-
1
-
-
79958712599
-
Attack Intelligence Research Center Annual Threat Report: 2008 Overview and 2009 Predictions
-
AIRC., Alladin Knowledge Systems, Belcamp, MD (available online at
-
AIRC. 2008. Attack Intelligence Research Center Annual Threat Report: 2008 Overview and 2009 Predictions, Attack Intelligence Research Center, Alladin Knowledge Systems, Belcamp, MD (available online at http://www. aladdin. com/pdf/airc/AIRC-Annual-Threat-Report2008. pdf).
-
(2008)
Attack Intelligence Research Center
-
-
-
3
-
-
41649112685
-
Structural equation modeling in practice: A review and recommended two-step approach
-
Anderson, J. C., and Gerbing, D. W. 1988. "Structural equation modeling in practice: A review and recommended two-step approach, " Psychological Bulletin (103: 3), pp. 411-423.
-
(1988)
Psychological Bulletin
, vol.103
, Issue.3
, pp. 411-423
-
-
Anderson, J.C.1
Gerbing, D.W.2
-
4
-
-
0942268246
-
The influence of business managers' IT competence on championing IT
-
Bassellier, G., Benbasat, I., and Reich, B. H. 2003. "The influence of business managers' IT competence on championing IT, " Information Systems Research (14: 4), pp. 317-336.
-
(2003)
Information Systems Research
, vol.14
, Issue.4
, pp. 317-336
-
-
Bassellier, G.1
Benbasat, I.2
Reich, B.H.3
-
6
-
-
0023020183
-
The moderator-mediator variable distinction in social psychological research: Conceptual, strategic and statistical considerations
-
Baron, R. M., and Kenny, D. A. 1986. "The moderator-mediator variable distinction in social psychological research: Conceptual, strategic and statistical considerations, " Journal of Personality and Social Psychology (51: 6), pp. 1173-1182.
-
(1986)
Journal of Personality and Social Psychology
, vol.51
, Issue.6
, pp. 1173-1182
-
-
Baron, R.M.1
Kenny, D.A.2
-
7
-
-
9744225129
-
Understanding Changes in Belief and Attitude toward Information Technology Usage: A Theoretical Model and Longitudinal Test
-
Bhattacherjee, A., and Premkumar, G. (2004). "Understanding Changes in Belief and Attitude toward Information Technology Usage: A Theoretical Model and Longitudinal Test, " MIS Quarterly, (28: 2), pp. 229-254.
-
(2004)
MIS Quarterly
, vol.28
, Issue.2
, pp. 229-254
-
-
Bhattacherjee, A.1
Premkumar, G.2
-
8
-
-
67650100804
-
If Someone Is Watching, I'll Do What I'm Asked: Mandatoriness, Control, and Information Security
-
Boss, S., Kirsch, L., Angermeier, I., Shingler, R., and Boss, R. 2009. "If Someone Is Watching, I'll Do What I'm Asked: Mandatoriness, Control, and Information Security, " European Journal of Information Systems (18: 2), pp. 151-164.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 151-164
-
-
Boss, S.1
Kirsch, L.2
Angermeier, I.3
Shingler, R.4
Boss, R.5
-
9
-
-
33745082091
-
Model of adoption of technology in households: A baseline model test and extension incorporating household life cycle
-
Brown, S. A., and Venkatesh, V. 2005. "Model of adoption of technology in households: A baseline model test and extension incorporating household life cycle, " MIS Quarterly (29: 3), pp. 399-426.
-
(2005)
MIS Quarterly
, vol.29
, Issue.3
, pp. 399-426
-
-
Brown, S.A.1
Venkatesh, V.2
-
10
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
Bulgurcu, B., Cavusoglu, H., and Benbasat, I. 2010. "Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness, " MIS Quarterly, (34: 3), pp. 523-A527.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-527
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
11
-
-
4243109556
-
A Model for Evaluating IT Security Investments
-
Cavusoglu, H., Mishra, B., and Raghunathan, S. 2004a. "A Model for Evaluating IT Security Investments, " Communications of the ACM (47: 7), pp. 87-92.
-
(2004)
Communications of the ACM
, vol.47
, Issue.7
, pp. 87-92
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
12
-
-
61349159889
-
Perceptions of information security at the workplace: Linking information security climate to compliant behavior
-
Chan, M., Woon I., and Kankanhalli A. 2005. "Perceptions of information security at the workplace: linking information security climate to compliant behavior, " Journal of Information Privacy and Security (1: 3), pp. 18-41.
-
(2005)
Journal of Information Privacy and Security
, vol.1
, Issue.3
, pp. 18-41
-
-
Chan, M.1
Woon, I.2
Kankanhalli, A.3
-
13
-
-
0003095695
-
The partial least squares approach for structural equation modeling
-
G.A. Marcoulides (Hrsg.). Mahwah, New York: Lawrence erlbaum associates Publishers
-
Chin, W. W. 1998. "The partial least squares approach for structural equation modeling, " Modern Methods for Business Research, G. A. Marcoulides (Hrsg.). Mahwah, New York: Lawrence erlbaum associates Publishers, pp. 295-336.
-
(1998)
Modern Methods for Business Research
, pp. 295-336
-
-
Chin, W.W.1
-
14
-
-
34748897800
-
The effect of computer self-efficacy on security training effectiveness
-
in, ACM Press, New York, USA
-
Crossler, R. E. and Bélanger, F. 2006. "The effect of computer self-efficacy on security training effectiveness, " in Proceedings of the 3rd annual conference on information security curriculum development, ACM Press, New York, USA, pp. 124-129.
-
(2006)
Proceedings of the 3rd annual conference on information security curriculum development
, pp. 124-129
-
-
Crossler, R.E.1
Bélanger, F.2
-
15
-
-
67649551429
-
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
-
D'Arcy, J., Hovav, A., and Galletta, D. 2009. "User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach, " Information Systems Research (20: 1), pp. 79-98.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 79-98
-
-
D'Arcy, J.1
Hovav, A.2
Galletta, D.3
-
16
-
-
0035534144
-
Index construction with formative indicators: An alternative to scale development
-
Diamantopoulos, A., and Winklhofer, H. M. 2001. "Index construction with formative indicators: An alternative to scale development, " Journal of Marketing Research (38: 2), pp. 269-277.
-
(2001)
Journal of Marketing Research
, vol.38
, Issue.2
, pp. 269-277
-
-
Diamantopoulos, A.1
Winklhofer, H.M.2
-
17
-
-
49049114397
-
The centrality of awareness in the formation of user behavioral intention toward protective information technologies
-
Dinev, T., and Hu, Q. 2007. "The centrality of awareness in the formation of user behavioral intention toward protective information technologies, " Journal of the Association for Information Systems (8: 7), pp. 386-408.
-
(2007)
Journal of the Association for Information Systems
, vol.8
, Issue.7
, pp. 386-408
-
-
Dinev, T.1
Hu, Q.2
-
19
-
-
0003551671
-
-
Reading: Addison-Wesley
-
Fishbein, M., and Ajzen, I. 1975. Belief, attitude, intention, and behavior: An introduction to theory and research, Reading: Addison-Wesley.
-
(1975)
Belief, attitude, intention, and behavior: An introduction to theory and research
-
-
Fishbein, M.1
Ajzen, I.2
-
20
-
-
0000009769
-
Evaluating structural equation models with unobservable variables and measurement error
-
Fornell, C., and Larcker, D. F. 1981. "Evaluating structural equation models with unobservable variables and measurement error, " Journal of Marketing Research (18: 1), pp. 39-50.
-
(1981)
Journal of Marketing Research
, vol.18
, Issue.1
, pp. 39-50
-
-
Fornell, C.1
Larcker, D.F.2
-
21
-
-
0040661360
-
Security-related behavior of pc users in organizations
-
Frank, J., Shamir, B., and Briggs, W. 1991. "Security-related behavior of pc users in organizations, " Information and Management (21: 3), pp. 127-135.
-
(1991)
Information and Management
, vol.21
, Issue.3
, pp. 127-135
-
-
Frank, J.1
Shamir, B.2
Briggs, W.3
-
22
-
-
84965629744
-
A scoial information processing model of media in organizations
-
Fulk, J., Steinfield, J., and Power, G. 1987. "A scoial information processing model of media in organizations, " Communication Research (14: 5), pp. 529-552.
-
(1987)
Communication Research
, vol.14
, Issue.5
, pp. 529-552
-
-
Fulk, J.1
Steinfield, J.2
Power, G.3
-
23
-
-
33750958522
-
Remote pc security: Securing the home worker
-
Furnell, S. M. 2006. "Remote pc security: Securing the home worker, " Network Security (11), pp. 6-12.
-
(2006)
Network Security
, Issue.11
, pp. 6-12
-
-
Furnell, S.M.1
-
26
-
-
29444460597
-
A practical guide to factorial validity using PLS-graph: Tutorial and annotated example
-
Gefen, D., and Straub, D. 2005. "A practical guide to factorial validity using PLS-graph: Tutorial and annotated example, " Communications of the AIS (16: 1), pp. 91-109.
-
(2005)
Communications of the AIS
, vol.16
, Issue.1
, pp. 91-109
-
-
Gefen, D.1
Straub, D.2
-
27
-
-
0003506109
-
-
Englewood Cliffs, NJ: Prentice Hall
-
Hair, J. F., Anderson, R. E., Tatham, R. L., and Black, W. C. 1998. Multivariate data analysis, Englewood Cliffs, NJ: Prentice Hall.
-
(1998)
Multivariate data analysis
-
-
Hair, J.F.1
Anderson, R.E.2
Tatham, R.L.3
Black, W.C.4
-
28
-
-
67349144062
-
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
-
Herath, T., and Rao, H. R. 2009a. "Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness, " Decision Support Systems (47: 2), pp. 1-12.
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 1-12
-
-
Herath, T.1
Rao, H.R.2
-
29
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
Herath, T., and Rao, H. G. 2009b. "Protection motivation and deterrence: A framework for security policy compliance in organisations, " European Journal of Information Systems (18: 2), pp. 106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.G.2
-
30
-
-
0242424963
-
A critical review of construct indicators and measurement model misspecification in marketing and consumer research
-
Jarvis, C., Mackenzie, S., and Podsakoff, P. 2003. "A critical review of construct indicators and measurement model misspecification in marketing and consumer research, " Journal of Consumer Research (30: 2), pp. 199-218.
-
(2003)
Journal of Consumer Research
, vol.30
, Issue.2
, pp. 199-218
-
-
Jarvis, C.1
Mackenzie, S.2
Podsakoff, P.3
-
31
-
-
0345764837
-
Improving user security behavior
-
Leach, J. 2003. "Improving user security behavior, " Computers & Security (22: 8), pp. 685-693.
-
(2003)
Computers & Security
, vol.22
, Issue.8
, pp. 685-693
-
-
Leach, J.1
-
32
-
-
0036064934
-
A holistic model of computer abuse within organizations
-
Lee, J. and Lee, Y. 2002. "A holistic model of computer abuse within organizations, " Information Management and Computer Security, (10: 2), pp. 57-63.
-
(2002)
Information Management and Computer Security
, vol.10
, Issue.2
, pp. 57-63
-
-
Lee, J.1
Lee, Y.2
-
33
-
-
2342489402
-
An integrative model of computer abuse based on social control and general deterrence theories
-
Lee, S. M., Lee, S. G., and Yoo, S. 2004. "An integrative model of computer abuse based on social control and general deterrence theories, " Information Management (41: 6), pp. 707-718.
-
(2004)
Information Management
, vol.41
, Issue.6
, pp. 707-718
-
-
Lee, S.M.1
Lee, S.G.2
Yoo, S.3
-
34
-
-
84991904404
-
Accounting for common method variance in cross-sectional research designs
-
Lindell, M. K., and Whitney, D. J. 2001. "Accounting for common method variance in cross-sectional research designs, " Journal of Applied Psychology, (86: 1), pp. 114-121.
-
(2001)
Journal of Applied Psychology
, vol.86
, Issue.1
, pp. 114-121
-
-
Lindell, M.K.1
Whitney, D.J.2
-
35
-
-
0037322632
-
Diffusing the internet in the Arab world: The role of social norms and techological culturation
-
Loch, K. D., Straub, D. W., and Kamel, S. 2003. "Diffusing the internet in the Arab world: The role of social norms and techological culturation, " Engineering Management (50: 1), pp. 45-63.
-
(2003)
Engineering Management
, vol.50
, Issue.1
, pp. 45-63
-
-
Loch, K.D.1
Straub, D.W.2
Kamel, S.3
-
36
-
-
73449149291
-
Development of an instrument to measure the perceptions of adopting an information technology innovation
-
Moore, G. C., and Benbasat, I. 1991. "Development of an instrument to measure the perceptions of adopting an information technology innovation, " Information Systems Research (2: 3), pp. 192-222.
-
(1991)
Information Systems Research
, vol.2
, Issue.3
, pp. 192-222
-
-
Moore, G.C.1
Benbasat, I.2
-
37
-
-
80053545071
-
A socio-behavioral study of home computer users' intention to practice security
-
in, Bangkok, Thailand
-
Ng, B. Y., and Rahim, M. A. 2005. "A socio-behavioral study of home computer users' intention to practice security, " in Proceedings of the 9th Pacific Asia Conference on Information Systems, Bangkok, Thailand.
-
(2005)
Proceedings of the 9th Pacific Asia Conference on Information Systems
-
-
Ng, B.Y.1
Rahim, M.A.2
-
38
-
-
33745446307
-
-
NIST, M. Wilson (eds.), Gaithersburg: National Institute of Standards and Technology, NIST Special Publication, retrieved from
-
NIST 2003. "Building an information technology security awareness and training program, " M. Wilson (eds.), Gaithersburg: National Institute of Standards and Technology, NIST Special Publication, pp. 800-50, retrieved from http://csrc. nist. gov/publications/nistpubs/.
-
(2003)
Building an information technology security awareness and training program
, pp. 800-850
-
-
-
39
-
-
39749168050
-
Employees' Behavior Towards Is Security Policy Compliance
-
Pahnila, S., Siponen, M., and Mahmood, A. 2007. "Employees' Behavior Towards Is Security Policy Compliance, " Proceedings of the 40th Annual Hawaii International Conference on System Sciences, pp. 156-166.
-
(2007)
Proceedings of the 40th Annual Hawaii International Conference on System Sciences
, pp. 156-166
-
-
Pahnila, S.1
Siponen, M.2
Mahmood, A.3
-
40
-
-
38549116762
-
Specifying formative constructs in information systems research
-
Petter S., Straub D., and Rai, A. 2007. "Specifying formative constructs in information systems research, " MIS Quarterly (31: 4), pp. 623-656.
-
(2007)
MIS Quarterly
, vol.31
, Issue.4
, pp. 623-656
-
-
Petter, S.1
Straub, D.2
Rai, A.3
-
41
-
-
0141907688
-
Common method biases in behavioral research: A critical review of the literature and recommended remedies
-
Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., and Podsakoff, N. P. 2003. "Common method biases in behavioral research: A critical review of the literature and recommended remedies, " Journal of Applied Psychology, (88: 5), pp. 879-903.
-
(2003)
Journal of Applied Psychology
, vol.88
, Issue.5
, pp. 879-903
-
-
Podsakoff, P.M.1
McKenzie, S.B.2
Lee, J.Y.3
Podsakoff, N.P.4
-
42
-
-
55849105212
-
Information security awareness in higher education: An exploratory study
-
Rezgui, Y., and Marks, A. 2008. "Information security awareness in higher education: An exploratory study, " Computers & Security (27: 7-8), pp. 241-253.
-
(2008)
Computers & Security
, vol.27
, Issue.7-8
, pp. 241-253
-
-
Rezgui, Y.1
Marks, A.2
-
43
-
-
71949094501
-
Self-efficacy in information security: Its influence on end users' information security practice behavior
-
Rhee, H.-S., Kim, C., and Ryu, Y. U. 2009. "Self-efficacy in information security: Its influence on end users' information security practice behavior, " Computers & Security (28: 8), pp. 1-11.
-
(2009)
Computers & Security
, vol.28
, Issue.8
, pp. 1-11
-
-
Rhee, H.-S.1
Kim, C.2
Ryu, Y.U.3
-
45
-
-
77952381412
-
How to create a security culture in your organization
-
Rotvold, G. 2008. "How to create a security culture in your organization. " The Information Management Journal (42: 6), pp. 32-38.
-
(2008)
The Information Management Journal
, vol.42
, Issue.6
, pp. 32-38
-
-
Rotvold, G.1
-
46
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Siponen, M. 2000. "A conceptual foundation for organizational information security awareness, " Information Management and Computer Security (8: 1), pp. 31-41.
-
(2000)
Information Management and Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.1
-
47
-
-
71149100808
-
Are employees putting your company at risk by not following information security policies?
-
Siponen, M., Mahmood, M. A., and Pahnila, S. 2009. "Are employees putting your company at risk by not following information security policies?" Communications of the ACM (52: 12), pp. 145-147.
-
(2009)
Communications of the ACM
, vol.52
, Issue.12
, pp. 145-147
-
-
Siponen, M.1
Mahmood, M.A.2
Pahnila, S.3
-
48
-
-
77957068563
-
Neutralization: New insight into the problem of employee information systems security policy violations
-
Siponen, M., and Vance, A. 2010. "Neutralization: New insight into the problem of employee information systems security policy violations, " MIS Quarterly (34: 3), pp. 487-502.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 487-502
-
-
Siponen, M.1
Vance, A.2
-
49
-
-
0002037905
-
Asymptotic intervals for indirect effects in structural euquation models
-
Leinhart, S. (e. d.). San Francisco: Jossy-Bass
-
Sobel, M. 1982. "Asymptotic intervals for indirect effects in structural euquation models, " Sociological methodology. Leinhart, S. (e. d.). San Francisco: Jossy-Bass, pp. 290-312.
-
(1982)
Sociological methodology
, pp. 290-312
-
-
Sobel, M.1
-
51
-
-
77957070672
-
User participation in information systems security risk management
-
Spears, J. L., and Barki, H. 2010. "User participation in information systems security risk management, " MIS Quarterly (34: 3), pp. 503-522.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 503-522
-
-
Spears, J.L.1
Barki, H.2
-
52
-
-
17844366573
-
An analysis of end user security behaviors
-
Stanton, J. M., Stam, K. R., Mastrangelo, P. R., and Jolton, J. 2005. "An analysis of end user security behaviors, " Computers & Security, (24: 2), pp. 124-133.
-
(2005)
Computers & Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.R.3
Jolton, J.4
-
53
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D. W., and Welke, R. J. 1998. "Coping with systems risk: Security planning models for management decision making, " MIS Quarterly (22: 4), pp. 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
54
-
-
77954950954
-
-
Symantec, Symantec Corporation, Cupertino, CA (available online at
-
Symantec. 2009. Symantec Internet Security Threat Report: Trends for 2008, Symantec Corporation, Cupertino, CA (available online at http://eval. symantec. com/mktginfo/enterprise/white_papers/bwhitepaper_exec_summary_internet_security_threat_report_xiv_04-2009. en-us. pdf).
-
(2009)
Symantec Internet Security Threat Report: Trends for 2008
-
-
-
55
-
-
0242517401
-
Information security awareness: Educating your users effectively
-
Thomson, M. E., and von Solms, R. 1998. "Information security awareness: Educating your users effectively, " Information Management and Computer Security (6: 4), pp. 167-173.
-
(1998)
Information Management and Computer Security
, vol.6
, Issue.4
, pp. 167-173
-
-
Thomson, M.E.1
von Solms, R.2
-
56
-
-
85016075946
-
Investigating information security awareness: Research and practice gaps
-
Tsohou, A., Kokolakis, S., Karyda, M., and Kiountouzis, E. 2008. "Investigating information security awareness: Research and practice gaps, " Information Security Journal: A Global Perspective (17: 5-6), pp. 207-227.
-
(2008)
Information Security Journal: A Global Perspective
, vol.17
, Issue.5-6
, pp. 207-227
-
-
Tsohou, A.1
Kokolakis, S.2
Karyda, M.3
Kiountouzis, E.4
-
57
-
-
78049386546
-
Aligning security awareness with information systems security management
-
Tsohou, A., Karyda, M., Kokolakis, S., and Kiountouzis, E. 2010. "Aligning security awareness with information systems security management, " Journal of Information System Security (6: 1), pp. 36-54.
-
(2010)
Journal of Information System Security
, vol.6
, Issue.1
, pp. 36-54
-
-
Tsohou, A.1
Karyda, M.2
Kokolakis, S.3
Kiountouzis, E.4
|