메뉴 건너뛰기




Volumn 23, Issue 3, 2014, Pages 289-305

Guidelines for improving the contextual relevance of field surveys: The case of information security policy violations

Author keywords

Applied science; Content validity; Context validity; Field surveys; Generalizability; Information security policy violations

Indexed keywords

PUBLIC POLICY; SECURITY OF DATA; SECURITY SYSTEMS; SURVEYS;

EID: 84901290529     PISSN: 0960085X     EISSN: 14769344     Source Type: Journal    
DOI: 10.1057/ejis.2012.59     Document Type: Review
Times cited : (116)

References (69)
  • 2
    • 34248641798 scopus 로고    scopus 로고
    • The privacy lawyer: Cyberloafing's drain on productivity
    • [WWWdocument]
    • AFTAB P (2003) The privacy lawyer: cyberloafing's drain on productivity. Information Week, [WWWdocument], http://www.informationweek.com/news/16000567.
    • (2003) Information Week
    • Aftab, P.1
  • 4
  • 5
    • 77957077814 scopus 로고    scopus 로고
    • Practicing safe computing: A multimethod empirical examination of home computer user security behavior intentions
    • ANDERSON C and AGARWAL R (2010) Practicing safe computing: a multimethod empirical examination of home computer user security behavior intentions. MIS Quarterly 34(3), 613-643.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 613-643
    • Anderson, C.1    Agarwal, R.2
  • 6
    • 84933494181 scopus 로고
    • The rationality of sexual offending: Testing a deterrence/rational choice conception of sexual assault
    • BACHMAN R, PATERNOSTER R and WARD S (1992) The rationality of sexual offending: testing a deterrence/rational choice conception of sexual assault. Law & Society Review 26(2), 343-372.
    • (1992) Law & Society Review , vol.26 , Issue.2 , pp. 343-372
    • Bachman, R.1    Paternoster, R.2    Ward, S.3
  • 7
    • 0002624070 scopus 로고    scopus 로고
    • Empirical research in information systems: The practice of relevance
    • BENBASAT I and ZMUD R (1999) Empirical research in information systems: the practice of relevance. MIS Quarterly 23(1), 3-16.
    • (1999) MIS Quarterly , vol.23 , Issue.1 , pp. 3-16
    • Benbasat, I.1    Zmud, R.2
  • 8
    • 67650100804 scopus 로고    scopus 로고
    • If someone is watching, i'll do what i'm asked: Mandatoriness, control, and information security
    • BOSS S, KIRSCH L, ANGERMEIER I, SHINGLER R and BOSS R (2009) If someone is watching, i'll do what i'm asked: mandatoriness, control, and information security. European Journal of Information Systems 18(2), 151-164.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 151-164
    • Boss, S.1    Kirsch, L.2    Angermeier, I.3    Shingler, R.4    Boss, R.5
  • 9
    • 9744260316 scopus 로고    scopus 로고
    • Validation in information systems research: A state of - The-art assessment
    • BOUDREAU M, GEFEN D and STRAUB DW (2001) Validation in information systems research: a state of-the-art assessment. MIS Quarterly 25(1), 1-26.
    • (2001) MIS Quarterly , vol.25 , Issue.1 , pp. 1-26
    • Boudreau, M.1    Gefen, D.2    Straub, D.W.3
  • 10
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    • BULGURCU B, CAVUSOGLU H and BENBASAT I (2010) Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Quarterly 34(3), 523-548.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 13
    • 61349159889 scopus 로고    scopus 로고
    • Perceptions of information security in the workplace: Linking information security climate to compliant behavior
    • CHAN M, WOON I and KANKANHALLI A (2005) Perceptions of information security in the workplace: linking information security climate to compliant behavior. Journal of Information Privacy and Security 1(3), 18-41.
    • (2005) Journal of Information Privacy and Security , vol.1 , Issue.3 , pp. 18-41
    • Chan, M.1    Woon, I.2    Kankanhalli, A.3
  • 14
    • 0003293068 scopus 로고
    • Criminology, routine activity and rational choice
    • (CLARKE R and FELSON M, Eds) Transaction Publishers, New Brunswick, NJ
    • CLARKE R and FELSON M (1993) Criminology, routine activity and rational choice. In Routine Activity and Rational Choice (CLARKE R and FELSON M, Eds), pp. 1-14, Transaction Publishers, New Brunswick, NJ.
    • (1993) Routine Activity and Rational Choice , pp. 1-14
    • Clarke, R.1    Felson, M.2
  • 15
    • 67649551429 scopus 로고    scopus 로고
    • User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
    • D'ARCY J, HOVAV A and GALLETTA D (2009) User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Information Systems Research 20(1), 79-98.
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 79-98
    • D'arcy, J.1    Hovav, A.2    Galletta, D.3
  • 17
    • 81255163048 scopus 로고    scopus 로고
    • Understanding nonmalicious security violations in the workplace: A composite behavior model
    • GUO K, YUFEI Y, ARCHER N and CONNELLY C (2011) Understanding nonmalicious security violations in the workplace: a composite behavior model. Journal of Management Information Systems 28(2), 203-236.
    • (2011) Journal of Management Information Systems , vol.28 , Issue.2 , pp. 203-236
    • Guo, K.1    Yufei, Y.2    Archer, N.3    Connelly, C.4
  • 19
    • 0000917858 scopus 로고    scopus 로고
    • The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
    • HARRINGTON SJ (1996) The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly 20(3), 257-278.
    • (1996) MIS Quarterly , vol.20 , Issue.3 , pp. 257-278
    • Harrington, S.J.1
  • 20
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organizations
    • HERATH T and RAO HR (2009a) Protection motivation and deterrence: a framework for security policy compliance in organizations. European Journal of Information Systems 18(2), 106-125.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 21
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
    • HERATH T and RAO HR (2009b) Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness. Decision Support Systems 47(2), 54-165.
    • (2009) Decision Support Systems , vol.47 , Issue.2 , pp. 54-165
    • Herath, T.1    Rao, H.R.2
  • 22
    • 84860524113 scopus 로고    scopus 로고
    • The centrality of low self-control in internal computer offenses
    • (VANCE A, Ed), (sponsored by IFIP WG8.11/WG11.13) Bentley University, Waltham, MA
    • HU Q, XU Z, DINEV T and LING H (2010) The centrality of low self-control in internal computer offenses. In Proceedings of the Dewald Roode Information Security Research Workshop (VANCE A, Ed), (sponsored by IFIP WG8.11/WG11.13) Bentley University, Waltham, MA.
    • (2010) Proceedings of the Dewald Roode Information Security Research Workshop
    • Hu, Q.1    Xu, Z.2    Dinev, T.3    Ling, H.4
  • 23
    • 79959944364 scopus 로고    scopus 로고
    • Does deterrence really work in reducing information security policy violations by employees?
    • HU Q, XU Z, DINEV T and LING H (2011) Does deterrence really work in reducing information security policy violations by employees? Communications of the ACM 54(6), 54-60.
    • (2011) Communications of the ACM , vol.54 , Issue.6 , pp. 54-60
    • Hu, Q.1    Xu, Z.2    Dinev, T.3    Ling, H.4
  • 24
    • 84970331544 scopus 로고
    • Measurement in cross-cultural psychology: A review and comparison of strategies
    • HUI C and TRIANDIS H (1985) Measurement in cross-cultural psychology: a review and comparison of strategies. Journal of Cross-Cultural Psychology 16(2), 131-152.
    • (1985) Journal of Cross-Cultural Psychology , vol.16 , Issue.2 , pp. 131-152
    • Hui, C.1    Triandis, H.2
  • 25
    • 31944451470 scopus 로고    scopus 로고
    • Factorial survey methods for studying beliefs and judgments
    • JASSO G (2006) Factorial survey methods for studying beliefs and judgments. Sociological Methods & Research 34(3), 334-423.
    • (2006) Sociological Methods & Research , vol.34 , Issue.3 , pp. 334-423
    • Jasso, G.1
  • 26
    • 77957057727 scopus 로고    scopus 로고
    • Fear appeals and information security behaviors: An empirical study
    • JOHNSTON A and WARKENTIN M (2010a) Fear appeals and information security behaviors: an empirical study. MIS Quarterly 34(3), 549-566.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 549-566
    • Johnston, A.1    Warkentin, M.2
  • 27
    • 77956282930 scopus 로고    scopus 로고
    • The influence of perceived source credibility on end user attitudes and intentions to comply with recommended IT actions
    • JOHNSTON A andWARKENTIN M (2010b) The influence of perceived source credibility on end user attitudes and intentions to comply with recommended IT actions. Journal of Organizational and End User Computing 22(3), 1-21.
    • (2010) Journal of Organizational and End User Computing , vol.22 , Issue.3 , pp. 1-21
    • Johnston, A.1    Warkentin, M.2
  • 28
    • 80052902327 scopus 로고    scopus 로고
    • Toward a new meta-theory for designing information systems (IS) security training approaches
    • Article 3
    • KARJALAINEN M and SIPONEN M (2011) Toward a new meta-theory for designing information systems (IS) security training approaches. Journal of the Association for Information Systems 12(8), Article 3.
    • (2011) Journal of the Association for Information Systems , vol.12 , Issue.8
    • Karjalainen, M.1    Siponen, M.2
  • 29
    • 0024447728 scopus 로고
    • The deterrent effect of perceived certainty and severity of punishment revisited
    • KLEPPER S and NAGIN D (1989) The deterrent effect of perceived certainty and severity of punishment revisited. Criminology 27(4), 721-746.
    • (1989) Criminology , vol.27 , Issue.4 , pp. 721-746
    • Klepper, S.1    Nagin, D.2
  • 31
    • 0141860786 scopus 로고    scopus 로고
    • Generalizing generalizability in information systems research
    • LEE A and BASKERVILLE R (2003) Generalizing generalizability in information systems research. Information Systems Research 14(3), 221-243.
    • (2003) Information Systems Research , vol.14 , Issue.3 , pp. 221-243
    • Lee, A.1    Baskerville, R.2
  • 32
    • 2342489402 scopus 로고    scopus 로고
    • An integrative model of computer abuse based on social control and general deterrence theories
    • LEE SM, LEE SG and YOO S (2004) An integrative model of computer abuse based on social control and general deterrence theories. Information & Management 41(6), 707-718.
    • (2004) Information & Management , vol.41 , Issue.6 , pp. 707-718
    • Lee, S.M.1    Lee, S.G.2    Yoo, S.3
  • 33
    • 12444325211 scopus 로고    scopus 로고
    • Force of habit and information systems usage: Theory and initial validation
    • LIMAYEM M and HIRT SG (2003) Force of habit and information systems usage: theory and initial validation. Journal of the AIS 4(1), 65-97.
    • (2003) Journal of the AIS , vol.4 , Issue.1 , pp. 65-97
    • Limayem, M.1    Hirt, S.G.2
  • 34
    • 80051733015 scopus 로고    scopus 로고
    • Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques
    • MACKENZIE SB, PODSAKOFF PM and PODSAKOFF NP (2011) Construct measurement and validation procedures in MIS and behavioral research: integrating new and existing techniques. MIS Quarterly 35(2), 293-334.
    • (2011) MIS Quarterly , vol.35 , Issue.2 , pp. 293-334
    • Mackenzie, S.B.1    Podsakoff, P.M.2    Podsakoff, N.P.3
  • 35
    • 84965874692 scopus 로고
    • Dilemmatics: The study of research choices and dilemmas
    • MCGRATH J (1981) Dilemmatics: the study of research choices and dilemmas. American Behavioral Scientist 25(2), 179-210.
    • (1981) American Behavioral Scientist , vol.25 , Issue.2 , pp. 179-210
    • McGrath, J.1
  • 36
    • 73449149291 scopus 로고
    • Development of an instrument to measure the perceptions of adopting an information technology innovation
    • MOORE G and BENBASAT I (1991) Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research 2(3), 192-222.
    • (1991) Information Systems Research , vol.2 , Issue.3 , pp. 192-222
    • Moore, G.1    Benbasat, I.2
  • 37
    • 67650143327 scopus 로고    scopus 로고
    • What levels of moral reasoning and values explain adherence to information security policies? An empirical study
    • MYYRY L, SIPONEN M, PAHNILA S, VARTIAINEN T and VANCE A (2009) What levels of moral reasoning and values explain adherence to information security policies? An empirical study. European Journal of Information Systems 18(2), 126-139.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 126-139
    • Myyry, L.1    Siponen, M.2    Pahnila, S.3    Vartiainen, T.4    Vance, A.5
  • 38
    • 61349092288 scopus 로고    scopus 로고
    • Studying users' computer security behavior using the health belief model
    • NG BY, KANKANHALLI A and XU Y (2009) Studying users' computer security behavior using the health belief model. Decision Support Systems 46(4), 815-825.
    • (2009) Decision Support Systems , vol.46 , Issue.4 , pp. 815-825
    • By, N.G.1    Kankanhalli, A.2    Xu, Y.3
  • 39
    • 0005214302 scopus 로고
    • The aim and structure of applied research
    • NIINILUOTO I (1993) The aim and structure of applied research. Erkenntnis 38(1), 1-21.
    • (1993) Erkenntnis , vol.38 , Issue.1 , pp. 1-21
    • Niiniluoto, I.1
  • 40
    • 23944438620 scopus 로고    scopus 로고
    • A review of the empirical ethical decision-making literature: 1996-2003
    • O'FALLON M and BUTTERFIELD K (2005) A review of the empirical ethical decision-making literature: 1996-2003. Journal of Business Ethics 59(4), 375-413.
    • (2005) Journal of Business Ethics , vol.59 , Issue.4 , pp. 375-413
    • O'fallon, M.1    Butterfield, K.2
  • 43
    • 38549116762 scopus 로고    scopus 로고
    • Specifying formative constructs in IS research
    • PETTER S, STRAUB D and RAI A (2007) Specifying formative constructs in IS research. MIS Quarterly 31(4), 623-656.
    • (2007) MIS Quarterly , vol.31 , Issue.4 , pp. 623-656
    • Petter, S.1    Straub, D.2    Rai, A.3
  • 44
    • 0030521693 scopus 로고    scopus 로고
    • Sanction threats and appeals to morality: Testing a rational choice model of corporate crime
    • PATERNOSTER R and SIMPSON S (1996) Sanction threats and appeals to morality: testing a rational choice model of corporate crime. Law and Society Review 30(3), 549-584.
    • (1996) Law and Society Review , vol.30 , Issue.3 , pp. 549-584
    • Paternoster, R.1    Simpson, S.2
  • 45
    • 27844606454 scopus 로고    scopus 로고
    • Integrating the desire-forcontrol and rational choice in a corporate crime context
    • PIQUERO NL, EXUM ML and SIMPSON SS (2005) Integrating the desire-forcontrol and rational choice in a corporate crime context. Justice Quarterly 22(2), 252-280.
    • (2005) Justice Quarterly , vol.22 , Issue.2 , pp. 252-280
    • Piquero, N.L.1    Exum, M.L.2    Simpson, S.S.3
  • 46
    • 77958615428 scopus 로고    scopus 로고
    • PRICEWATERHOUSECOOPERS. [WWW document] (accessed 31 May 2010)
    • PRICEWATERHOUSECOOPERS (2010) Information security breaches survey 2010. [WWW document], http://www.pwc.co.uk/pdf/isbs-survey-2010-technical-report.pdf (accessed 31 May 2010).
    • (2010) Information Security Breaches Survey 2010
  • 47
    • 78650770842 scopus 로고    scopus 로고
    • Improving employees' compliance through information systems security training: An action research study
    • PUHAKAINEN P and SIPONEN M (2010) Improving employees' compliance through information systems security training: an action research study. MIS Quarterly 34(4), 757-778.
    • (2010) MIS Quarterly , vol.34 , Issue.4 , pp. 757-778
    • Puhakainen, P.1    Siponen, M.2
  • 48
    • 21844526560 scopus 로고
    • A typology of deviant workplace behaviors: A multidimensional scaling study
    • ROBINSON S and BENNETT R (1995) A typology of deviant workplace behaviors: a multidimensional scaling study. Academy of Management Journal 38(2), 555-572.
    • (1995) Academy of Management Journal , vol.38 , Issue.2 , pp. 555-572
    • Robinson, S.1    Bennett, R.2
  • 49
    • 84884295285 scopus 로고    scopus 로고
    • Riding the wave: Past trends and future directions for health IT research
    • ROMANOW D, CHO S and STRAUB D (2012) Riding the wave: past trends and future directions for health IT research. MIS Quarterly 36(3), iii-x.
    • (2012) MIS Quarterly , vol.36 , Issue.3
    • Romanow, D.1    Cho, S.2    Straub, D.3
  • 50
    • 0002196438 scopus 로고
    • Vignette analysis: Uncovering the normative structure of complex judgments
    • (ROBERT KM, JAMES SC and PETER HR Eds), Free Press, New York
    • ROSSI P (1979) Vignette analysis: uncovering the normative structure of complex judgments. In (ROBERT KM, JAMES SC and PETER HR Eds) Qualitative and Quantitative Social Research: Papers in honor of Paul F. Lazarsfeld, pp. 176-186, Free Press, New York.
    • (1979) Qualitative and Quantitative Social Research: Papers in Honor of Paul F. Lazarsfeld , pp. 176-186
    • Rossi, P.1
  • 51
    • 84857005992 scopus 로고    scopus 로고
    • Towards the improved treatment of generalization of knowledge claims in IS research: Drawing general conclusions from samples
    • SEDDON P and SCHEEPERS R (2011) Towards the improved treatment of generalization of knowledge claims in IS research: drawing general conclusions from samples. European Journal of Information Systems 21(1), 6-21.
    • (2011) European Journal of Information Systems , vol.21 , Issue.1 , pp. 6-21
    • Seddon, P.1    Scheepers, R.2
  • 53
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational IS security awareness
    • SIPONEN MT (2000) A conceptual foundation for organizational IS security awareness. Information Management & Computer Security 8(1), 31-41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.T.1
  • 54
    • 39749091576 scopus 로고    scopus 로고
    • IS security design theory framework and six approaches to the application of ISPs and guidelines
    • SIPONEN MT and IIVARI J (2006) IS security design theory framework and six approaches to the application of ISPs and guidelines. Journal of the Association for Information Systems 7(7), 445-472.
    • (2006) Journal of the Association for Information Systems , vol.7 , Issue.7 , pp. 445-472
    • Siponen, M.T.1    Iivari, J.2
  • 55
    • 77149132467 scopus 로고    scopus 로고
    • Why employees don't comply with information security policies: An empirical investigation
    • SIPONEN MT, MAHMOOD A and PAHNILA S (2010) Why employees don't comply with information security policies: an empirical investigation. IEEE Computer 43(10), 64-71.
    • (2010) IEEE Computer , vol.43 , Issue.10 , pp. 64-71
    • Siponen, M.T.1    Mahmood, A.2    Pahnila, S.3
  • 56
    • 77957068563 scopus 로고    scopus 로고
    • Neutralization: New insights into the problem of employee information systems security policy violations
    • SIPONEN MT and VANCE A (2010) Neutralization: new insights into the problem of employee information systems security policy violations. MIS Quarterly 34(3), 487-502.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 487-502
    • Siponen, M.T.1    Vance, A.2
  • 57
    • 84870054732 scopus 로고    scopus 로고
    • New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs
    • SIPONEN MT, VANCE A and WILLISON R (2012) New insights into the problem of software piracy: the effects of neutralization, shame, and moral beliefs. Information & Management 49(7-8), 334-341.
    • (2012) Information & Management , vol.49 , Issue.7-8 , pp. 334-341
    • Siponen, M.T.1    Vance, A.2    Willison, R.3
  • 58
    • 80054707541 scopus 로고    scopus 로고
    • Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies
    • SON J (2011) Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies. Information & Management 48(7), 296-302.
    • (2011) Information & Management , vol.48 , Issue.7 , pp. 296-302
    • Son, J.1
  • 59
    • 80051729085 scopus 로고    scopus 로고
    • Special research commentary series on advanced methodological thinking for quantitative research
    • STAFFORD T (2011) Special research commentary series on advanced methodological thinking for quantitative research. MIS Quarterly 35(2), xv-xvi.
    • (2011) MIS Quarterly , vol.35 , Issue.2
    • Stafford, T.1
  • 62
    • 55249123249 scopus 로고
    • Validating instruments in MIS research
    • STRAUB DW (1989) Validating instruments in MIS research. MIS Quarterly 13(2), 147-169.
    • (1989) MIS Quarterly , vol.13 , Issue.2 , pp. 147-169
    • Straub, D.W.1
  • 63
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • STRAUB DW (1990) Effective IS security: an empirical study. Information Systems Research 1(3), 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 64
    • 80052098308 scopus 로고    scopus 로고
    • Rigor and relevance in IS research: Redefining the debate and a call for future research
    • STRAUB DW and ANG S (2011) Rigor and relevance in IS research: redefining the debate and a call for future research. MIS Quarterly 35(1), iii-xi.
    • (2011) MIS Quarterly , vol.35 , Issue.1
    • Straub, D.W.1    Ang, S.2
  • 65
    • 13244286108 scopus 로고    scopus 로고
    • Validation guidelines for IS positivist research
    • STRAUB DW, BOUDREAU M and GEFEN D (2004) Validation guidelines for IS positivist research. Communications of the AIS 13(24), 380-427.
    • (2004) Communications of the AIS , vol.13 , Issue.24 , pp. 380-427
    • Straub, D.W.1    Boudreau, M.2    Gefen, D.3
  • 66
    • 77956374558 scopus 로고    scopus 로고
    • Discarding the 'basic science/applied science' dichotomy: A knowledge utilization triangle classification system of research journals
    • TIJSSEN R (2010) Discarding the 'basic science/applied science' dichotomy: a knowledge utilization triangle classification system of research journals. Journal of the American Society for Information Science and Technology 61(9), 1842-1852.
    • (2010) Journal of the American Society for Information Science and Technology , vol.61 , Issue.9 , pp. 1842-1852
    • Tijssen, R.1
  • 67
    • 0001936184 scopus 로고
    • Experimental approaches to studying ethicalunethical behavior in organizations
    • TREVINO LK (1992) Experimental approaches to studying ethicalunethical behavior in organizations. Business Ethics Quarterly 2(2), 121-136.
    • (1992) Business Ethics Quarterly , vol.2 , Issue.2 , pp. 121-136
    • Trevino, L.K.1
  • 68
    • 21744439352 scopus 로고    scopus 로고
    • Limitations of the common European framework for developing comparable examinations and tests
    • WEIR C (2005) Limitations of the common European framework for developing comparable examinations and tests. Language Testing 22(3), 281-300.
    • (2005) Language Testing , vol.22 , Issue.3 , pp. 281-300
    • Weir, C.1
  • 69
    • 84873974226 scopus 로고    scopus 로고
    • Beyond deterrence: An expanded view of employee computer abuse
    • forthcoming
    • WILLISON R and WARKENTIN M (2013) Beyond deterrence: an expanded view of employee computer abuse. MIS Quarterly 37(1), forthcoming.
    • (2013) MIS Quarterly , vol.37 , Issue.1
    • Willison, R.1    Warkentin, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.