-
1
-
-
34249871944
-
A qualitative study of users' view on information security
-
E. Albrechtsen A qualitative study of users' view on information security Comput Secur 26 4 2007 Jun 276 289
-
(2007)
Comput Secur
, vol.26
, Issue.4
, pp. 276-289
-
-
Albrechtsen, E.1
-
2
-
-
0001658577
-
Predicting the performance of measures in a confirmatory factor analysis with a pretest assessment of their substantive validities
-
J.C. Anderson, and D.W. Gerbing Predicting the performance of measures in a confirmatory factor analysis with a pretest assessment of their substantive validities J Appl Psychol 76 5 1991 732 740
-
(1991)
J Appl Psychol
, vol.76
, Issue.5
, pp. 732-740
-
-
Anderson, J.C.1
Gerbing, D.W.2
-
3
-
-
85006674485
-
Social engineering: Hacking the wetware!
-
Taylor & Francis
-
S.D. Applegate Social engineering: hacking the wetware! Inf Secur J Glob Perspect 18 1 2009 Feb 6 40 46 Taylor & Francis
-
(2009)
Inf Secur J Glob Perspect
, vol.18
, Issue.1
, pp. 40-46
-
-
Applegate, S.D.1
-
4
-
-
0000357545
-
Estimating nonresponse bias in mail surveys
-
J.S. Armstrong, and T.S. Overton Estimating nonresponse bias in mail surveys J Mark Res 14 1977 396 402
-
(1977)
J Mark Res
, vol.14
, pp. 396-402
-
-
Armstrong, J.S.1
Overton, T.S.2
-
5
-
-
84936824236
-
Assessing construct validity in organizational research
-
R.P. Bagozzi, Y. Yi, and L.W. Phillips Assessing construct validity in organizational research Adm Sci Q 36 3 1991 421 458
-
(1991)
Adm Sci Q
, vol.36
, Issue.3
, pp. 421-458
-
-
Bagozzi, R.P.1
Yi, Y.2
Phillips, L.W.3
-
6
-
-
84898065711
-
User acceptance of information technology across cultures
-
Inderscience Publishers
-
K. Bandyopadhyay, and S. Bandyopadhyay User acceptance of information technology across cultures Int J Intercult Inf Manag 2 3 2010 218 Inderscience Publishers
-
(2010)
Int J Intercult Inf Manag
, vol.2
, Issue.3
, pp. 218
-
-
Bandyopadhyay, K.1
Bandyopadhyay, S.2
-
7
-
-
0003258063
-
The partial least squares (PLS) approach to causal modeling: Personal computer adoption and use as an illustration
-
D. Barclay, C. Higgins, and R. Thompson The partial least squares (PLS) approach to causal modeling: personal computer adoption and use as an illustration Technol Stud 2 2 1995 285 309
-
(1995)
Technol Stud
, vol.2
, Issue.2
, pp. 285-309
-
-
Barclay, D.1
Higgins, C.2
Thompson, R.3
-
8
-
-
0023020183
-
The moderator-mediator variable distinction in social psychological research - Conceptual, strategic, and statistical considerations
-
R.M. Baron, and D.A. Kenny The moderator-mediator variable distinction in social psychological research - conceptual, strategic, and statistical considerations J Pers Soc Psychol 51 6 1986 1173 1182
-
(1986)
J Pers Soc Psychol
, vol.51
, Issue.6
, pp. 1173-1182
-
-
Baron, R.M.1
Kenny, D.A.2
-
9
-
-
24144458931
-
Information systems security from a knowledge management perspective
-
Emerald Group Publishing Limited
-
P. Belsis, S. Kokolakis, and E. Kiountouzis Information systems security from a knowledge management perspective Inf Manag Comput Secur 13 3 2005 Jan 7 189 202 Emerald Group Publishing Limited
-
(2005)
Inf Manag Comput Secur
, vol.13
, Issue.3
, pp. 189-202
-
-
Belsis, P.1
Kokolakis, S.2
Kiountouzis, E.3
-
10
-
-
0000864824
-
The parochial dinosaur: Organizational science in a global context
-
Academy of Management
-
N.A. Boyacigiller, and N.J. Adler The parochial dinosaur: organizational science in a global context Acad Manag Rev 16 2 1991 Apr 1 262 290 Academy of Management
-
(1991)
Acad Manag Rev
, vol.16
, Issue.2
, pp. 262-290
-
-
Boyacigiller, N.A.1
Adler, N.J.2
-
12
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
B. Bulgurcu, H. Cavusoglu, and I. Benbasat Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness MIS Q 34 3 2010 Sep 1 523 548
-
(2010)
MIS Q
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
14
-
-
33645031405
-
Organizational factors to the effectiveness of implementing information security management
-
S. Chang, and C. Ho Organizational factors to the effectiveness of implementing information security management Ind Manag Data Syst 106 3 2006 345 361
-
(2006)
Ind Manag Data Syst
, vol.106
, Issue.3
, pp. 345-361
-
-
Chang, S.1
Ho, C.2
-
15
-
-
80054030193
-
Information systems resources and information security
-
K. Chang, and C. Wang Information systems resources and information security Inf Syst Front 13 4 2010 Apr 27 579 593
-
(2010)
Inf Syst Front
, vol.13
, Issue.4
, pp. 579-593
-
-
Chang, K.1
Wang, C.2
-
17
-
-
0003095695
-
The partial least squares approach to structural equation modeling
-
G.A. Marcoulides, Lawrence Erlbaum Associates Mahwah, NJ
-
W.W. Chin The partial least squares approach to structural equation modeling G.A. Marcoulides, Modern methods for business research 1988 Lawrence Erlbaum Associates Mahwah, NJ 295 358
-
(1988)
Modern Methods for Business Research
, pp. 295-358
-
-
Chin, W.W.1
-
18
-
-
78049329432
-
An introduction to a permutation based procedure for multi-group PLS analysis: Results of tests of differences on simulated data and a cross cultural analysis of the sourcing of information system services between Germany and the USA
-
V.E. Vinzi, W.W. Chin, J. Henseler, H. Wang, Springer Berlin Heidelberg
-
W. Chin, and J. Dibbern An introduction to a permutation based procedure for multi-group PLS analysis: results of tests of differences on simulated data and a cross cultural analysis of the sourcing of information system services between Germany and the USA V.E. Vinzi, W.W. Chin, J. Henseler, H. Wang, Handbook of partial least squares 2010 Springer Berlin Heidelberg 171 193
-
(2010)
Handbook of Partial Least Squares
, pp. 171-193
-
-
Chin, W.1
Dibbern, J.2
-
19
-
-
84882800467
-
Insider threat and information security management
-
C.W. Probst, J. Hunker, M. Bishop, D. Gollmann, Advances in information security Springer US
-
L. Coles-Kemp, and M. Theoharidou Insider threat and information security management C.W. Probst, J. Hunker, M. Bishop, D. Gollmann, Insider threats in cyber security Advances in information security 2010 Springer US 45 71
-
(2010)
Insider Threats in Cyber Security
, pp. 45-71
-
-
Coles-Kemp, L.1
Theoharidou, M.2
-
20
-
-
84863720925
-
Information systems user security: A structured model of the knowing-doing gap
-
J. Cox Information systems user security: a structured model of the knowing-doing gap Comput Hum Behav 28 5 2012 Sep 1849 1858
-
(2012)
Comput Hum Behav
, vol.28
, Issue.5
, pp. 1849-1858
-
-
Cox, J.1
-
22
-
-
84876570327
-
Future directions for behavioral information security research
-
R.E. Crossler, A.C. Johnston, P.B. Lowry, Q. Hu, M. Warkentin, and R. Baskerville Future directions for behavioral information security research Comput Secur 32 null 2013 Feb 90 101
-
(2013)
Comput Secur
, vol.32
, pp. 90-101
-
-
Crossler, R.E.1
Johnston, A.C.2
Lowry, P.B.3
Hu, Q.4
Warkentin, M.5
Baskerville, R.6
-
23
-
-
1842682482
-
Work groups, structural diversity, and knowledge sharing in a global organization
-
INFORMS
-
J.N. Cummings Work groups, structural diversity, and knowledge sharing in a global organization Manag Sci 50 3 2004 Mar 1 352 364 INFORMS
-
(2004)
Manag Sci
, vol.50
, Issue.3
, pp. 352-364
-
-
Cummings, J.N.1
-
26
-
-
23044525969
-
Current directions in IS security research: Towards socio-organizational perspectives
-
G. Dhillon, and J. Backhouse Current directions in IS security research: towards socio-organizational perspectives Inf Syst J 11 2 2001 127 153
-
(2001)
Inf Syst J
, vol.11
, Issue.2
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
27
-
-
67650318762
-
User behaviour towards protective information technologies: The role of national cultural differences
-
T. Dinev, J. Goo, Q. Hu, and K. Nam User behaviour towards protective information technologies: the role of national cultural differences Inf Syst J 19 4 2009 Jul 391 412
-
(2009)
Inf Syst J
, vol.19
, Issue.4
, pp. 391-412
-
-
Dinev, T.1
Goo, J.2
Hu, Q.3
Nam, K.4
-
28
-
-
0001548448
-
Common methods bias: Does common methods variance really bias results?
-
D.H. Doty, and W.H. Glick Common methods bias: does common methods variance really bias results? Organ Res Methods 1 4 1998 Oct 1 374 406
-
(1998)
Organ Res Methods
, vol.1
, Issue.4
, pp. 374-406
-
-
Doty, D.H.1
Glick, W.H.2
-
29
-
-
84861414677
-
Assessment of information security maturity: An exploration study of Malaysian public service organizations
-
Emerald Group Publishing Limited
-
S. Dzazali, and A.H. Zolait Assessment of information security maturity: an exploration study of Malaysian public service organizations J Syst Inf Technol 14 1 2012 Mar 17 23 57 Emerald Group Publishing Limited
-
(2012)
J Syst Inf Technol
, vol.14
, Issue.1
, pp. 23-57
-
-
Dzazali, S.1
Zolait, A.H.2
-
30
-
-
80455178572
-
A review and analysis of deterrence theory in the IS security literature: Making sense of the disparate findings
-
Nature Publishing Group
-
J. D'Arcy, and T. Herath A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings Eur J Inf Syst 20 6 2011 Jun 14 643 658 Nature Publishing Group
-
(2011)
Eur J Inf Syst
, vol.20
, Issue.6
, pp. 643-658
-
-
D'Arcy, J.1
Herath, T.2
-
31
-
-
67649551429
-
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
-
J. D'Arcy, A. Hovav, and D. Galletta User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach Inf Syst Res 20 1 2008 Jun 20 79 98
-
(2008)
Inf Syst Res
, vol.20
, Issue.1
, pp. 79-98
-
-
D'Arcy, J.1
Hovav, A.2
Galletta, D.3
-
32
-
-
79952785183
-
An application of PLS in multi-group analysis: The need for differentiated corporate-level marketing in the mobile communications industry
-
V.E. Vinzi, W.W. Chin, J. Henseler, H. Wang, Springer Berlin Heidelberg
-
M. Eberl An application of PLS in multi-group analysis: the need for differentiated corporate-level marketing in the mobile communications industry V.E. Vinzi, W.W. Chin, J. Henseler, H. Wang, Handbook of partial least squares 2010 Springer Berlin Heidelberg 487 514
-
(2010)
Handbook of Partial Least Squares
, pp. 487-514
-
-
Eberl, M.1
-
33
-
-
84880196111
-
Behavioral information security
-
L. Janczewski, A. Colarik, Hershey, PA, USA
-
I.J. Fagnot Behavioral information security L. Janczewski, A. Colarik, Encyclopedia of cyber warfare and cyber terrorism 2008 199 205 Hershey, PA, USA
-
(2008)
Encyclopedia of Cyber Warfare and Cyber Terrorism
, pp. 199-205
-
-
Fagnot, I.J.1
-
35
-
-
30344462995
-
The economic incentives for sharing security information
-
INFORMS
-
E. Gal-Or, and A. Ghose The economic incentives for sharing security information Inf Syst Res 16 2 2005 Jun 1 186 208 INFORMS
-
(2005)
Inf Syst Res
, vol.16
, Issue.2
, pp. 186-208
-
-
Gal-Or, E.1
Ghose, A.2
-
37
-
-
84898064989
-
Knowledge for managing information system security: Review and future research directions
-
Paper 37
-
H. Guo Knowledge for managing information system security: review and future research directions CONF-IRM 2008 proceedings 2008 Paper 37
-
(2008)
CONF-IRM 2008 Proceedings
-
-
Guo, H.1
-
39
-
-
0027813283
-
Strategic alignment: Leveraging information technology for transforming organizations
-
J.C. Henderson, and N. Venkatraman Strategic alignment: leveraging information technology for transforming organizations IBM Syst J 32 1 1993 Jan 1 4 16
-
(1993)
IBM Syst J
, vol.32
, Issue.1
, pp. 4-16
-
-
Henderson, J.C.1
Venkatraman, N.2
-
40
-
-
0012728420
-
An analysis of variance approach to content validation
-
T.R. Hinkin, and J.B. Tracey An analysis of variance approach to content validation Organ Res Methods 2 2 1999 Apr 175 186
-
(1999)
Organ Res Methods
, vol.2
, Issue.2
, pp. 175-186
-
-
Hinkin, T.R.1
Tracey, J.B.2
-
42
-
-
0002390117
-
Cultural constraints in management theories
-
Academy of Management
-
G. Hofstede Cultural constraints in management theories Acad Manag Perspect 7 1 1993 Feb 1 81 94 Academy of Management
-
(1993)
Acad Manag Perspect
, vol.7
, Issue.1
, pp. 81-94
-
-
Hofstede, G.1
-
43
-
-
84872371758
-
-
[Internet]. Available from: [cited 13.06.13]
-
G. Hofstede National cultural dimensions [Internet]. Available from: http://geert-hofstede.com/dimensions.html 2013 [cited 13.06.13]
-
(2013)
National Cultural Dimensions
-
-
Hofstede, G.1
-
44
-
-
84863542038
-
Managing employee compliance with information security policies: The critical role of top management and organizational culture
-
Q. Hu, T. Dinev, P. Hart, and D. Cooke Managing employee compliance with information security policies: the critical role of top management and organizational culture Decis Sci 43 4 2012 Aug 28 615 660
-
(2012)
Decis Sci
, vol.43
, Issue.4
, pp. 615-660
-
-
Hu, Q.1
Dinev, T.2
Hart, P.3
Cooke, D.4
-
46
-
-
84856018908
-
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
-
P. Ifinedo Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory Comput Secur 31 1 2012 Feb 83 95
-
(2012)
Comput Secur
, vol.31
, Issue.1
, pp. 83-95
-
-
Ifinedo, P.1
-
48
-
-
0034178923
-
Management ethics and corporate policy: A cross-cultural comparison
-
T. Jackson Management ethics and corporate policy: A cross-cultural comparison J Manag Stud 37 3 2000 May 349 369
-
(2000)
J Manag Stud
, vol.37
, Issue.3
, pp. 349-369
-
-
Jackson, T.1
-
49
-
-
0242424963
-
A critical review of construct indicators and measurement model misspecification in marketing and consumer research
-
The University of Chicago Press
-
C.B. Jarvis, S.B. MacKenzie, and P.M. Podsakoff A critical review of construct indicators and measurement model misspecification in marketing and consumer research J Consum Res 30 2 2003 Sep 21 199 218 The University of Chicago Press
-
(2003)
J Consum Res
, vol.30
, Issue.2
, pp. 199-218
-
-
Jarvis, C.B.1
Mackenzie, S.B.2
Podsakoff, P.M.3
-
51
-
-
78049354490
-
An insider threat prediction model
-
S. Katsikas, J. Lopez, M. Soriano, Lecture notes in computer science Springer Berlin Heidelberg
-
M. Kandias, A. Mylonas, N. Virvilis, M. Theoharidou, and D. Gritzalis An insider threat prediction model S. Katsikas, J. Lopez, M. Soriano, Trust, privacy and security in digital business Lecture notes in computer science 2010 Springer Berlin Heidelberg 26 37
-
(2010)
Trust, Privacy and Security in Digital Business
, pp. 26-37
-
-
Kandias, M.1
Mylonas, A.2
Virvilis, N.3
Theoharidou, M.4
Gritzalis, D.5
-
52
-
-
84889039475
-
Proactive insider threat detection through social media
-
ACM Press New York, NY, USA [Internet]. Available from: [cited 05.03.14]
-
M. Kandias, V. Stavrou, N. Bozovic, and D. Gritzalis Proactive insider threat detection through social media Proceedings of the 12th ACM workshop on privacy in the electronic society - WPES'13 2013 ACM Press New York, NY, USA 261 266 [Internet]. Available from: http://dl.acm.org/citation.cfm?id=2517840. 2517865 [cited 05.03.14]
-
(2013)
Proceedings of the 12th ACM Workshop on Privacy in the Electronic Society - WPES'13
, pp. 261-266
-
-
Kandias, M.1
Stavrou, V.2
Bozovic, N.3
Gritzalis, D.4
-
53
-
-
0037400028
-
An integrative study of information systems security effectiveness
-
A. Kankanhalli An integrative study of information systems security effectiveness Int J Inf Manag 23 2 2003 Apr 139 154
-
(2003)
Int J Inf Manag
, vol.23
, Issue.2
, pp. 139-154
-
-
Kankanhalli, A.1
-
54
-
-
84928501185
-
One size does not fit all: Different cultures require different information systems security interventions
-
Paper 98
-
M. Karjalainen, M. Siponen, P. Petri, and S. Suprateek One size does not fit all: different cultures require different information systems security interventions PACIS 2013 proceedings 2013 Paper 98
-
(2013)
PACIS 2013 Proceedings
-
-
Karjalainen, M.1
Siponen, M.2
Petri, P.3
Suprateek, S.4
-
55
-
-
78751472118
-
Effective information security requires a balance of social and technology factors
-
T. Kayworth, and D. Whitten Effective information security requires a balance of social and technology factors MIS Q Exec 9 3 2010 303 315
-
(2010)
MIS Q Exec
, vol.9
, Issue.3
, pp. 303-315
-
-
Kayworth, T.1
Whitten, D.2
-
56
-
-
0040918921
-
A cross-cultural study on escalation of commitment behavior in software projects
-
Society for Information Management and The Management Information Systems Research Center
-
M. Keil, B.C.Y. Tan, K.-K. Wei, T. Saarinen, V. Tuunainen, and A. Wassenaar A cross-cultural study on escalation of commitment behavior in software projects MIS Q 24 2 2000 Jun 1 299 Society for Information Management and The Management Information Systems Research Center
-
(2000)
MIS Q
, vol.24
, Issue.2
, pp. 299
-
-
Keil, M.1
Tan, B.C.Y.2
Wei, K.-K.3
Saarinen, T.4
Tuunainen, V.5
Wassenaar, A.6
-
57
-
-
84879838718
-
Disentangling the effects of team competences, team adaptability, and client communication on the performance of management consulting teams
-
P. Klarner, M. Sarstedt, M. Hoeck, and C.M. Ringle Disentangling the effects of team competences, team adaptability, and client communication on the performance of management consulting teams Long Range Plann 46 3 2013 Jun 258 286
-
(2013)
Long Range Plann
, vol.46
, Issue.3
, pp. 258-286
-
-
Klarner, P.1
Sarstedt, M.2
Hoeck, M.3
Ringle, C.M.4
-
58
-
-
85001799501
-
Information security effectiveness: Conceptualization and validation of a theory
-
Eyob E, editor Jan 31
-
Knapp KJ, Marshall TE, Rainer RK, Ford FN. Information security effectiveness: conceptualization and validation of a theory. In: Eyob E, editor. Int J Inf Secur Priv. IGI Global; 2007 Jan 31;1(2):37-60.
-
(2007)
Int J Inf Secur Priv. IGI Global
, vol.1
, Issue.2
, pp. 37-60
-
-
Knapp, K.J.1
Marshall, T.E.2
Rainer, R.K.3
Ford, F.N.4
-
61
-
-
84957059783
-
Do corporate codes of ethics reflect national character? Evidence from Europe and the United States
-
Nature Publishing Group
-
C.C. Langlois, and B.B. Schlegelmilch Do corporate codes of ethics reflect national character? Evidence from Europe and the United States J Int Bus Stud 21 4 1990 Dec 1 519 539 Nature Publishing Group
-
(1990)
J Int Bus Stud
, vol.21
, Issue.4
, pp. 519-539
-
-
Langlois, C.C.1
Schlegelmilch, B.B.2
-
62
-
-
0346383178
-
Integrating positivist and interpretive approaches to organizational research
-
A.S. Lee Integrating positivist and interpretive approaches to organizational research Organ Sci 2 4 1991 Nov 1 342 365
-
(1991)
Organ Sci
, vol.2
, Issue.4
, pp. 342-365
-
-
Lee, A.S.1
-
63
-
-
80455155149
-
Knowledge sharing and investment decisions in information security
-
D. Liu, Y. Ji, and V. Mookerjee Knowledge sharing and investment decisions in information security Decis Support Syst 52 1 2011 95 107
-
(2011)
Decis Support Syst
, vol.52
, Issue.1
, pp. 95-107
-
-
Liu, D.1
Ji, Y.2
Mookerjee, V.3
-
64
-
-
0022970868
-
Determination and quantification of content validity
-
M.R. Lynn Determination and quantification of content validity Nurs Res 35 6 2006 382 386
-
(2006)
Nurs Res
, vol.35
, Issue.6
, pp. 382-386
-
-
Lynn, M.R.1
-
65
-
-
80051733015
-
Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques
-
S.B. MacKenzie, P.M. Podsakoff, and N.P. Podsakoff Construct measurement and validation procedures in MIS and behavioral research: integrating new and existing techniques MIS Q 35 2 2011 Jun 1 293 334
-
(2011)
MIS Q
, vol.35
, Issue.2
, pp. 293-334
-
-
Mackenzie, S.B.1
Podsakoff, P.M.2
Podsakoff, N.P.3
-
66
-
-
12044258070
-
Culture and the self: Implications for cognition, emotion, and motivation
-
H.R. Markus, and S. Kitayama Culture and the self: implications for cognition, emotion, and motivation Psychol Rev 98 2 1991 224 253
-
(1991)
Psychol Rev
, vol.98
, Issue.2
, pp. 224-253
-
-
Markus, H.R.1
Kitayama, S.2
-
67
-
-
77249087157
-
Information systems security governance research: A behavioral perspective
-
New York State
-
S. Mishra, and G. Dhillon Information systems security governance research: a behavioral perspective 2nd Annual symposium on information assurance 2006 New York State
-
(2006)
2nd Annual Symposium on Information Assurance
-
-
Mishra, S.1
Dhillon, G.2
-
68
-
-
79952781109
-
Integrated model of export activity: Analysis of heterogeneity in managers' orientations and perceptions on strategic marketing management in foreign markets
-
A. Navarro, F. Acedo, F. Losada, and E. Ruzo Integrated model of export activity: analysis of heterogeneity in managers' orientations and perceptions on strategic marketing management in foreign markets J Mark Theory Pract 19 2 2011 187 204
-
(2011)
J Mark Theory Pract
, vol.19
, Issue.2
, pp. 187-204
-
-
Navarro, A.1
Acedo, F.2
Losada, F.3
Ruzo, E.4
-
70
-
-
31744432604
-
An empirical study of the relationship between knowledge sharing and IS/IT strategic planning (ISSP)
-
Emerald Group Publishing Limited
-
J.-C. Pai An empirical study of the relationship between knowledge sharing and IS/IT strategic planning (ISSP) Manag Decis 44 1 2006 Jan 1 105 122 Emerald Group Publishing Limited
-
(2006)
Manag Decis
, vol.44
, Issue.1
, pp. 105-122
-
-
Pai, J.-C.1
-
71
-
-
0030521693
-
Sanction threats and appeals to morality: Testing a rational choice model of corporate crime
-
R. Paternoster, and S. Simpson Sanction threats and appeals to morality: testing a rational choice model of corporate crime Law Soc Rev 30 3 1996 549 584
-
(1996)
Law Soc Rev
, vol.30
, Issue.3
, pp. 549-584
-
-
Paternoster, R.1
Simpson, S.2
-
72
-
-
4644373002
-
What drives electronic commerce across cultures? A cross-cultural empirical investigation of the theory of planned behavior
-
P.A. Pavlou, and L. Chai What drives electronic commerce across cultures? A cross-cultural empirical investigation of the theory of planned behavior J Electron Commer Res 3 4 2002 240 253
-
(2002)
J Electron Commer Res
, vol.3
, Issue.4
, pp. 240-253
-
-
Pavlou, P.A.1
Chai, L.2
-
73
-
-
33847764616
-
Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective
-
P.A. Pavlou, H. Liang, and Y. Xue Understanding and mitigating uncertainty in online exchange relationships: a principal-agent perspective MIS Q 31 1 2007 Mar 1 105 136
-
(2007)
MIS Q
, vol.31
, Issue.1
, pp. 105-136
-
-
Pavlou, P.A.1
Liang, H.2
Xue, Y.3
-
74
-
-
38549116762
-
Specifying formative constructs in information systems research
-
S. Petter, D. Straub, and A. Rai Specifying formative constructs in information systems research MIS Q 31 4 2007 623 656
-
(2007)
MIS Q
, vol.31
, Issue.4
, pp. 623-656
-
-
Petter, S.1
Straub, D.2
Rai, A.3
-
75
-
-
84970235764
-
Self-reports in organizational research: Problems and prospects
-
P.M. Podsakoff Self-reports in organizational research: problems and prospects J Manag 12 4 1986 Dec 1 531 544
-
(1986)
J Manag
, vol.12
, Issue.4
, pp. 531-544
-
-
Podsakoff, P.M.1
-
76
-
-
0141907688
-
Common method biases in behavioral research: A critical review of the literature and recommended remedies
-
P.M. Podsakoff, S.B. MacKenzie, J.-Y. Lee, and N.P. Podsakoff Common method biases in behavioral research: a critical review of the literature and recommended remedies J Appl Psychol 88 5 2003 Oct 879 903
-
(2003)
J Appl Psychol
, vol.88
, Issue.5
, pp. 879-903
-
-
Podsakoff, P.M.1
Mackenzie, S.B.2
Lee, J.-Y.3
Podsakoff, N.P.4
-
77
-
-
78650770842
-
Improving employees' compliance through information systems security training: An action research study
-
P. Puhakainen, and M. Siponen Improving employees' compliance through information systems security training: an action research study MIS Q 34 4 2010 Dec 1 757 778
-
(2010)
MIS Q
, vol.34
, Issue.4
, pp. 757-778
-
-
Puhakainen, P.1
Siponen, M.2
-
78
-
-
85027371331
-
-
[Internet]. Available from
-
® Survey 2013 [Internet]. Available from: http://www.pwc.com/gx/en/consulting-services/information-security-survey/index. jhtml 2013
-
(2013)
® Survey 2013
-
-
Advisory Services Security, P.1
-
79
-
-
70350061364
-
An empirical comparison of the efficacy of covariance-based and variance-based SEM
-
W. Reinartz, M. Haenlein, and J. Henseler An empirical comparison of the efficacy of covariance-based and variance-based SEM Int J Res Mark 26 4 2009 Dec 332 344
-
(2009)
Int J Res Mark
, vol.26
, Issue.4
, pp. 332-344
-
-
Reinartz, W.1
Haenlein, M.2
Henseler, J.3
-
80
-
-
44049107399
-
Factors influencing organizational knowledge transfer: Implication for corporate performance
-
Emerald Group Publishing Limited
-
J. Rhodes, R. Hung, P. Lok, B.Y.-H. Lien, and C.-M. Wu Factors influencing organizational knowledge transfer: implication for corporate performance J Knowl Manag 12 3 2008 May 30 84 100 Emerald Group Publishing Limited
-
(2008)
J Knowl Manag
, vol.12
, Issue.3
, pp. 84-100
-
-
Rhodes, J.1
Hung, R.2
Lok, P.3
Lien, B.Y.-H.4
Wu, C.-M.5
-
82
-
-
84898061000
-
The development of an instrument for assessing information security in organizations: Examining the content validity using quantitative methods
-
Natal, Brazil, May 22-24
-
W. Rocha Flores, and E. Antonsen The development of an instrument for assessing information security in organizations: examining the content validity using quantitative methods Proceedings of the 2013 international conference on information resources management 2013 Natal, Brazil, May 22-24
-
(2013)
Proceedings of the 2013 International Conference on Information Resources Management
-
-
Rocha Flores, W.1
Antonsen, E.2
-
83
-
-
84898062134
-
Conceptualization of constructs for shaping information security behavior: Towards a measurement instrument
-
Orlando, Florida, USA, December 16
-
W. Rocha Flores, and M. Korman Conceptualization of constructs for shaping information security behavior: towards a measurement instrument Proceedings of the 7th annual workshop on information security and privacy 2012 Orlando, Florida, USA, December 16
-
(2012)
Proceedings of the 7th Annual Workshop on Information Security and Privacy
-
-
Rocha Flores, W.1
Korman, M.2
-
84
-
-
84898073317
-
Using phishing experiments and scenario-based surveys to understand security behaviours in practice
-
[To be available]
-
W. Rocha Flores, H. Holm, G. Svensson, and G. Ericsson Using phishing experiments and scenario-based surveys to understand security behaviours in practice Inf Manag Comput Secur 2014 [To be available]
-
(2014)
Inf Manag Comput Secur
-
-
Rocha Flores, W.1
Holm, H.2
Svensson, G.3
Ericsson, G.4
-
85
-
-
34147178117
-
Introduction: Understanding and dealing with organizational survey nonresponse
-
S.G. Rogelberg, and J.M. Stanton Introduction: understanding and dealing with organizational survey nonresponse Organ Res Methods 10 2 2007 Apr 1 195 209
-
(2007)
Organ Res Methods
, vol.10
, Issue.2
, pp. 195-209
-
-
Rogelberg, S.G.1
Stanton, J.M.2
-
86
-
-
84898059846
-
-
[Internet]. Available from: [cited 01.11.12]
-
SANS gpwn-list [Internet]. Available from: https://lists.sans.org/ mailman/listinfo/gpwn-list 2013 [cited 01.11.12]
-
(2013)
Gpwn-list
-
-
Sans1
-
87
-
-
31744441942
-
Knowledge management: At a cross-way of perspectives and approaches
-
A. Sarmento Knowledge management: at a cross-way of perspectives and approaches Inf Resour Manag J 18 1 2005 1 7
-
(2005)
Inf Resour Manag J
, vol.18
, Issue.1
, pp. 1-7
-
-
Sarmento, A.1
-
88
-
-
77955399954
-
Treating unobserved heterogeneity in PLS path modeling: A comparison of FIMIX-PLS with different data analysis strategies
-
Taylor & Francis
-
M. Sarstedt, and C.M. Ringle Treating unobserved heterogeneity in PLS path modeling: a comparison of FIMIX-PLS with different data analysis strategies J Appl Stat 37 8 2010 Aug 1299 1318 Taylor & Francis
-
(2010)
J Appl Stat
, vol.37
, Issue.8
, pp. 1299-1318
-
-
Sarstedt, M.1
Ringle, C.M.2
-
89
-
-
0006528240
-
Profiles of strategic information systems planning
-
INFORMS
-
A.H. Segars, and V. Grover Profiles of strategic information systems planning Inf Syst Res 10 3 1999 Sep 1 199 232 INFORMS
-
(1999)
Inf Syst Res
, vol.10
, Issue.3
, pp. 199-232
-
-
Segars, A.H.1
Grover, V.2
-
90
-
-
30744438863
-
An analysis of the traditional IS security approaches: Implications for research and practice
-
M.T. Siponen An analysis of the traditional IS security approaches: implications for research and practice Eur J Inf Syst 14 3 2005 Sep 1 303 315
-
(2005)
Eur J Inf Syst
, vol.14
, Issue.3
, pp. 303-315
-
-
Siponen, M.T.1
-
91
-
-
77957068563
-
Neutralization: New insights into the problem of employee systems security policy violations
-
M. Siponen, and A. Vance Neutralization: new insights into the problem of employee systems security policy violations MIS Q 34 3 2010 Sep 1 487 502
-
(2010)
MIS Q
, vol.34
, Issue.3
, pp. 487-502
-
-
Siponen, M.1
Vance, A.2
-
92
-
-
67651102640
-
Information security management standards: Problems and solutions
-
M. Siponen, and R. Willison Information security management standards: problems and solutions Inf Manag 46 5 2009 267 270
-
(2009)
Inf Manag
, vol.46
, Issue.5
, pp. 267-270
-
-
Siponen, M.1
Willison, R.2
-
93
-
-
84898068144
-
-
Emerging trends in computing, informatics, systems sciences, and engineering Springer New York New York, NY
-
T. Sobh, and K. Elleithy Information management for holistic, collaborative information security management Emerging trends in computing, informatics, systems sciences, and engineering 2013 Springer New York New York, NY 211 224
-
(2013)
Information Management for Holistic, Collaborative Information Security Management
, pp. 211-224
-
-
Sobh, T.1
Elleithy, K.2
-
94
-
-
84893698217
-
Variables influencing information security policy compliance: A systematic review of quantitative studies
-
Emerald Group Publishing Limited
-
T. Sommestad, J. Hallberg, K. Lundholm, and J. Bengtsson Variables influencing information security policy compliance: a systematic review of quantitative studies Inf Manag Comput Secur 22 1 2013 Nov 19 3 Emerald Group Publishing Limited
-
(2013)
Inf Manag Comput Secur
, vol.22
, Issue.1
, pp. 3
-
-
Sommestad, T.1
Hallberg, J.2
Lundholm, K.3
Bengtsson, J.4
-
95
-
-
0035995867
-
An internet knowledge sharing system
-
S. Song An internet knowledge sharing system J Comput Inf Syst 42 3 2002 25 30
-
(2002)
J Comput Inf Syst
, vol.42
, Issue.3
, pp. 25-30
-
-
Song, S.1
-
96
-
-
77957070672
-
User participation in information systems security risk management
-
JL Spears, and H Barki User participation in information systems security risk management MIS Q 34 3 2010 503 522
-
(2010)
MIS Q
, vol.34
, Issue.3
, pp. 503-522
-
-
Spears, J.L.1
Barki, H.2
-
97
-
-
33846076044
-
The role of espoused national cultural values in technology acceptance
-
Society for Information Management and The Management Information Systems Research Center
-
M. Srite, and E. Karahanna The role of espoused national cultural values in technology acceptance MIS Q 30 3 2006 Sep 1 679 704 Society for Information Management and The Management Information Systems Research Center
-
(2006)
MIS Q
, vol.30
, Issue.3
, pp. 679-704
-
-
Srite, M.1
Karahanna, E.2
-
98
-
-
0034340864
-
Team structure and performance: Assessing the mediating role of intrateam process and the moderating role of task type
-
G.L. Stewart, and M.R. Barrick Team structure and performance: assessing the mediating role of intrateam process and the moderating role of task type Acad Manag J Acad Manag 43 2 2000 Apr 1 135 148
-
(2000)
Acad Manag J Acad Manag
, vol.43
, Issue.2
, pp. 135-148
-
-
Stewart, G.L.1
Barrick, M.R.2
-
99
-
-
0000280419
-
Effective is security: An empirical study
-
INFORMS
-
D.W. Straub Effective is security: an empirical study Inf Syst Res 1 3 1990 Sep 1 255 276 INFORMS
-
(1990)
Inf Syst Res
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
100
-
-
13244286108
-
Validation guidelines for is positivist research
-
D. Straub, M.-C. Boudreau, and D. Gefen Validation guidelines for is positivist research Commun Assoc Inf Syst 13 1 2004 380 427
-
(2004)
Commun Assoc Inf Syst
, vol.13
, Issue.1
, pp. 380-427
-
-
Straub, D.1
Boudreau, M.-C.2
Gefen, D.3
-
101
-
-
33748594201
-
An information systems security risk assessment model under the Dempster-Shafer theory of belief functions
-
L. Sun, R.P. Ivastave, and T.J. Mock An information systems security risk assessment model under the Dempster-Shafer theory of belief functions J Manag Inf Syst 22 4 2006 Apr 109 142
-
(2006)
J Manag Inf Syst
, vol.22
, Issue.4
, pp. 109-142
-
-
Sun, L.1
Ivastave, R.P.2
Mock, T.J.3
-
104
-
-
35148886676
-
An information security governance framework
-
ACM Press
-
A Da Veiga, and J.H.P. Eloff An information security governance framework Inf Syst Manag 24 4 2007 Oct 2 361 372 ACM Press
-
(2007)
Inf Syst Manag
, vol.24
, Issue.4
, pp. 361-372
-
-
Veiga, A.D.1
Eloff, J.H.P.2
-
105
-
-
76749117937
-
Knowledge sharing: A review and directions for future research
-
S. Wang, and R.A. Noe Knowledge sharing: a review and directions for future research Hum Resour Manag Rev 20 2 2010 115 131
-
(2010)
Hum Resour Manag Rev
, vol.20
, Issue.2
, pp. 115-131
-
-
Wang, S.1
Noe, R.A.2
-
106
-
-
85106113141
-
It governance and organizational design for security management
-
D.W. Straub, S. Goodman, R.L. Baskerville
-
M. Warkentin, and A.C. Johnston It governance and organizational design for security management D.W. Straub, S. Goodman, R.L. Baskerville, Information security: policy, processes, and practice 2007 46 68
-
(2007)
Information Security: Policy, Processes, and Practice
, pp. 46-68
-
-
Warkentin, M.1
Johnston, A.C.2
-
107
-
-
67650170305
-
Behavioral and policy issues in information systems security: The insider threat
-
Nature Publishing Group
-
M. Warkentin, and R. Willison Behavioral and policy issues in information systems security: the insider threat Eur J Inf Syst 18 2 2009 Apr 1 101 105 Nature Publishing Group
-
(2009)
Eur J Inf Syst
, vol.18
, Issue.2
, pp. 101-105
-
-
Warkentin, M.1
Willison, R.2
-
108
-
-
79955622246
-
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention
-
Nature Publishing Group
-
M. Warkentin, A.C. Johnston, and J. Shropshire The influence of the informal social learning environment on information privacy policy compliance efficacy and intention Eur J Inf Syst 20 3 2011 Jan 25 267 284 Nature Publishing Group
-
(2011)
Eur J Inf Syst
, vol.20
, Issue.3
, pp. 267-284
-
-
Warkentin, M.1
Johnston, A.C.2
Shropshire, J.3
-
109
-
-
67650883222
-
An integrated view of human, organizational, and technological challenges of IT security management
-
Emerald Group Publishing Limited
-
R. Werlinger, K. Hawkey, and K. Beznosov An integrated view of human, organizational, and technological challenges of IT security management Inf Manag Comput Secur 17 1 2009 Mar 20 4 19 Emerald Group Publishing Limited
-
(2009)
Inf Manag Comput Secur
, vol.17
, Issue.1
, pp. 4-19
-
-
Werlinger, R.1
Hawkey, K.2
Beznosov, K.3
-
110
-
-
33845536599
-
Internalisation of information security culture amongst employees through basic security knowledge
-
S. Fischer-Hübner, K. Rannenberg, L. Yngström, S. Lindskog, Kluwer Academic Publishers Boston
-
O. Zakaria Internalisation of information security culture amongst employees through basic security knowledge S. Fischer-Hübner, K. Rannenberg, L. Yngström, S. Lindskog, Security and privacy in dynamic environments 2006 Kluwer Academic Publishers Boston 437 441
-
(2006)
Security and Privacy in Dynamic Environments
, pp. 437-441
-
-
Zakaria, O.1
|