-
1
-
-
33750521955
-
-
American Institute of Certified Public Accountants (AICPA). Section ET 301.01. New York, NY: AICPA
-
American Institute of Certified Public Accountants (AICPA). 1992. AICPA Code of Professional Conduct. Section ET 301.01. New York, NY: AICPA.
-
(1992)
AICPA Code of Professional Conduct
-
-
-
2
-
-
77957077814
-
Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions
-
Anderson, C. L., and R. Agarwal. 2010. Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly 34 (3): 613-643.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 613-643
-
-
Anderson, C.L.1
Agarwal, R.2
-
3
-
-
0002545789
-
Students as surrogates in behavioral accounting research: Some evidence
-
Ashton, R. H., and S. S. Kramer. 1980. Students as surrogates in behavioral accounting research: Some evidence. Journal of Accounting Research 18 (1): 1-15.
-
(1980)
Journal of Accounting Research
, vol.18
, Issue.1
, pp. 1-15
-
-
Ashton, R.H.1
Kramer, S.S.2
-
4
-
-
42649120373
-
The legacy of the technology acceptance model and a proposal for a paradigm shift
-
Bagozzi, R. P. 2007. The legacy of the technology acceptance model and a proposal for a paradigm shift. Journal of the Association for Information Systems 8 (4): 244-254.
-
(2007)
Journal of the Association for Information Systems
, vol.8
, Issue.4
, pp. 244-254
-
-
Bagozzi, R.P.1
-
5
-
-
84903216170
-
Are you ready for BYOD?
-
In 34. Available at
-
Boomer, J. 2012. Are you ready for BYOD? In CPA Practice Advisor 34. Available at: http://www. cpapracticeadvisor.com/article/10707592/are-you-ready-for-byod
-
(2012)
CPA Practice Advisor
-
-
Boomer, J.1
-
6
-
-
84901351947
-
Online instrument delivery and participant recruitment services: Emerging opportunities for behavioral accounting research
-
(forthcoming)
-
Brandon, D., J. H. Long, T. M. Loraas, J. M. Mueller-Phillips, and B. Vansant. 2014. Online instrument delivery and participant recruitment services: Emerging opportunities for behavioral accounting research. Behavioral Research in Accounting (forthcoming).
-
(2014)
Behavioral Research in Accounting
-
-
Brandon, D.1
Long, J.H.2
Loraas, T.M.3
Mueller-Phillips, J.M.4
Vansant, B.5
-
7
-
-
79951775405
-
The effects of cognitive style and feedback type on performance in an internal control task
-
Bryant, S., U. Murthy, and P. Wheeler. 2009. The effects of cognitive style and feedback type on performance in an internal control task. Behavioral Research in Accounting 21 (1): 37-58.
-
(2009)
Behavioral Research in Accounting
, vol.21
, Issue.1
, pp. 37-58
-
-
Bryant, S.1
Murthy, U.2
Wheeler, P.3
-
8
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
Bulgurcu, B., H. Cavusoglu, and I. Benbasat. 2010. Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly 34 (3): 523-548.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
10
-
-
0003095695
-
The partial least squares approach to structural equation modeling
-
In edited by Marcoulides, G. A., Hillsdale, NJ: Lawrence Erlbaum Associates
-
Chin, W. W. 1998. The partial least squares approach to structural equation modeling. In Modern Methods for Business Research, edited by Marcoulides, G. A., 295-336. Hillsdale, NJ: Lawrence Erlbaum Associates.
-
(1998)
Modern Methods for Business Research
, pp. 295-336
-
-
Chin, W.W.1
-
13
-
-
0001878819
-
A paradigm for developing better measures of marketing constructs
-
Churchill, G. A. 1979. A paradigm for developing better measures of marketing constructs. Journal of Marketing Research 16 (1): 64-73.
-
(1979)
Journal of Marketing Research
, vol.16
, Issue.1
, pp. 64-73
-
-
Churchill, G.A.1
-
14
-
-
77951715681
-
-
Paper read at 43rd Hawaii International Conference on System Sciences (HICSS) (January 5-8). Available at
-
Crossler, R. E. 2010. Protection motivation theory: Understanding determinants to backing up personal data. Paper read at 43rd Hawaii International Conference on System Sciences (HICSS) (January 5-8). Available at: http://www.computer.org/csdl/proceedings/hicss/2010/3869/00/07-03-04-abs.html
-
(2010)
Protection motivation theory: Understanding determinants to backing up personal data.
-
-
Crossler, R.E.1
-
15
-
-
84876570327
-
Future directions for behavioral information security research
-
Crossler, R. E., A. C. Johnston, P. B. Lowry, Q. Hu, M. Warkentin, and R. Baskerville. 2013. Future directions for behavioral information security research. Computers and Security 32 (1): 90-101.
-
(2013)
Computers and Security
, vol.32
, Issue.1
, pp. 90-101
-
-
Crossler, R.E.1
Johnston, A.C.2
Lowry, P.B.3
Hu, Q.4
Warkentin, M.5
Baskerville, R.6
-
16
-
-
83455211091
-
Betwixt and between? Bringing information systems and accounting systems research together
-
Debreceny, R. S. 2011. Betwixt and between? Bringing information systems and accounting systems research together. Journal of Information Systems 25 (2): 1-9.
-
(2011)
Journal of Information Systems
, vol.25
, Issue.2
, pp. 1-9
-
-
Debreceny, R.S.1
-
17
-
-
84903143731
-
Managing cybersecurity risks
-
(August)
-
Drew, J. 2012. Managing cybersecurity risks. Journal of Accountancy (August): 44-48.
-
(2012)
Journal of Accountancy
, pp. 44-48
-
-
Drew, J.1
-
19
-
-
33847707841
-
Are M.B.A. students a good proxy for nonprofessional investors?
-
Elliot, W. B., F. D. Hodge, J. J. Kennedy, and M. Pronk. 2007. Are M.B.A. students a good proxy for nonprofessional investors? The Accounting Review 82 (1): 139-168.
-
(2007)
The Accounting Review
, vol.82
, Issue.1
, pp. 139-168
-
-
Elliot, W.B.1
Hodge, F.D.2
Kennedy, J.J.3
Pronk, M.4
-
20
-
-
84903120512
-
-
Ernst & Young. Available at
-
Ernst & Young. 2012. Global Information Security Survey 2012. Available at: http://www.ey.com/ Publication/vwLUAssets/Fighting_to_close_the_gap:_2012_Global_Information_Security_Survey/ $FILE/2012_Global_Information_Security_Survey___Fighting_to_close_the_gap.pdf
-
(2012)
Global Information Security Survey 2012
-
-
-
21
-
-
84903196906
-
-
SOPHOS. Available at
-
Eschelbeck, G., and D. Schwartzbert. 2012. BYOD Risks and Rewards. SOPHOS. Available at: http://www. Sophos.Com/En-Us/Security-News-Trends/Security-Trends/Byod-Risks-Rewards.Aspx
-
(2012)
BYOD Risks and Rewards
-
-
Eschelbeck, G.1
Schwartzbert, D.2
-
24
-
-
84903178743
-
-
GFI. Available at
-
GFI. 2013. It's Time Businesses Wake Up to Mobile Security Reality. Available at: http://www. Threattracksecurity.Com/Documents/Business-Antivirus-White-Paper-Mobile-Security-Reality.pdf
-
(2013)
It's Time Businesses Wake Up to Mobile Security Reality
-
-
-
25
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
Herath, T., and H. Rao. 2009. Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems 18 (2): 106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.2
-
26
-
-
84856018908
-
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
-
Ifinedo, P. 2012. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers and Security 31 (1): 83-95.
-
(2012)
Computers and Security
, vol.31
, Issue.1
, pp. 83-95
-
-
Ifinedo, P.1
-
27
-
-
84897751199
-
-
Information Systems Audit and Control Association (ISACA). Available at
-
Information Systems Audit and Control Association (ISACA). 2012. 2012 IT Risk/Reward Barometer: U.S. Consumer Edition. Available at: http://www.Isaca.Org/Sitecollectiondocuments/2012-Risk-Reward-Barometer-US-Consumer.pdf
-
(2012)
2012 IT Risk/Reward Barometer: U.S. Consumer Edition
-
-
-
28
-
-
77957057727
-
Fear appeals and information security behaviors: An empirical study
-
Johnston, A. C., and M. Warkentin. 2010. Fear appeals and information security behaviors: An empirical study. MIS Quarterly 34 (3): 548-566.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 548-566
-
-
Johnston, A.C.1
Warkentin, M.2
-
29
-
-
67650166189
-
Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software
-
Lee, Y., and K. R. Larsen. 2009. Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software. European Journal of Information Systems 18 (2): 177-187.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 177-187
-
-
Lee, Y.1
Larsen, K.R.2
-
30
-
-
78650169218
-
Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective
-
Lee, Y. 2011. Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective. Decision Support Systems 50 (2): 361-369.
-
(2011)
Decision Support Systems
, vol.50
, Issue.2
, pp. 361-369
-
-
Lee, Y.1
-
31
-
-
60649084770
-
Avoidance of information technology threats: A theoretical perspective
-
Liang, H., and Y. Xue. 2009. Avoidance of information technology threats: A theoretical perspective. MIS Quarterly 33 (1): 71-90.
-
(2009)
MIS Quarterly
, vol.33
, Issue.1
, pp. 71-90
-
-
Liang, H.1
Xue, Y.2
-
32
-
-
77955121478
-
Understanding security behaviors in personal computer usage: A threat avoidance perspective
-
Liang, H., and Y. Xue. 2010. Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems 11 (7): 394-413.
-
(2010)
Journal of the Association for Information Systems
, vol.11
, Issue.7
, pp. 394-413
-
-
Liang, H.1
Xue, Y.2
-
33
-
-
0036837166
-
Experimental research in financial accounting
-
Libby, R., R. Bloomfield, and M. W. Nelson. 2002. Experimental research in financial accounting. Accounting, Organizations and Society 27 (8): 775-810.
-
(2002)
Accounting, Organizations and Society
, vol.27
, Issue.8
, pp. 775-810
-
-
Libby, R.1
Bloomfield, R.2
Nelson, M.W.3
-
34
-
-
0033622371
-
Prediction and intervention in health-related behavior: A metaanalytic review of protection motivation theory
-
Milne, S., P. Sheeran, and S. Orbell. 2000. Prediction and intervention in health-related behavior: A metaanalytic review of protection motivation theory. Journal of Applied Social Psychology 30: 106-143.
-
(2000)
Journal of Applied Social Psychology
, vol.30
, pp. 106-143
-
-
Milne, S.1
Sheeran, P.2
Orbell, S.3
-
36
-
-
0033653826
-
Protection motivation and risk communication
-
Neuwirth, K., S. Dunwoody, and R. J. Griffin. 2000. Protection motivation and risk communication. Risk Analysis 20 (5): 721-734.
-
(2000)
Risk Analysis
, vol.20
, Issue.5
, pp. 721-734
-
-
Neuwirth, K.1
Dunwoody, S.2
Griffin, R.J.3
-
37
-
-
0141907688
-
Common method biases in behavioral research: A critical review of the literature and recommended remedies
-
Podsakoff, P. M., S. B. MacKenzie, J. Y. Lee, and N. P. Podsakoff. 2003. Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology 88 (5): 879-903.
-
(2003)
Journal of Applied Psychology
, vol.88
, Issue.5
, pp. 879-903
-
-
Podsakoff, P.M.1
McKenzie, S.B.2
Lee, J.Y.3
Podsakoff, N.P.4
-
38
-
-
79961058252
-
Protecting personal information using generally accepted privacy principles (GAPP) and continuous control monitoring to enhance corporate governance
-
Prosch, M. 2008. Protecting personal information using generally accepted privacy principles (GAPP) and continuous control monitoring to enhance corporate governance. International Journal of Disclosure and Governance 5 (2): 153-166.
-
(2008)
International Journal of Disclosure and Governance
, vol.5
, Issue.2
, pp. 153-166
-
-
Prosch, M.1
-
39
-
-
38249025067
-
The effect of audit documentation format on data collection
-
Purvis, S. E. C. 1989. The effect of audit documentation format on data collection. Accounting, Organizations and Society 14 (5/6): 551-563.
-
(1989)
Accounting, Organizations and Society
, vol.14
, Issue.5-6
, pp. 551-563
-
-
Purvis, S.E.C.1
-
41
-
-
0001840352
-
A protection motivation theory of fear appeals and attitude change
-
Rogers, R. W. 1975. A protection motivation theory of fear appeals and attitude change. Journal of Psychology: Interdisciplinary and Applied 91 (1): 93-114.
-
(1975)
Journal of Psychology: Interdisciplinary and Applied
, vol.91
, Issue.1
, pp. 93-114
-
-
Rogers, R.W.1
-
42
-
-
84903209179
-
Auditing the BYOD program
-
(February)
-
Semer, L. 2013. Auditing the BYOD program. Internal Auditor (February): 23-27.
-
(2013)
Internal Auditor
, pp. 23-27
-
-
Semer, L.1
-
45
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
Workman, M., W. H. Bommer, and D. W. Straub. 2008. Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior 24 (6): 2799-2816.
-
(2008)
Computers in Human Behavior
, vol.24
, Issue.6
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.H.2
Straub, D.W.3
|