-
1
-
-
2642549662
-
Computer and risky computing practices: A rational choice perspective
-
K. Aytes, and T. Connolly Computer and risky computing practices: a rational choice perspective J. Organ. End User Comput. 16 2 2004 22 40
-
(2004)
J. Organ. End User Comput.
, vol.16
, Issue.2
, pp. 22-40
-
-
Aytes, K.1
Connolly, T.2
-
2
-
-
32844472020
-
Achievement-based rewards and intrinsic motivation: A test of cognitive mediators
-
DOI 10.1037/0022-0663.97.4.641
-
J. Cameron, W.D. Pierce, K.M. Banko, and A. Gear Achievement-based rewards and intrinsic motivation: a test of cognitive mediators J. Educ. Psychol. 97 4 2005 641 655 (Pubitemid 43250907)
-
(2005)
Journal of Educational Psychology
, vol.97
, Issue.4
, pp. 641-655
-
-
Cameron, J.1
Pierce, W.D.2
Banko, K.M.3
Gear, A.4
-
3
-
-
67649551429
-
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
-
J. D'Arcy, A. Hovav, and D. Galletta User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach Inf. Syst. Res. 17 1 2009 79 98
-
(2009)
Inf. Syst. Res.
, vol.17
, Issue.1
, pp. 79-98
-
-
D'Arcy, J.1
Hovav, A.2
Galletta, D.3
-
4
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
T. Herath, and H.R. Rao Protection motivation and deterrence: a framework for security policy compliance in organisations Eur. J. Inf. Syst. 18 2 2009 106 125
-
(2009)
Eur. J. Inf. Syst.
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
5
-
-
84859105508
-
Does culture really matter? A cross-cultural analysis of security countermeasure effectiveness based on deterrence theory
-
A. Hovav, and J. D'Arcy Does culture really matter? A cross-cultural analysis of security countermeasure effectiveness based on deterrence theory Inf. Manage. 49 2 2012 99 110
-
(2012)
Inf. Manage.
, vol.49
, Issue.2
, pp. 99-110
-
-
Hovav, A.1
D'Arcy, J.2
-
6
-
-
80054707541
-
Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies
-
S. Jai-Yeol Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies Inf. Manage. 48 7 2011 296 302
-
(2011)
Inf. Manage.
, vol.48
, Issue.7
, pp. 296-302
-
-
Jai-Yeol, S.1
-
7
-
-
77957057727
-
Fear appeals and information security behaviors: An empirical study
-
A.C. Johnston, and M. Warkentin Fear appeals and information security behaviors: an empirical study MIS Q. 34 3 2010 549 566
-
(2010)
MIS Q.
, vol.34
, Issue.3
, pp. 549-566
-
-
Johnston, A.C.1
Warkentin, M.2
-
8
-
-
80052902327
-
Towards a meta-theory for designing information systems security training approaches
-
M. Karjalainen, and M. Siponen Towards a meta-theory for designing information systems security training approaches J. Assoc. Inf. Syst. 12 8 2011 518 555
-
(2011)
J. Assoc. Inf. Syst.
, vol.12
, Issue.8
, pp. 518-555
-
-
Karjalainen, M.1
Siponen, M.2
-
9
-
-
1242263532
-
Why there aren't more information security research studies
-
A.G. Kotulic, and J.G. Clark Why there aren't more information security research studies Inf. Manage. 41 2004 597 607
-
(2004)
Inf. Manage.
, vol.41
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, J.G.2
-
10
-
-
38549114187
-
How habit limits the predictive power of intention: The case of information systems continuance
-
M. Limayem, S.G. Hirt, and C.M.K. Cheung How habit limits the predictive power of intention: the case of information systems continuance MIS Q. 30 2 2007 705 737 (Pubitemid 351153309)
-
(2007)
MIS Quarterly: Management Information Systems
, vol.31
, Issue.4
, pp. 705-737
-
-
Limayem, M.1
Hirt, S.G.2
Cheung, C.M.K.3
-
11
-
-
0141907688
-
Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies
-
DOI 10.1037/0021-9010.88.5.879
-
P.M. Podsakoff, S.B. MacKenzie, J.Y. Lee, and N.P. Podsakoff Common method bias in behavioral research: a critical review of the literature and recommended remedies J. Appl. Psychol. 88 5 2003 879 903 (Pubitemid 37239703)
-
(2003)
Journal of Applied Psychology
, vol.88
, Issue.5
, pp. 879-903
-
-
Podsakoff, P.M.1
MacKenzie, S.B.2
Lee, J.-Y.3
Podsakoff, N.P.4
-
12
-
-
77957068563
-
Neutralization: New insights into the problem of employee information systems security policy violation
-
M. Siponen, and A. Vance Neutralization: new insights into the problem of employee information systems security policy violation MIS Q. 34 3 2010 487 502
-
(2010)
MIS Q.
, vol.34
, Issue.3
, pp. 487-502
-
-
Siponen, M.1
Vance, A.2
-
13
-
-
67651102640
-
Information security management standards: Problems and solutions
-
M. Siponen, and R. Willison Information security management standards: problems and solutions Inf. Manage. 46 5 2009 267 270
-
(2009)
Inf. Manage.
, vol.46
, Issue.5
, pp. 267-270
-
-
Siponen, M.1
Willison, R.2
-
14
-
-
12244267312
-
Development and validation of an instrument to measure user perceived service quality of information presenting Web portals
-
DOI 10.1016/j.im.2004.03.001, PII S0378720604000734
-
Z. Yang, S. Cai, Z. Zhou, and N. Zhou Development and validation of an instrument to measure user perceived service quality of information presenting Web portals Inf. Manage. 42 4 2005 575 589 (Pubitemid 40114727)
-
(2005)
Information and Management
, vol.42
, Issue.4
, pp. 575-589
-
-
Yang, Z.1
Cai, S.2
Zhou, Z.3
Zhou, N.4
|