance, A. "Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations," MIS Quarterly (34:3), Sep 2010, pp 487-502.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 487-502
-
-
Siponen, M.1
Vance, A.2
-
15
-
-
77957070672
-
User Participation In Information Systems Security Risk Management
-
Sep
-
Spears, J.L., and Barki, H. "User Participation In Information Systems Security Risk Management," MIS Quarterly (34:3), Sep 2010, pp 503-522.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 503-522
-
-
Spears, J.L.1
Barki, H.2
-
16
-
-
84875516778
-
-
Straub, D.W., Goodman, S.E., and Baskerville, R Information security: policy, processes, and practices M.E. Sharpe, 2008.
-
(2008)
Information Security: Policy, Processes, and Practices M.E. Sharpe
-
-
Straub, D.W.1
Goodman, S.E.2
Baskerville, R.3
-
17
-
-
0002699431
-
Discovering and Disciplining Computer Abuse in Organizaitons-A Field-Study
-
Mar
-
Straub, D.W., and Nance, W.D. "Discovering and Disciplining Computer Abuse in Organizaitons-A Field-Study," MIS Quarterly (14:1), Mar 1990, pp 45-60.
-
(1990)
MIS Quarterly
, vol.14
, Issue.1
, pp. 45-60
-
-
Straub, D.W.1
Nance, W.D.2
-
18
-
-
0344755343
-
Does electronic monitoring of employee Internet usage work?
-
Jan
-
Urbaczewski, A., and Jessup, L.M. "Does electronic monitoring of employee Internet usage work?," Communications of theACM (45:1), Jan 2002, pp 80-83.
-
(2002)
Communications of TheACM
, vol.45
, Issue.1
, pp. 80-83
-
-
Urbaczewski, A.1
Jessup, L.M.2
-
19
-
-
24644448811
-
Information Security Governance-Compliance management vs operational management
-
von Solms, S.H. "Information Security Governance-Compliance management vs operational management," Computers & Security (24:6) 2005, pp 443-447.
-
(2005)
Computers & Security
, vol.24
, Issue.6
, pp. 443-447
-
-
von Solms, S.H.1
|