-
1
-
-
67649708310
-
The information security digital divide between information security managers and users
-
Albrechtsen, E., and Hovden, J. 2009. "The Information Security Digital Divide Between Information Security Managers and Users," Computers & Security (28:6), pp. 476-490.
-
(2009)
Computers & Security
, vol.28
, Issue.6
, pp. 476-490
-
-
Albrechtsen, E.1
Hovden, J.2
-
2
-
-
77957077814
-
Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions
-
Anderson, C. L., and Agarwal, R. 2010. "Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions," MIS Quarterly (34:3), pp. 613-643.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 613-643
-
-
Anderson, C.L.1
Agarwal, R.2
-
3
-
-
0003574346
-
-
Boston, MA: Allyn & Bacon
-
Anderson, L. W., and Krathwohl, D. R. 2001. A Taxonomy for Learning, Teaching, and Assessing: A Revision of Bloom's Taxonomy of Educational Objectives, Boston, MA: Allyn & Bacon.
-
(2001)
A Taxonomy for Learning, Teaching, and Assessing: A Revision of Bloom's Taxonomy of Educational Objectives
-
-
Anderson, L.W.1
Krathwohl, D.R.2
-
4
-
-
44249110999
-
Establishing trust in electronic commerce through online word of mouth: An examination across genders
-
Awad, N. F., and Ragowsky, A. 2008. "Establishing Trust in Electronic Commerce Through Online Word of Mouth: An Examination Across Genders," Journal of Management Information Systems (24:4), pp. 101-121.
-
(2008)
Journal of Management Information Systems
, vol.24
, Issue.4
, pp. 101-121
-
-
Awad, N.F.1
Ragowsky, A.2
-
5
-
-
2642549662
-
Computer security and risky computing practices: A rational choice perspective
-
Aytes, K., and Connolly, T. 2004. "Computer Security and Risky Computing Practices: A Rational Choice Perspective," Journal of Organizational and End User Computing (16:3), pp. 22-40.
-
(2004)
Journal of Organizational and End User Computing
, vol.16
, Issue.3
, pp. 22-40
-
-
Aytes, K.1
Connolly, T.2
-
6
-
-
0001156375
-
Managing computer crime: A research outlook
-
Backhouse, J., and Dhillon, G. 1995. "Managing Computer Crime: A Research Outlook," Computers & Security (14:7), pp. 645-651.
-
(1995)
Computers & Security
, vol.14
, Issue.7
, pp. 645-651
-
-
Backhouse, J.1
Dhillon, G.2
-
7
-
-
22044451957
-
Diversity in information systems action research methods
-
Baskerville, R., and Wood-Harper, A. T. 1998. "Diversity in Information Systems Action Research Methods," European Journal of Information Systems (7:2), pp. 90-107.
-
(1998)
European Journal of Information Systems
, vol.7
, Issue.2
, pp. 90-107
-
-
Baskerville, R.1
Wood-Harper, A.T.2
-
8
-
-
0000293153
-
The effects of risk probability, outcome severity, efficacy of protection and access to protection on decision making: A further test of protection motivation theory
-
Beck, K. H. 1984. "The Effects of Risk Probability, Outcome Severity, Efficacy of Protection and Access to Protection on Decision Making: A Further Test of Protection Motivation Theory," Social Behavior and Personality (12:2), pp. 121-125.
-
(1984)
Social Behavior and Personality
, vol.12
, Issue.2
, pp. 121-125
-
-
Beck, K.H.1
-
9
-
-
84953086245
-
Information seeking among safety and health managers
-
Beck, K. H., and Feldman, R. H. 1983. "Information Seeking among Safety and Health managers," The Journal of Psychology (115:1), pp. 23-31.
-
(1983)
The Journal of Psychology
, vol.115
, Issue.1
, pp. 23-31
-
-
Beck, K.H.1
Feldman, R.H.2
-
10
-
-
67650100804
-
If someone is watching, i'll do what i'm asked: Mandatoriness, control, and information security
-
Boss, S. R., Kirsch, L. J., Angermeier, I., Shingler, R. A., and Boss, R. W. 2009. "If Someone Is Watching, I'll Do What I'm Asked: Mandatoriness, Control, and Information Security," European Journal of Information Systems (18:2), pp. 151-164.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 151-164
-
-
Boss, S.R.1
Kirsch, L.J.2
Angermeier, I.3
Shingler, R.A.4
Boss, R.W.5
-
11
-
-
70849104596
-
Effects of individual and organization based beliefs and the moderating role of work experience on insiders' good security behaviors
-
Vancouver, BC, Canada, August 29-31
-
Bulgurcu, B., Cavusoglu, H., and Benbasat, I. 2009. "Effects of Individual and Organization Based Beliefs and the Moderating Role of Work Experience on Insiders' Good Security Behaviors," in Proceedings of the IEEE International Conference on Computational Science and Engineering, Vancouver, BC, Canada, August 29-31, pp. 476-481.
-
(2009)
Proceedings of the IEEE International Conference on Computational Science and Engineering
, pp. 476-481
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
12
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
Bulgurcu, B., Cavusoglu, H., and Benbasat, I. 2010. "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness," MIS Quarterly (34:3), pp. 523-548.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
13
-
-
84937549955
-
The scree test for the number of factors
-
Cattell, R. B. 1966. "The Scree Test for the Number of Factors," Multivariate Behavioral Research (1:2), pp. 245-276.
-
(1966)
Multivariate Behavioral Research
, vol.1
, Issue.2
, pp. 245-276
-
-
Cattell, R.B.1
-
14
-
-
7444242205
-
The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers
-
Cavusoglu, H., Mishra, B., and Raghunathan, S. 2004. "The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers," International Journal of Electronic Commerce (9:1), pp. 70-104.
-
(2004)
International Journal of Electronic Commerce
, vol.9
, Issue.1
, pp. 70-104
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
15
-
-
3042724903
-
A paradigmatic and methodological examination of information systems research from 1991 to 2001
-
Chen, W., and Hirschheim, R. 2004. "A Paradigmatic and Methodological Examination of Information Systems Research from 1991 to 2001," Information Systems Journal (14:3), pp. 197-235.
-
(2004)
Information Systems Journal
, vol.14
, Issue.3
, pp. 197-235
-
-
Chen, W.1
Hirschheim, R.2
-
16
-
-
70349346926
-
Management of information security: Challenges and research directions
-
Choobineh, J., Dhillon, G., Grimaila, M. R., and Rees, J. 2007. "Management of Information Security: Challenges and Research Directions," Communications of the Association for Information Systems (20:1), pp. 958-971.
-
(2007)
Communications of the Association for Information Systems
, vol.20
, Issue.1
, pp. 958-971
-
-
Choobineh, J.1
Dhillon, G.2
Grimaila, M.R.3
Rees, J.4
-
17
-
-
21044443622
-
A visual framework for knowledge discovery on the web: An empirical study of business intelligence exploration
-
Chung, W., Chen, H., and Nunamaker Jr., J. F. 2005. "A Visual Framework for Knowledge Discovery on the Web: An Empirical Study of Business Intelligence Exploration," Journal of Management Information Systems (21:4), pp. 57-84.
-
(2005)
Journal of Management Information Systems
, vol.21
, Issue.4
, pp. 57-84
-
-
Chung, W.1
Chen, H.2
Nunamaker Jr., J.F.3
-
18
-
-
0001878819
-
A paradigm for developing better measures of marketing constructs
-
Churchill, G. A. 1979. "A Paradigm for Developing Better Measures of Marketing Constructs," Journal of Marketing Research (16:1), pp. 64-73.
-
(1979)
Journal of Marketing Research
, vol.16
, Issue.1
, pp. 64-73
-
-
Churchill, G.A.1
-
19
-
-
84887745629
-
-
unpublished Ph.D. Dissrtation, Accounting and Information Systems, Virginia Tech University, Blacksburg, VA
-
Crossler, R. E. 2009. Protection Motivation Theory: Understanding the Determinants of Individual Security Behavior, unpublished Ph.D. Dissrtation, Accounting and Information Systems, Virginia Tech University, Blacksburg, VA.
-
(2009)
Protection Motivation Theory: Understanding the Determinants of Individual Security Behavior
-
-
Crossler, R.E.1
-
21
-
-
34848873123
-
Deterring internal information systems misuse
-
D'Arcy, J., and Hovav, A. 2007. "Deterring Internal Information Systems Misuse," Communications of the ACM (50:10), pp. 113-117.
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 113-117
-
-
D'Arcy, J.1
Hovav, A.2
-
22
-
-
67649551429
-
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
-
D'Arcy, J., Hovav, A., and Galletta, D. 2009. "User Awareness of Security Countermeasures and its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research (20:1), pp. 79-98.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 79-98
-
-
D'Arcy, J.1
Hovav, A.2
Galletta, D.3
-
23
-
-
0035063716
-
Violation of safeguards by trusted personnel and understanding related information security concerns
-
Dhillon, G. 2001. "Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns," Computers & Security (20:2), pp. 165-172.
-
(2001)
Computers & Security
, vol.20
, Issue.2
, pp. 165-172
-
-
Dhillon, G.1
-
24
-
-
0002698747
-
Information system security management in the new millennium
-
Dhillon, G., and Backhouse, J. 2000. "Information System Security Management in the New Millennium," Communications of the ACM (43:7), pp. 125-128.
-
(2000)
Communications of the ACM
, vol.43
, Issue.7
, pp. 125-128
-
-
Dhillon, G.1
Backhouse, J.2
-
25
-
-
33744830087
-
Value-focused assessment of information system security in organizations
-
Dhillon, G., and Torkzadeh, G. 2006. "Value-Focused Assessment of Information System Security in Organizations," Information Systems Journal (16:3), pp. 293-314.
-
(2006)
Information Systems Journal
, vol.16
, Issue.3
, pp. 293-314
-
-
Dhillon, G.1
Torkzadeh, G.2
-
27
-
-
67650318762
-
User behavior towards protective information technologies: The role of national cultural differences
-
Dinev, T., Goo, J., Hu, Q., and Nam, K. 2009. "User Behavior Towards Protective Information Technologies: The Role of National Cultural Differences," Information Systems Journal (19:4), pp. 391-412.
-
(2009)
Information Systems Journal
, vol.19
, Issue.4
, pp. 391-412
-
-
Dinev, T.1
Goo, J.2
Hu, Q.3
Nam, K.4
-
28
-
-
49049114397
-
The centrality of awareness in the formation of user behavioral intention toward protective information technologies
-
Dinev, T., and Hu, Q. 2007. "The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies," Journal of the Association for Information Systems (8:1), pp. 386-408.
-
(2007)
Journal of the Association for Information Systems
, vol.8
, Issue.1
, pp. 386-408
-
-
Dinev, T.1
Hu, Q.2
-
29
-
-
21344483530
-
Typologies as a unique form of theory building: Toward improved understanding and modeling
-
Doty, D. H., and Glick, W. H. 1994. "Typologies as a Unique Form of Theory Building: Toward Improved Understanding and Modeling," Academy of Management Review (19:2), pp. 230-251.
-
(1994)
Academy of Management Review
, vol.19
, Issue.2
, pp. 230-251
-
-
Doty, D.H.1
Glick, W.H.2
-
30
-
-
0034899986
-
Knowledge management strategies: Toward a taxonomy
-
Earl, M. 2001. "Knowledge Management Strategies: Toward a Taxonomy," Journal of Management Information Systems (18:1), pp. 215-233.
-
(2001)
Journal of Management Information Systems
, vol.18
, Issue.1
, pp. 215-233
-
-
Earl, M.1
-
31
-
-
0030130222
-
Mapping the intellectual structure of research in decision support systems through author cocitation analysis (1971-1993)
-
Eom, S. B. 1996. "Mapping the Intellectual Structure of Research in Decision Support Systems through Author Cocitation Analysis (1971-1993)," Decision Support Systems (16:4), pp. 315-338.
-
(1996)
Decision Support Systems
, vol.16
, Issue.4
, pp. 315-338
-
-
Eom, S.B.1
-
32
-
-
84880196111
-
Behavioral information security
-
L. J. Janczewski and A. M. Colarik (eds.), Hershey, PA: Idea Group Inc
-
Fagnot, I. J. 2008. "Behavioral Information Security," in Encyclopedia of Cyber Warfare and Cyber Terrorism, L. J. Janczewski and A. M. Colarik (eds.), Hershey, PA: Idea Group Inc., pp. 199-205.
-
(2008)
Encyclopedia of Cyber Warfare and Cyber Terrorism
, pp. 199-205
-
-
Fagnot, I.J.1
-
33
-
-
0030307361
-
An empirically derived taxonomy of information technology structure and its relationship to organizational structure
-
Fiedler, K. D., Grover, V., and Teng, J. T. C. 1996. "An Empirically Derived Taxonomy of Information Technology Structure and its Relationship to Organizational Structure," Journal of Management Information Systems (13:1), pp. 9-34.
-
(1996)
Journal of Management Information Systems
, vol.13
, Issue.1
, pp. 9-34
-
-
Fiedler, K.D.1
Grover, V.2
Teng, J.T.C.3
-
34
-
-
0034397237
-
A meta- analysis of research on protection motivation theory
-
Floyd, D. L., Prentice-Dunn, S., and Rogers, R. W. 2000. "A Meta- Analysis of Research on Protection Motivation Theory," Journal of Applied Social Psychology (30:2), pp. 407-429.
-
(2000)
Journal of Applied Social Psychology
, vol.30
, Issue.2
, pp. 407-429
-
-
Floyd, D.L.1
Prentice-Dunn, S.2
Rogers, R.W.3
-
35
-
-
21844487262
-
Protection motivation theory and adherence to medical treatment regimens for muscular dystrophy
-
Flynn, M. F., Lyman, R. D., and Prentice-Dunn, S. 1995. "Protection Motivation Theory and Adherence to Medical Treatment Regimens for Muscular Dystrophy," Journal of Social and Clinical Psychology (14:1), pp. 61-75.
-
(1995)
Journal of Social and Clinical Psychology
, vol.14
, Issue.1
, pp. 61-75
-
-
Flynn, M.F.1
Lyman, R.D.2
Prentice-Dunn, S.3
-
36
-
-
70949101472
-
The negative aspects of social exchange: An introduction to perceived organizational obstruction
-
Gibney, R., Zagenczyk, T. J., and Masters, M. F. 2009. "The Negative Aspects of Social Exchange: An Introduction to Perceived Organizational Obstruction," Group & Organization Management (34:6), pp. 665-697.
-
(2009)
Group & Organization Management
, vol.34
, Issue.6
, pp. 665-697
-
-
Gibney, R.1
Zagenczyk, T.J.2
Masters, M.F.3
-
37
-
-
63849106909
-
Rethinking organisational size in is research: Meaning, measurement and redevelopment
-
Goode, S., and Gregor, S. 2009. "Rethinking Organisational Size in IS Research: Meaning, Measurement and Redevelopment," European Journal of Information Systems (18:1), pp. 4-25.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.1
, pp. 4-25
-
-
Goode, S.1
Gregor, S.2
-
39
-
-
33846102423
-
The nature of theory in information systems
-
Gregor, S. 2006. "The Nature of Theory in Information Systems," MIS Quarterly (30:3), pp. 611-642.
-
(2006)
MIS Quarterly
, vol.30
, Issue.3
, pp. 611-642
-
-
Gregor, S.1
-
40
-
-
0003610254
-
-
(7th ed.), Upper Saddle River, NJ: Pearson Education
-
Hair, J. F., Black, W. C., Babin, B. J., and Anderson, R. E. 2009. Multivariate Data Analysis (7th ed.), Upper Saddle River, NJ: Pearson Education.
-
(2009)
Multivariate Data Analysis
-
-
Hair, J.F.1
Black, W.C.2
Babin, B.J.3
Anderson, R.E.4
-
41
-
-
10644257873
-
Evaluating information assurance strategies
-
Hamill, J. T., Deckro, R. F., and Kloeber, J. M. 2005. "Evaluating Information Assurance Strategies," Decision Support Systems (39:3), pp. 463-484.
-
(2005)
Decision Support Systems
, vol.39
, Issue.3
, pp. 463-484
-
-
Hamill, J.T.1
Deckro, R.F.2
Kloeber, J.M.3
-
42
-
-
0000474891
-
General attitudes and organizational withdrawal: An evaluation of a causal model
-
Hanisch, K. A., and Hulin, C. L. 1991. "General Attitudes and Organizational Withdrawal: An Evaluation of a Causal Model," Journal of Vocational Behavior (39:1), pp. 110-128.
-
(1991)
Journal of Vocational Behavior
, vol.39
, Issue.1
, pp. 110-128
-
-
Hanisch, K.A.1
Hulin, C.L.2
-
43
-
-
0032148410
-
The importance of individuals' repertoires of behaviors: The scientific appropriateness of studying multiple behaviors and general attitudes
-
Hanisch, K. A., Hulin, C. L., and Roznowski, M. 1998. "The Importance of Individuals' Repertoires of Behaviors: The Scientific Appropriateness of Studying Multiple Behaviors and General Attitudes," Journal of Organizational Behavior (19:5), pp. 463-480.
-
(1998)
Journal of Organizational Behavior
, vol.19
, Issue.5
, pp. 463-480
-
-
Hanisch, K.A.1
Hulin, C.L.2
Roznowski, M.3
-
44
-
-
67349144062
-
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
-
Herath, T., and Rao, H. R. 2009a. "Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness," Decision Support Systems (47:2), pp. 154-165.
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 154-165
-
-
Herath, T.1
Rao, H.R.2
-
45
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
Herath, T., and Rao, H. R. 2009b. "Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations," European Journal of Information Systems (28:2), pp. 106-125.
-
(2009)
European Journal of Information Systems
, vol.28
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
46
-
-
0040157746
-
A multidirectional approach toward leadership: An extension of the concept of behavioral complexity
-
Hooijberg, R. 1996. "A Multidirectional Approach Toward Leadership: An Extension of the Concept of Behavioral Complexity," Human Relations (49:7), pp. 917-946.
-
(1996)
Human Relations
, vol.49
, Issue.7
, pp. 917-946
-
-
Hooijberg, R.1
-
47
-
-
79959944364
-
Does deterrence work in reducing information security policy abuse by employees?
-
Hu, Q., Xu, Z., Dinev, T., and Ling, H. 2011. "Does Deterrence Work in Reducing Information Security Policy Abuse by Employees?," Communications of the ACM (54:6), pp. 54-60.
-
(2011)
Communications of the ACM
, vol.54
, Issue.6
, pp. 54-60
-
-
Hu, Q.1
Xu, Z.2
Dinev, T.3
Ling, H.4
-
48
-
-
33750442910
-
Expertise visualization: An implementation and study based on cognitive fit theory
-
Huang, Z., Chen, H., Guo, F., Xu, J. J., Wu, S., and Chen, W. H. 2006. "Expertise Visualization: An Implementation and Study Based on Cognitive Fit Theory," Decision Support Systems (42:3), pp. 1539-1557.
-
(2006)
Decision Support Systems
, vol.42
, Issue.3
, pp. 1539-1557
-
-
Huang, Z.1
Chen, H.2
Guo, F.3
Xu, J.J.4
Wu, S.5
Chen, W.H.6
-
49
-
-
33751161222
-
A longitudinal study of information system threat categories: The enduring problem of human error
-
Im, G. P., and Baskerville, R. L. 2005. "A Longitudinal Study of Information System Threat Categories: The Enduring Problem of Human Error," The DATA BASE for Advances in Information Systems (36:4), pp. 68-79.
-
(2005)
The DATA BASE for Advances in Information Systems
, vol.36
, Issue.4
, pp. 68-79
-
-
Im, G.P.1
Baskerville, R.L.2
-
50
-
-
84887648358
-
-
ITRC. Identity Theft Resource Center, San Diego, CA
-
ITRC. 2012. "2012 ITRC Breach Reports," Identity Theft Resource Center, San Diego, CA.
-
(2012)
2012 ITRC Breach Reports
-
-
-
51
-
-
77957057727
-
Fear appeals and information security behaviors: An empirical study
-
Johnston, A. C., and Warkentin, M. E. 2010. "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly (34:2), pp. 549-566.
-
(2010)
MIS Quarterly
, vol.34
, Issue.2
, pp. 549-566
-
-
Johnston, A.C.1
Warkentin, M.E.2
-
52
-
-
54449093990
-
Personality traits and concern for privacy: An empirical study in the context of location-based services
-
Junglas, I. A., Johnson, N. A., and Spitzmuller, C. 2008. "Personality Traits and Concern for Privacy: An Empirical Study in the Context of Location-Based Services," European Journal of Information Systems (17:4), pp. 387-402.
-
(2008)
European Journal of Information Systems
, vol.17
, Issue.4
, pp. 387-402
-
-
Junglas, I.A.1
Johnson, N.A.2
Spitzmuller, C.3
-
54
-
-
1242263532
-
Why there aren't more information security research studies
-
Kotulic, A. G., and Clark, J. G. 2004. "Why There Aren't More Information Security Research Studies," Information & Management (41:5), pp. 597-607.
-
(2004)
Information & Management
, vol.41
, Issue.5
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, J.G.2
-
55
-
-
84887717353
-
2011 kroll global fraud report
-
Kroll Advisory Solutions, Kroll Advisory Solutions, New York, NY
-
Kroll Advisory Solutions. 2011. "2011 Kroll Global Fraud Report," in Fraud, Forensics & Compliance, Kroll Advisory Solutions, New York, NY.
-
(2011)
Fraud, Forensics & Compliance
-
-
-
56
-
-
0003139452
-
The relationship between multidimensional scaling and clustering
-
J. V. Ryzin (ed.), New York: Academic Press
-
Kruskal, J. B. 1977. "The Relationship Between Multidimensional Scaling and Clustering," in Classification and Clustering, J. V. Ryzin (ed.), New York: Academic Press, pp. 17-44.
-
(1977)
Classification and Clustering
, pp. 17-44
-
-
Kruskal, J.B.1
-
58
-
-
0041371655
-
Understanding qualitative data: A framework of text analysis methods
-
Lacity, M. C., and Janson, M. A. 1994. "Understanding Qualitative Data: A Framework of Text Analysis Methods," Journal of Management Information Systems (11:2), pp. 137-155.
-
(1994)
Journal of Management Information Systems
, vol.11
, Issue.2
, pp. 137-155
-
-
Lacity, M.C.1
Janson, M.A.2
-
59
-
-
38249015662
-
A disciplined methodological pluralism for mis research
-
Landry, M., and Banville, C. 1992. "A Disciplined Methodological Pluralism for MIS Research," Accounting, Management and Information Technologies (2:2), pp. 77-97.
-
(1992)
Accounting, Management and Information Technologies
, vol.2
, Issue.2
, pp. 77-97
-
-
Landry, M.1
Banville, C.2
-
60
-
-
0242573536
-
A taxonomy of antecedents of information systems success: Variable analysis studies
-
Larsen, K. R. T. 2003. "A Taxonomy of Antecedents of Information Systems Success: Variable Analysis Studies," Journal of Management Information Systems (20:2), pp. 169-246.
-
(2003)
Journal of Management Information Systems
, vol.20
, Issue.2
, pp. 169-246
-
-
Larsen, K.R.T.1
-
61
-
-
0141860786
-
Generalizing generalizability in information systems research
-
Lee, A. S., and Baskerville, R. L. 2003. "Generalizing Generalizability in Information Systems Research," Information Systems Research (14:3), pp. 221-243.
-
(2003)
Information Systems Research
, vol.14
, Issue.3
, pp. 221-243
-
-
Lee, A.S.1
Baskerville, R.L.2
-
62
-
-
40049109336
-
An empirical investigation of anti-spyware software adoption: A multitheoretical perspective
-
Lee, Y., and Kozar, K. A. 2008. "An Empirical Investigation of Anti-Spyware Software Adoption: A Multitheoretical Perspective," Information & Management (45:2), pp. 109-119.
-
(2008)
Information & Management
, vol.45
, Issue.2
, pp. 109-119
-
-
Lee, Y.1
Kozar, K.A.2
-
63
-
-
67650166189
-
Threat or coping appraisal: Determinants of smb executives' decision to adopt anti- malware software
-
Lee, Y., and Larsen, K. R. 2009. "Threat or Coping Appraisal: Determinants of SMB Executives' Decision to Adopt Anti- Malware Software," European Journal of Information Systems (18:2), pp. 177-187.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 177-187
-
-
Lee, Y.1
Larsen, K.R.2
-
64
-
-
60649084770
-
Avoidance of information technology threats: A theoretical perspective
-
Liang, H., and Xue, Y. 2009. "Avoidance of Information Technology Threats: A Theoretical Perspective," MIS Quarterly (33:1), pp. 71-90.
-
(2009)
MIS Quarterly
, vol.33
, Issue.1
, pp. 71-90
-
-
Liang, H.1
Xue, Y.2
-
66
-
-
0032378420
-
Some possible antecedents and consequences of in-role and extra- role salesperson performance
-
MacKenzie, S. B., Podsakoff, P. M., and Ahearne, M. 1998. "Some Possible Antecedents and Consequences of In-Role and Extra- Role Salesperson Performance," Journal of Marketing (62:3), pp. 87-98.
-
(1998)
Journal of Marketing
, vol.62
, Issue.3
, pp. 87-98
-
-
Mackenzie, S.B.1
Podsakoff, P.M.2
Ahearne, M.3
-
67
-
-
0000149877
-
A program for research on management information systems
-
Mason, R. O., and Mitroff, I. I. 1973. "A Program for Research on Management Information Systems," Management Science (19:5), pp. 475-487.
-
(1973)
Management Science
, vol.19
, Issue.5
, pp. 475-487
-
-
Mason, R.O.1
Mitroff, I.I.2
-
68
-
-
77949491745
-
Types of business-to-business e-marketplaces: The role of a theory-based, domain-specific model
-
Matook, S., and Vessey, I. 2008. "Types of Business-to-Business E-Marketplaces: The Role of a Theory-Based, Domain-Specific Model," Journal of Electronic Commerce Research (9:4), pp. 260-279.
-
(2008)
Journal of Electronic Commerce Research
, vol.9
, Issue.4
, pp. 260-279
-
-
Matook, S.1
Vessey, I.2
-
70
-
-
0011629953
-
Organizational systematics: Taxonomic lessons from biology
-
McKelvey, B. 1978. "Organizational Systematics: Taxonomic Lessons from Biology," Management Science (24:13), pp. 1428-1440.
-
(1978)
Management Science
, vol.24
, Issue.13
, pp. 1428-1440
-
-
McKelvey, B.1
-
72
-
-
77957076927
-
Information about information: A taxonomy of views
-
McKinney, E., and Yoos, C. 2010. "Information About Information: A Taxonomy of Views," MIS Quarterly (34:2), pp. 329-344.
-
(2010)
MIS Quarterly
, vol.34
, Issue.2
, pp. 329-344
-
-
McKinney, E.1
Yoos, C.2
-
73
-
-
21844506930
-
The role of dispositional and situational antecedents in prosocial organizational behavior: An examination of the intended beneficiaries of prosocial behavior
-
McNeely, B. L., and Meglino, B. M. 1994. "The Role of Dispositional and Situational Antecedents in Prosocial Organizational Behavior: An Examination of the Intended Beneficiaries of Prosocial Behavior," Journal of Applied Psychology (79:6), pp. 836-844.
-
(1994)
Journal of Applied Psychology
, vol.79
, Issue.6
, pp. 836-844
-
-
McNeely, B.L.1
Meglino, B.M.2
-
74
-
-
0033327579
-
Multidimensional scaling for group memory visualization
-
McQuaid, M. J., Ong, T. H., Chen, H., and Nunamaker Jr., J. F. 1999. "Multidimensional Scaling for Group Memory Visualization," Decision Support Systems (27:1-2), pp. 163-176.
-
(1999)
Decision Support Systems
, vol.27
, Issue.1-2
, pp. 163-176
-
-
McQuaid, M.J.1
Ong, T.H.2
Chen, H.3
Nunamaker Jr., J.F.4
-
77
-
-
0033622371
-
Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory
-
Milne, S., Sheeran, P., and Orbell, S. 2000. "Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory," Journal of Applied Social Psychology (30:1), pp. 106-143.
-
(2000)
Journal of Applied Social Psychology
, vol.30
, Issue.1
, pp. 106-143
-
-
Milne, S.1
Sheeran, P.2
Orbell, S.3
-
78
-
-
0035599029
-
Combining is research methods: Towards a pluralist methodology
-
Mingers, J. 2001. "Combining IS Research Methods: Towards a Pluralist Methodology," Information Systems Research (12:3), pp. 240-259.
-
(2001)
Information Systems Research
, vol.12
, Issue.3
, pp. 240-259
-
-
Mingers, J.1
-
79
-
-
79960583168
-
-
CMU/SEI-2008-TR-009, Software Engineering Institute: Carnegie Mellon University, Pittsburgh, PA
-
Moore, A. P., Cappelli, D. M., and Trzeciak, R. F. 2008. "The 'Big Picture' of Insider IT Sabotage across U.S. Critical Infrastructures," CMU/SEI-2008-TR-009, Software Engineering Institute: Carnegie Mellon University, Pittsburgh, PA.
-
(2008)
The 'Big Picture' of Insider IT Sabotage Across U.S. Critical Infrastructures
-
-
Moore, A.P.1
Cappelli, D.M.2
Trzeciak, R.F.3
-
80
-
-
0010100431
-
Role definitions and organizational citizenship behavior: The importance of the employee's perspective
-
Morrison, E. W. 1994. "Role Definitions and Organizational Citizenship Behavior: The Importance of the Employee's Perspective," Academy of Management Journal (37:6), pp. 1543-1567.
-
(1994)
Academy of Management Journal
, vol.37
, Issue.6
, pp. 1543-1567
-
-
Morrison, E.W.1
-
81
-
-
33846313618
-
The qualitative interview in is research: Examining the craft
-
Myers, M. D., and Newman, M. 2007. "The Qualitative Interview in IS Research: Examining the Craft," Information and Organization (17:1), pp. 2-26.
-
(2007)
Information and Organization
, vol.17
, Issue.1
, pp. 2-26
-
-
Myers, M.D.1
Newman, M.2
-
82
-
-
67650143327
-
What levels of moral reasoning and values explain adherence to information security rules? An empirical study
-
Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., and Vance, A. 2009. "What Levels of Moral Reasoning and Values Explain Adherence to Information Security Rules? An Empirical Study," European Journal of Information Systems (18:2), pp. 126-139.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 126-139
-
-
Myyry, L.1
Siponen, M.2
Pahnila, S.3
Vartiainen, T.4
Vance, A.5
-
83
-
-
21144477183
-
Explaining the whistle-blowing process: Suggestions from power theory and justice theory
-
Near, J. P., Dworkin, T. M., and Miceli, J. P. 1993. "Explaining the Whistle-Blowing Process: Suggestions from Power Theory and Justice Theory," Organization Science (4:3), pp. 393-411.
-
(1993)
Organization Science
, vol.4
, Issue.3
, pp. 393-411
-
-
Near, J.P.1
Dworkin, T.M.2
Miceli, J.P.3
-
84
-
-
61349092288
-
Studying users' computer security behavior: A health belief perspective
-
Ng, B. Y., Kankanhalli, A., and Xu, Y. 2009. "Studying Users' Computer Security Behavior: A Health Belief Perspective," Decision Support Systems (46:4), pp. 815-825.
-
(2009)
Decision Support Systems
, vol.46
, Issue.4
, pp. 815-825
-
-
Ng, B.Y.1
Kankanhalli, A.2
Xu, Y.3
-
86
-
-
84949774852
-
-
Thousand Oaks, CA: Sage Publications
-
Organ, D. W., Podsakoff, P. M., and MacKenzie, S. B. 2006. Organizational Citizenship Behaviors: Its Nature, Antecedents, and Consequences, Thousand Oaks, CA: Sage Publications.
-
(2006)
Organizational Citizenship Behaviors: Its Nature, Antecedents, and Consequences
-
-
Organ, D.W.1
Podsakoff, P.M.2
Mackenzie, S.B.3
-
87
-
-
71549126429
-
Studying information technology in organizations: Research approaches and assumptions
-
Orlikowski, W. J., and Baroudi, J. J. 1991. "Studying Information Technology in Organizations: Research Approaches and Assumptions," Information Systems Research (2:1), pp. 1-28.
-
(1991)
Information Systems Research
, vol.2
, Issue.1
, pp. 1-28
-
-
Orlikowski, W.J.1
Baroudi, J.J.2
-
88
-
-
33748811786
-
Ethical standards for information systems professionals: A case for a unified code
-
Oz, E. 1992. "Ethical Standards for Information Systems Professionals: A Case for a Unified Code," MIS Quarterly (16:4), pp. 423-433.
-
(1992)
MIS Quarterly
, vol.16
, Issue.4
, pp. 423-433
-
-
Oz, E.1
-
89
-
-
36349016612
-
Differentiation via technology: Strategic positioning of services following the introduction of disruptive technology
-
Padgett, D., and Mulvey, M.S. 2007. "Differentiation via Technology: Strategic Positioning of Services Following the Introduction of Disruptive Technology," Journal of Retailing (83:4), pp. 375-391.
-
(2007)
Journal of Retailing
, vol.83
, Issue.4
, pp. 375-391
-
-
Padgett, D.1
Mulvey, M.S.2
-
90
-
-
0003535875
-
-
Hillsdale, NJ: Lawrence Erlbaum Associates
-
Pedhazur, E. J., and Schmelkin, L. P. 1991. Measurement, Design, and Analysis: An Integrated Approach, Hillsdale, NJ: Lawrence Erlbaum Associates.
-
(1991)
Measurement, Design, and Analysis: An Integrated Approach
-
-
Pedhazur, E.J.1
Schmelkin, L.P.2
-
91
-
-
84887767879
-
Deltek: Cybersecurity spending should grow
-
December 11
-
Peterson, D. 2011. "Deltek: Cybersecurity Spending Should Grow," Washington Post, Business Section, December 11.
-
(2011)
Washington Post, Business Section
-
-
Peterson, D.1
-
92
-
-
77952042701
-
The online community self-disclosure model: The case of working professionals in france and the uk who use online communities
-
Posey, C., Lowry, P. B., Roberts, T. L., and Ellis, T. S. 2010. "The Online Community Self-Disclosure Model: The Case of Working Professionals in France and the UK Who Use Online Communities," European Journal of Information Systems (19:2), pp. 181-195.
-
(2010)
European Journal of Information Systems
, vol.19
, Issue.2
, pp. 181-195
-
-
Posey, C.1
Lowry, P.B.2
Roberts, T.L.3
Ellis, T.S.4
-
93
-
-
84887807314
-
Operations security
-
H. F. Tipton and K. Henry (eds.), Boca Raton, FL: Auerbach
-
Price, S. M. 2007. "Operations Security," in Official (ISC)2 Guide to the CISSP CBK, H. F. Tipton and K. Henry (eds.), Boca Raton, FL: Auerbach, pp. 633-681.
-
(2007)
Official (ISC)2 Guide to the CISSP CBK
, pp. 633-681
-
-
Price, S.M.1
-
94
-
-
0036899071
-
Executives' perceptions of uncertainty sources: A numerical taxonomy and underlying dimensions
-
Priem, R. L., Love, L. G., and Shaffer, M. A. 2002. "Executives' Perceptions of Uncertainty Sources: A Numerical Taxonomy and Underlying Dimensions," Journal of Management (28:6), pp. 725-746.
-
(2002)
Journal of Management
, vol.28
, Issue.6
, pp. 725-746
-
-
Priem, R.L.1
Love, L.G.2
Shaffer, M.A.3
-
96
-
-
84925891222
-
An introduction to nonmetric multidimensional scaling
-
Rabinowitz, G. B. 1975. "An Introduction to Nonmetric Multidimensional Scaling," American Journal of Political Science (19:2), pp. 343-390.
-
(1975)
American Journal of Political Science
, vol.19
, Issue.2
, pp. 343-390
-
-
Rabinowitz, G.B.1
-
97
-
-
61349185822
-
Antecedents and outcomes of retaliation against whistleblowers: Gender differences and power relationships
-
Rehg, M. T., Miceli, M. P., Near, J. P., and Scotter, J. R. V. 2008. "Antecedents and Outcomes of Retaliation Against Whistleblowers: Gender Differences and Power Relationships," Organization Science (19:2), pp. 221-240.
-
(2008)
Organization Science
, vol.19
, Issue.2
, pp. 221-240
-
-
Rehg, M.T.1
Miceli, M.P.2
Near, J.P.3
Scotter, J.R.V.4
-
98
-
-
0003194268
-
Relating electronic mail use and network structure to r&d work networks and performance
-
Rice, R. E. 1994. "Relating Electronic Mail Use and Network Structure to R&D Work Networks and Performance," Journal of Management Information Systems (11:1), pp. 9-29.
-
(1994)
Journal of Management Information Systems
, vol.11
, Issue.1
, pp. 9-29
-
-
Rice, R.E.1
-
99
-
-
21844526560
-
A typology of deviant workplace behaviors: A multidimensional scaling study
-
Robinson, S. L., and Bennett, R. J. 1995. "A Typology of Deviant Workplace Behaviors: A Multidimensional Scaling Study," Academy of Management Journal (38:2), pp. 555-572.
-
(1995)
Academy of Management Journal
, vol.38
, Issue.2
, pp. 555-572
-
-
Robinson, S.L.1
Bennett, R.J.2
-
100
-
-
0001840352
-
A protection motivation theory of fear appeals and attitude change
-
Rogers, R. W. 1975. "A Protection Motivation Theory of Fear Appeals and Attitude Change," The Journal of Psychology (91:1), pp. 93-114.
-
(1975)
The Journal of Psychology
, vol.91
, Issue.1
, pp. 93-114
-
-
Rogers, R.W.1
-
101
-
-
0002247369
-
Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation
-
J. T. Cacioppo and R. E. Petty (eds.), New York: Guilford
-
Rogers, R. W. 1983. "Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation," in Social Psychophysiology: A Sourcebook, J. T. Cacioppo and R. E. Petty (eds.), New York: Guilford, pp. 153-176.
-
(1983)
Social Psychophysiology: A Sourcebook
, pp. 153-176
-
-
Rogers, R.W.1
-
102
-
-
0001045799
-
Protection motivation theory
-
D. S. Gochman (ed.), New York: Plenum Press
-
Rogers, R. W., and Prentice-Dunn, S. 1997. "Protection Motivation Theory," in Handbook of Health Behavior Research I: Personal and Social Determinants, D. S. Gochman (ed.), New York: Plenum Press, pp. 113-132.
-
(1997)
Handbook of Health Behavior Research I: Personal and Social Determinants
, pp. 113-132
-
-
Rogers, R.W.1
Prentice-Dunn, S.2
-
106
-
-
0003474550
-
-
New York: Academic Press
-
Schiffman, S. S., Reynolds, M. L., and Young, F. W. 1981. Introduction to Multidimensional Scaling: Theory, Methods, and Applications, New York: Academic Press.
-
(1981)
Introduction to Multidimensional Scaling: Theory, Methods, and Applications
-
-
Schiffman, S.S.1
Reynolds, M.L.2
Young, F.W.3
-
108
-
-
75349114163
-
Using social marketing to enhance hotel reuse programs
-
Shang, J., Basil, D. Z., and Wymer, W. 2010. "Using Social Marketing to Enhance Hotel Reuse Programs," Journal of Business Research (63:2), pp. 166-172.
-
(2010)
Journal of Business Research
, vol.63
, Issue.2
, pp. 166-172
-
-
Shang, J.1
Basil, D.Z.2
Wymer, W.3
-
109
-
-
0010886652
-
The insider threat to information systems: The psychology of the dangerous insider
-
Shaw, E., Ruby, K. G., and Post, J. M. 1998. "The Insider Threat to Information Systems: The Psychology of the Dangerous Insider," Security Awareness Bulletin (2-98), pp. 1-10.
-
(1998)
Security Awareness Bulletin
, vol.2
, Issue.98
, pp. 1-10
-
-
Shaw, E.1
Ruby, K.G.2
Post, J.M.3
-
110
-
-
77956755581
-
Changes in taxonomy and nomenclature of important genera of plant pathogens
-
Shoemaker, R. A. 1981. "Changes in Taxonomy and Nomenclature of Important Genera of Plant Pathogens," Annual Review of Phytopathology (19:1), pp. 297-307.
-
(1981)
Annual Review of Phytopathology
, vol.19
, Issue.1
, pp. 297-307
-
-
Shoemaker, R.A.1
-
112
-
-
36248967046
-
Employees' adherence to information security policies: An empirical study
-
H. Venter, M. Eloff, L. Labuschagne, J. Eloff and R. von Solms (eds.), Boston: Springer
-
Siponen, M., Pahnila, S., and Mahmood, A. 2007. "Employees' Adherence to Information Security Policies: An Empirical Study," in New Approaches for Security, Privacy and Trust in Complex Environments, H. Venter, M. Eloff, L. Labuschagne, J. Eloff and R. von Solms (eds.), Boston: Springer, pp. 133-144.
-
(2007)
New Approaches for Security, Privacy and Trust in Complex Environments
, pp. 133-144
-
-
Siponen, M.1
Pahnila, S.2
Mahmood, A.3
-
113
-
-
77957068563
-
Neutralization: New insights into the problem of employee information systems security policy violations
-
Siponen, M., and Vance, A. 2010. "Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations," MIS Quarterly (34:3), pp. 487-502.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 487-502
-
-
Siponen, M.1
Vance, A.2
-
114
-
-
0013294343
-
Revolution or evolution? A comparison of object-oriented and structured systems development methods
-
Sircar, S., Nerur, S. P., and Mahapatra, R. 2001. "Revolution or Evolution? A Comparison of Object-Oriented and Structured Systems Development Methods," MIS Quarterly (25:4), pp. 457-471.
-
(2001)
MIS Quarterly
, vol.25
, Issue.4
, pp. 457-471
-
-
Sircar, S.1
Nerur, S.P.2
Mahapatra, R.3
-
115
-
-
50249151484
-
Internet users' information privacy-protective responses: A taxonomy and a nomological model
-
Son, J. Y., and Kim, S. S. 2008. "Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model," MIS Quarterly (32:3), pp. 503-529.
-
(2008)
MIS Quarterly
, vol.32
, Issue.3
, pp. 503-529
-
-
Son, J.Y.1
Kim, S.S.2
-
116
-
-
77957070672
-
User participation in is security risk management
-
Spears, J. L., and Barki, H. 2010. "User Participation in IS Security Risk Management," MIS Quarterly (34:3), pp. 503-522.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 503-522
-
-
Spears, J.L.1
Barki, H.2
-
117
-
-
80051785246
-
-
Medford, NJ: Information Today, Inc
-
Stanton, J. M., and Stam, K. R. 2006. The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust, Medford, NJ: Information Today, Inc.
-
(2006)
The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust
-
-
Stanton, J.M.1
Stam, K.R.2
-
118
-
-
17844366573
-
Analysis of end user security behaviors
-
Stanton, J. M., Stam, K. R., Mastrangelo, P., and Jolton, J. A. 2005. "Analysis of End User Security Behaviors," Computers & Security (24:2), pp. 124-133.
-
(2005)
Computers & Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.A.4
-
119
-
-
85139599019
-
Behavioral information security: An overview, results, and research agenda
-
P. Zhang and D. F. Galletta (eds.), Armonk, NY: M. E. Sharpe
-
Stanton, J. M., Stam, K. R., Mastrangelo, P. M., and Jolton, J. A. 2006. "Behavioral Information Security: An Overview, Results, and Research Agenda," in Human-Computer Interaction and Management Information Systems: Foundations, P. Zhang and D. F. Galletta (eds.), Armonk, NY: M. E. Sharpe, pp. 262-280.
-
(2006)
Human-Computer Interaction and Management Information Systems: Foundations
, pp. 262-280
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.M.3
Jolton, J.A.4
-
120
-
-
0000280419
-
Effective is security
-
Straub, D. W. 1990. "Effective IS Security," Information Systems Research (1:3), pp. 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
121
-
-
13244286108
-
Validation guidelines for is positivist research
-
Straub, D. W., Boudreau, M. C., and Gefen, D. 2004. "Validation Guidelines for IS Positivist Research," Communications of the Association for Information Systems (13:1), pp. 380-427.
-
(2004)
Communications of the Association for Information Systems
, vol.13
, Issue.1
, pp. 380-427
-
-
Straub, D.W.1
Boudreau, M.C.2
Gefen, D.3
-
122
-
-
53349102510
-
Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy
-
Straub, D. W., and Collins, R. W. 1990. "Key Information Liability Issues Facing Managers: Software Piracy, Proprietary Databases, and Individual Rights to Privacy," MIS Quarterly (14:2), pp. 143-156.
-
(1990)
MIS Quarterly
, vol.14
, Issue.2
, pp. 143-156
-
-
Straub, D.W.1
Collins, R.W.2
-
123
-
-
0037707050
-
The repertory grid technique: A method for the study of cognition in information systems
-
Tan, F. B., and Hunter, M. G. 2002. "The Repertory Grid Technique: A Method for the Study of Cognition in Information Systems," MIS Quarterly (26:1), pp. 39-57.
-
(2002)
MIS Quarterly
, vol.26
, Issue.1
, pp. 39-57
-
-
Tan, F.B.1
Hunter, M.G.2
-
124
-
-
84887798288
-
Cluster analysis and multidimensional scaling
-
N. H. Timm (ed.), New York: Springer
-
Timm, N. H. 2002. "Cluster Analysis and Multidimensional Scaling," in Applied Multivariate Analysis, N. H. Timm (ed.), New York: Springer, pp. 515-555.
-
(2002)
Applied Multivariate Analysis
, pp. 515-555
-
-
Timm, N.H.1
-
125
-
-
66149124650
-
Content validity of instruments in is research
-
Tojib, D. R., and Sugianto, L. 2006. "Content Validity of Instruments in IS Research," Journal of Information Technology Theory and Application (8:3), pp. 31-56.
-
(2006)
Journal of Information Technology Theory and Application
, vol.8
, Issue.3
, pp. 31-56
-
-
Tojib, D.R.1
Sugianto, L.2
-
126
-
-
0344641263
-
General organizational classification: An empirical test using the united states and japanese electronics industries
-
Ulrich, D., and McKelvey, B. 1990. "General Organizational Classification: An Empirical Test Using the United States and Japanese Electronics Industries," Organization Science (1:1), pp. 99-118.
-
(1990)
Organization Science
, vol.1
, Issue.1
, pp. 99-118
-
-
Ulrich, D.1
McKelvey, B.2
-
127
-
-
9744222169
-
Extra- role behaviors: In pursuit of construct and definitional clarity (a bridge over muddied waters)
-
L. L. Cummings and B. M. Staw (eds.), Greenwich, CT: JAI Press
-
Van Dyne, L., Cummings, L. L., and Parks, J. M. 1995. "Extra- Role Behaviors: In Pursuit of Construct and Definitional Clarity (A Bridge Over Muddied Waters)," in Research in Organizational Behavior (Volume 17), L. L. Cummings and B. M. Staw (eds.), Greenwich, CT: JAI Press, pp. 215-285.
-
(1995)
Research in Organizational Behavior
, vol.17
, pp. 215-285
-
-
Van Dyne, L.1
Cummings, L.L.2
Parks, J.M.3
-
128
-
-
77951209282
-
Information security culture: A management perspective
-
Van Niekerk, J. F., and von Solms, R. 2010. "Information Security Culture: A Management Perspective " Computers & Security (29:4), pp. 476-486.
-
(2010)
Computers & Security
, vol.29
, Issue.4
, pp. 476-486
-
-
Van Niekerk, J.F.1
Von Solms, R.2
-
129
-
-
84887741949
-
Veriphyr survey finds more than 70 percent of healthcare providers suffered privacy breach in past 12 months
-
Veriphyr, August 31, Veriphyr, Los Altos, CA
-
Veriphyr. 2011. "Veriphyr Survey Finds More than 70 Percent of Healthcare Providers Suffered Privacy Breach in Past 12 Months," Press Release, August 31, Veriphyr, Los Altos, CA.
-
(2011)
Press Release
-
-
-
130
-
-
2342475711
-
Towards information security behavioural compliance
-
Vroom, C., and von Solms, R. 2004. "Towards Information Security Behavioural Compliance," Computers & Security (23:3), pp. 191-198.
-
(2004)
Computers & Security
, vol.23
, Issue.3
, pp. 191-198
-
-
Vroom, C.1
Von Solms, R.2
-
131
-
-
0029749803
-
Ethical theory, codes of ethics and is practice
-
Walsham, G. 1996. "Ethical Theory, Codes of Ethics and IS Practice," Information Systems Journal (6:1), pp. 69-81.
-
(1996)
Information Systems Journal
, vol.6
, Issue.1
, pp. 69-81
-
-
Walsham, G.1
-
132
-
-
67650170305
-
Behavioral and policy issues in information systems security: The insider threat
-
Warkentin, M., and Willison, R. 2009. "Behavioral and Policy Issues in Information Systems Security: The Insider Threat," European Journal of Information Systems (18:2), pp. 101-105.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 101-105
-
-
Warkentin, M.1
Willison, R.2
-
133
-
-
4243198165
-
Enemy at the gate: Threats to information security
-
Whitman, M. E. 2003. "Enemy at the Gate: Threats to Information Security," Communications of the ACM (46:8), pp. 91-95.
-
(2003)
Communications of the ACM
, vol.46
, Issue.8
, pp. 91-95
-
-
Whitman, M.E.1
-
134
-
-
70149119150
-
Overcoming the insider: Reducing employee computer crime through situational crime prevention
-
Willison, R., and Siponen, M. 2009. "Overcoming the Insider: Reducing Employee Computer Crime through Situational Crime Prevention," Communications of the ACM (52:9), pp. 133-137.
-
(2009)
Communications of the ACM
, vol.52
, Issue.9
, pp. 133-137
-
-
Willison, R.1
Siponen, M.2
-
135
-
-
84869780575
-
A protection motivation theory approach to home wireless security
-
Las Vegas, NV, December 11-14
-
Woon, I. M. Y., Low, R. T., and Tan, G. W. 2005. "A Protection Motivation Theory Approach to Home Wireless Security," in Proceedings of the 26th International Conference on Information Systems, Las Vegas, NV, December 11-14, pp. 367-380.
-
(2005)
Proceedings of the 26th International Conference on Information Systems
, pp. 367-380
-
-
Woon, I.M.Y.1
Low, R.T.2
Tan, G.W.3
-
136
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
Workman, M., Bommer, W. H., and Straub, D. W. 2008. "Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test," Computers in Human Behavior (24:6), pp. 2799-2816.
-
(2008)
Computers in Human Behavior
, vol.24
, Issue.6
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.H.2
Straub, D.W.3
-
137
-
-
0011467689
-
Eliciting and modelling expert knowledge
-
Wright, G., and Ayton, P. 1987. "Eliciting and Modelling Expert Knowledge," Decision Support Systems (3:1), pp. 13-26.
-
(1987)
Decision Support Systems
, vol.3
, Issue.1
, pp. 13-26
-
-
Wright, G.1
Ayton, P.2
-
138
-
-
77954212699
-
Wearing many hats: Supply managers' behavioral complexity and its impact on supplier relationships
-
Wu, Z., Steward, M., and Hartley, J. 2010. "Wearing Many Hats: Supply Managers' Behavioral Complexity and its Impact on Supplier Relationships," Journal of Business Research (63:8), pp. 817-823.
-
(2010)
Journal of Business Research
, vol.63
, Issue.8
, pp. 817-823
-
-
Wu, Z.1
Steward, M.2
Hartley, J.3
-
139
-
-
70349309259
-
Current state of information security research in is
-
Zafar, H., and Clark, J. G. 2009. "Current State of Information Security Research in IS," Communications of the Association for Information Systems (24:1), pp. 557-596.
-
(2009)
Communications of the Association for Information Systems
, vol.24
, Issue.1
, pp. 557-596
-
-
Zafar, H.1
Clark, J.G.2
|