-
1
-
-
0043232732
-
Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures
-
Adams, A., & Sasse, M. A. (1999). Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures. Communications of the ACM, 42(12), 41-46.
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 41-46
-
-
Adams, A.1
Sasse, M.A.2
-
2
-
-
84870022933
-
Defining key concepts for collaboration engineering
-
Acapulco, Mexico
-
Briggs, R., Kolfschoten, G., Gert-Jan, V., & Douglas, D. (2006). Defining key concepts for collaboration engineering. In Americas Conference on Information Systems, AMCIS 2006 Proceedings, Acapulco, Mexico
-
(2006)
Americas Conference On Information Systems, AMCIS 2006 Proceedings
-
-
Briggs, R.1
Kolfschoten, G.2
Gert-Jan, V.3
Douglas, D.4
-
3
-
-
32844472020
-
Achievement-based rewards and intrinsic motivation: A test of cognitive mediators
-
doi:10.1037/0022-0663.97.4.641
-
Cameron, J., Pierce, W. D., Banko, K. M., & Gear, A. (2005). Achievement-based rewards and intrinsic motivation: A test of cognitive mediators. Journal of Educational Psychology, 97(4), 641-655. doi:10.1037/0022-0663.97.4.641
-
(2005)
Journal of Educational Psychology
, vol.97
, Issue.4
, pp. 641-655
-
-
Cameron, J.1
Pierce, W.D.2
Banko, K.M.3
Gear, A.4
-
4
-
-
0001894980
-
Cultural congruence, strength and type: Relationships to effectiveness
-
Cameron, K., & Freeman, S. (1991). Cultural congruence, strength and type: Relationships to effectiveness. Research in Organizational Change and Development, 5, 23-58.
-
(1991)
Research In Organizational Change and Development
, vol.5
, pp. 23-58
-
-
Cameron, K.1
Freeman, S.2
-
5
-
-
33947189095
-
Exploring organizational culture for information security management
-
doi:10.1108/02635570710734316
-
Chang, S. E., & Lin, C. S. (2007). Exploring organizational culture for information security management. Industrial Management & Data Systems, 107(3), 438-458. doi:10.1108/02635570710734316
-
(2007)
Industrial Management & Data Systems
, vol.107
, Issue.3
, pp. 438-458
-
-
Chang, S.E.1
Lin, C.S.2
-
6
-
-
84862925338
-
Understanding organizational security culture
-
Japan, 2002, Japan
-
Chia, P. A., Maynard, S. B., & Ruighaver, A. B. (2002). Understanding organizational security culture. In Proceedings of PACIS 2002. Japan, 2002, Japan.
-
(2002)
Proceedings of PACIS 2002
-
-
Chia, P.A.1
Maynard, S.B.2
Ruighaver, A.B.3
-
8
-
-
0010612318
-
Management theory and total quality: Improving research and practice through theory development
-
Dean, J. W., & Bowen, D. E. (1994). Management theory and total quality: Improving research and practice through theory development. Academy of Management Review, 19, 392-418.
-
(1994)
Academy of Management Review
, vol.19
, pp. 392-418
-
-
Dean, J.W.1
Bowen, D.E.2
-
9
-
-
0003964033
-
-
Cambridge, MA, MIT Center for Advanced Engineering Study
-
Deming, W. E. (1986). Out of the Crisis. Cambridge, MA: MIT Center for Advanced Engineering Study.
-
(1986)
Out of the Crisis
-
-
Deming, W.E.1
-
11
-
-
84879906958
-
Toward a theory of organizational culture and effectiveness
-
doi:10.1287/orsc.6.2.204
-
Denison, D. R., & Mishra, A. (1995). Toward a theory of organizational culture and effectiveness. Organization Science, 6, 204-224. doi:10.1287/orsc.6.2.204
-
(1995)
Organization Science
, vol.6
, pp. 204-224
-
-
Denison, D.R.1
Mishra, A.2
-
12
-
-
0034335593
-
A framework for linking culture and improvement initiatives in organisations
-
Detert, J. R., Schroeder, R. G., & Mauriel, J. J. (2000). A framework for linking culture and improvement initiatives in organisations. Academy of Management Review, 25(4), 850-863.
-
(2000)
Academy of Management Review
, vol.25
, Issue.4
, pp. 850-863
-
-
Detert, J.R.1
Schroeder, R.G.2
Mauriel, J.J.3
-
14
-
-
0001336426
-
Agency theory: An assessment and review
-
Eisenhardt, K. M. (1989). Agency theory: An assessment and review. Academy of Management Review, 14(1), 57-74.
-
(1989)
Academy of Management Review
, vol.14
, Issue.1
, pp. 57-74
-
-
Eisenhardt, K.M.1
-
15
-
-
85031300675
-
Building management commitment through security councils, or security council critical success factors
-
In Tipton, H. F. (Ed.), Hoboken, NJ, Auerbach Publications, doi:10.1201/9781439833032.ch10
-
Fitzgerald, T. (2007). Building management commitment through security councils, or security council critical success factors. In Tipton, H. F. (Ed.), Information security management handbook (pp. 105-121). Hoboken, NJ: Auerbach Publications. doi:10.1201/9781439833032.ch10
-
(2007)
Information Security Management Handbook
, pp. 105-121
-
-
Fitzgerald, T.1
-
16
-
-
61349200300
-
From culture to disobedience: Recognising the varying user acceptance of IT security
-
doi:10.1016/S1361-3723(09)70019-3
-
Furnell, S., & Thompson, K. L. (2009). From culture to disobedience: Recognising the varying user acceptance of IT security. Computer Fraud & Security, 2, 5-10. doi:10.1016/S1361-3723(09)70019-3
-
(2009)
Computer Fraud & Security
, vol.2
, pp. 5-10
-
-
Furnell, S.1
Thompson, K.L.2
-
17
-
-
1142275569
-
Information security culture in a value net
-
Managing Technologically Driven Organizations: The Human Side of Innovation and Change
-
Helokunnas, T., & Kuusisto, R. (2003). Information security culture in a value net. In Engineering Management Conference, 2003. IEMC'03. Managing Technologically Driven Organizations: The Human Side of Innovation and Change.
-
(2003)
Engineering Management Conference, 2003. IEMC'03
-
-
Helokunnas, T.1
Kuusisto, R.2
-
19
-
-
84936823890
-
Measuring organizational cultures: A qualitative and quantitative study across twenty cases
-
doi:10.2307/2393392
-
Hofstede, G., Neuijen, B., Ohayv, D. D., & Sanders, G. (1990). Measuring organizational cultures: A qualitative and quantitative study across twenty cases. Administrative Science Quarterly, 35(2), 286-316. doi:10.2307/2393392
-
(1990)
Administrative Science Quarterly
, vol.35
, Issue.2
, pp. 286-316
-
-
Hofstede, G.1
Neuijen, B.2
Ohayv, D.D.3
Sanders, G.4
-
20
-
-
0001946339
-
A set of principles for conducting and evaluating interpretative field studies in Information Systems
-
doi:10.2307/249410
-
Klein, H. K., & Myers, M. D. (1999). A set of principles for conducting and evaluating interpretative field studies in Information Systems. Management Information Systems Quarterly, 23(1), 67-94. doi:10.2307/249410
-
(1999)
Management Information Systems Quarterly
, vol.23
, Issue.1
, pp. 67-94
-
-
Klein, H.K.1
Myers, M.D.2
-
21
-
-
33644533141
-
Information security: Management's effect on culture and policy
-
doi:10.1108/09685220610648355
-
Knapp, K. J., Marshall, T. E., Rainer, R. K., & Ford, F. N. (2006). Information security: Management's effect on culture and policy. Information and Computer Security, 14(1), 24-36. doi:10.1108/09685220610648355
-
(2006)
Information and Computer Security
, vol.14
, Issue.1
, pp. 24-36
-
-
Knapp, K.J.1
Marshall, T.E.2
Rainer, R.K.3
Ford, F.N.4
-
22
-
-
84864560732
-
Security governance: Its impact on security culture
-
Perth
-
Koh, K., Ruighaver, A. B., Maynard, S. B., & Ahmad, A. (2005). Security governance: Its impact on security culture. In Proceedings of the 3rd Australian Information Security Management Conference, Perth.
-
(2005)
Proceedings of the 3rd Australian Information Security Management Conference
-
-
Koh, K.1
Ruighaver, A.B.2
Maynard, S.B.3
Ahmad, A.4
-
23
-
-
84859691459
-
Unite security culture: May a unified security culture be plausible
-
Royal Holloway, University of London, UK
-
Kuusisto, R., Nyberg, K., & Virtanen, T. (2004). Unite security culture: May a unified security culture be plausible. In Proceedings of the 3rd European Conference on Information Warfare and Security, Royal Holloway, University of London, UK.
-
(2004)
Proceedings of the 3rd European Conference On Information Warfare and Security
-
-
Kuusisto, R.1
Nyberg, K.2
Virtanen, T.3
-
24
-
-
40549099995
-
Promoting personal responsibility for Internet safety
-
doi:10.1145/1325555.1325569
-
LaRose, R., Rifon, N. J., & Enbody, R. (2008). Promoting personal responsibility for Internet safety. Communications of the ACM, 51(3), 71-76. doi:10.1145/1325555.1325569
-
(2008)
Communications of the ACM
, vol.51
, Issue.3
, pp. 71-76
-
-
Larose, R.1
Rifon, N.J.2
Enbody, R.3
-
25
-
-
84862938476
-
Embedding information security culture - emerging concerns and challenges
-
Taipei, Taiwan
-
Lim, J. S., Ahmad, A., Chang, S., & Maynard, S. B. (2010). Embedding information security culture - emerging concerns and challenges. 14th Pacific Asia Conference on Information Systems. Taipei, Taiwan.
-
(2010)
14th Pacific Asia Conference On Information Systems
-
-
Lim, J.S.1
Ahmad, A.2
Chang, S.3
Maynard, S.B.4
-
26
-
-
84864552045
-
Exploring the relationship between organizational culture and information security culture
-
Perth, Western Australia
-
Lim, J. S., Chang, S., Maynard, S. B., & Ahmad, A. (2009). Exploring the relationship between organizational culture and information security culture. In 7th Australian Information Security Management Conference, SECAU Security Congress 2009, Perth, Western Australia.
-
(2009)
7th Australian Information Security Management Conference, SECAU Security Congress 2009
-
-
Lim, J.S.1
Chang, S.2
Maynard, S.B.3
Ahmad, A.4
-
28
-
-
84864562281
-
What makes a good information security policy: A preliminary framework for evaluating security policy quality
-
Las Vegas, Nevada USA
-
Maynard, S. B., & Ruighaver, A. B. (2006). What makes a good information security policy: A preliminary framework for evaluating security policy quality. In Proceedings of the Fifth Annual Security Conference, Las Vegas, Nevada USA.
-
(2006)
Proceedings of the Fifth Annual Security Conference
-
-
Maynard, S.B.1
Ruighaver, A.B.2
-
29
-
-
0000250672
-
People and organizational culture: A profile comparison approach to assessing personorganization fit
-
doi:10.2307/256404
-
O'Reilly, C. A., Chatman, J. R., & Caldwell, D. F. (1991). People and organizational culture: A profile comparison approach to assessing personorganization fit. Academy of Management Journal, 34(3), 487-516. doi:10.2307/256404
-
(1991)
Academy of Management Journal
, vol.34
, Issue.3
, pp. 487-516
-
-
O'Reilly, C.A.1
Chatman, J.R.2
Caldwell, D.F.3
-
32
-
-
77957881878
-
Collaborative risk method for information security management practices: A case context within Turkey
-
doi:10.1016/j.ijinfomgt.2010.08.007
-
Ozkana, S., & Karabacaka, B. (2010). Collaborative risk method for information security management practices: A case context within Turkey. International Journal of Information Management, 30, 567-572. doi:10.1016/j.ijinfomgt.2010.08.007
-
(2010)
International Journal of Information Management
, vol.30
, pp. 567-572
-
-
Ozkana, S.1
Karabacaka, B.2
-
33
-
-
84980302007
-
Organizational culture as related to industry, position, and performance: A preminary report
-
doi:10.1111/j.1467-6486.1986. tb00958.x
-
Reynolds, P. D. (1986). Organizational culture as related to industry, position, and performance: A preminary report. Journal of Management Studies, 23(3), 333-345. doi:10.1111/j.1467-6486.1986. tb00958.x
-
(1986)
Journal of Management Studies
, vol.23
, Issue.3
, pp. 333-345
-
-
Reynolds, P.D.1
-
36
-
-
33846849570
-
Organisational security culture: Extending the end-user perspective
-
doi:10.1016/j.cose.2006.10.008
-
Ruighaver, A. B., Maynard, S. B., & Chang, S. (2007). Organisational security culture: Extending the end-user perspective. Computers & Security, 26(1), 56-62. doi:10.1016/j.cose.2006.10.008
-
(2007)
Computers & Security
, vol.26
, Issue.1
, pp. 56-62
-
-
Ruighaver, A.B.1
Maynard, S.B.2
Chang, S.3
-
38
-
-
0002541451
-
Good seeds grow in strong cultures
-
Saphier, J., & King, M. (1985). Good seeds grow in strong cultures. Educational Leadership, 43(6), 67-74.
-
(1985)
Educational Leadership
, vol.43
, Issue.6
, pp. 67-74
-
-
Saphier, J.1
King, M.2
-
40
-
-
78650874414
-
Information security culture - The social-cultural dimension in information security management
-
Cairo, Egypt
-
Schlienger, T., & Teufel, S. (2002). Information security culture - The social-cultural dimension in information security management. In IFIP TC11 International Conference on Information Security, Cairo, Egypt.
-
(2002)
IFIP TC11 International Conference On Information Security
-
-
Schlienger, T.1
Teufel, S.2
-
42
-
-
84862950417
-
Risk management standard-The perception of ease of use
-
Las Vegas, Nevada, USA
-
Shedden, P., Ahmad, A., & Ruighaver, A. B. (2006). Risk management standard-The perception of ease of use. In Proceedings of the Fifth Annual Security Conference, Las Vegas, Nevada, USA.
-
(2006)
Proceedings of the Fifth Annual Security Conference
-
-
Shedden, P.1
Ahmad, A.2
Ruighaver, A.B.3
-
43
-
-
67651102640
-
Information security management standards: Problems and solutions
-
doi:10.1016/j.im.2008.12.007
-
Siponen, M., & Willison, R. (2009). Information security management standards: Problems and solutions. Information & Management, 46, 267-270. doi:10.1016/j.im.2008.12.007
-
(2009)
Information & Management
, vol.46
, pp. 267-270
-
-
Siponen, M.1
Willison, R.2
-
44
-
-
84864572119
-
Beyond information security awareness training: It is time to change the culture
-
In Tipton, H. F. (Ed.), Hoboken, NJ, Auerbach Publications
-
Stan, S. (2007). Beyond information security awareness training: It is time to change the culture. In Tipton, H. F. (Ed.), Information security management handbook (pp. 555-565). Hoboken, NJ: Auerbach Publications.
-
(2007)
Information Security Management Handbook
, pp. 555-565
-
-
Stan, S.1
-
46
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
doi:10.2307/249551
-
Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. Management Information Systems Quarterly, 22(4), 441-469. doi:10.2307/249551
-
(1998)
Management Information Systems Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
48
-
-
33750923703
-
Cultivating an organizational information security culture
-
doi:10.1016/S1361-3723(06)70430-4
-
Thomson, K., von Solms, R., & Louw, L. (2006). Cultivating an organizational information security culture. Computer Fraud & Security, (10): 7-11. doi:10.1016/S1361-3723(06)70430-4
-
(2006)
Computer Fraud & Security
, Issue.10
, pp. 7-11
-
-
Thomson, K.1
von Solms, R.2
Louw, L.3
-
50
-
-
74449092722
-
A framework and assessment instrument for information security culture
-
doi:10.1016/j.cose.2009.09.002
-
Veiga, A. D., & Eloff, J. H. P. (2009). A framework and assessment instrument for information security culture. Computers & Security, 29, 196-207. doi:10.1016/j.cose.2009.09.002
-
(2009)
Computers & Security
, vol.29
, pp. 196-207
-
-
Veiga, A.D.1
Eloff, J.H.P.2
-
51
-
-
0033657872
-
Information security --The third wave?
-
doi:10.1016/S0167-4048(00)07021-8
-
Von Solms, B. (2000). Information security --The third wave? Computers & Security, 19(7), 615-620. doi:10.1016/S0167-4048(00)07021-8
-
(2000)
Computers & Security
, vol.19
, Issue.7
, pp. 615-620
-
-
von Solms, B.1
-
52
-
-
0034814690
-
Information Security -- A multidimensional discipline
-
doi:10.1016/S0167-4048(01)00608-3
-
Von Solms, B. (2001). Information Security -- A multidimensional discipline. Computers & Security, 20(6), 504-508. doi:10.1016/S0167-4048(01)00608-3
-
(2001)
Computers & Security
, vol.20
, Issue.6
, pp. 504-508
-
-
von Solms, B.1
-
53
-
-
2342475711
-
Towards information security behavioural compliance
-
doi:10.1016/j.cose.2004.01.012
-
Vroom, C., & von Solms, R. (2004). Towards information security behavioural compliance. Computers & Security, 23(3), 191-198. doi:10.1016/j. cose.2004.01.012
-
(2004)
Computers & Security
, vol.23
, Issue.3
, pp. 191-198
-
-
Vroom, C.1
von Solms, R.2
-
54
-
-
84974872728
-
Interpretive case studies in IS research: Nature and method
-
doi:10.1057/ejis.1995.9
-
Walsham, G. (1995). Interpretive case studies in IS research: Nature and method. European Journal of Information Systems, 4, 74-81. doi:10.1057/ejis.1995.9
-
(1995)
European Journal of Information Systems
, vol.4
, pp. 74-81
-
-
Walsham, G.1
-
56
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
Workman, M., Bommer, W., & Straub, D. (2008). Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior.
-
(2008)
Computers In Human Behavior
-
-
Workman, M.1
Bommer, W.2
Straub, D.3
|