-
1
-
-
84862925338
-
Understanding organizational security culture
-
Chia, P., Maynard, S., Ruighaver, A.: Understanding organizational security culture. In: Proceedings of PACIS 2002, Japan (2002)
-
Proceedings of PACIS 2002, Japan (2002)
-
-
Chia, P.1
Maynard, S.2
Ruighaver, A.3
-
2
-
-
34249871944
-
A qualitative study of users' view on information security
-
Albrechtsen, E.: A qualitative study of users' view on information security. Computers & Security 26(4), 276-289 (2007)
-
(2007)
Computers & Security
, vol.26
, Issue.4
, pp. 276-289
-
-
Albrechtsen, E.1
-
3
-
-
39749168050
-
Employees' behavior towards is security policy compliance
-
IEEE
-
Pahnila, S., Siponen, M., Mahmood, A.: Employees' behavior towards is security policy compliance. In: 40th Annual Hawaii International Conference on System Sciences, HICSS 2007, p. 156b. IEEE (2007)
-
(2007)
40th Annual Hawaii International Conference on System Sciences, HICSS 2007
-
-
Pahnila, S.1
Siponen, M.2
Mahmood, A.3
-
4
-
-
36248967046
-
Employees adherence to information security policies: An empirical study
-
Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. Springer, Boston
-
Siponen, M., Pahnila, S., Mahmood, A.: Employees adherence to information security policies: an empirical study. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP, vol. 232, pp. 133-144. Springer, Boston (2007)
-
(2007)
IFIP
, vol.232
, pp. 133-144
-
-
Siponen, M.1
Pahnila, S.2
Mahmood, A.3
-
5
-
-
84863469085
-
Stronger password authentication using browser extensions
-
Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.C.: Stronger password authentication using browser extensions. In: Proceedings of the 14th Usenix Security Symposium, vol. 1998 (2005)
-
(2005)
Proceedings of the 14th Usenix Security Symposium
, vol.1998
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.C.5
-
6
-
-
0034318873
-
Practical approaches to creating a security culture
-
Gaunt, N.: Practical approaches to creating a security culture. International Journal of Medical Informatics 60(2), 151-157 (2000)
-
(2000)
International Journal of Medical Informatics
, vol.60
, Issue.2
, pp. 151-157
-
-
Gaunt, N.1
-
7
-
-
84869223907
-
The enemy within: A behavioural intention model and an information security awareness process
-
IEEE
-
Gundu, T., Flowerday, S.V.: The enemy within: A behavioural intention model and an information security awareness process. In: Information Security for South Africa (ISSA), pp. 1-8. IEEE (2012)
-
(2012)
Information Security for South Africa (ISSA)
, pp. 1-8
-
-
Gundu, T.1
Flowerday, S.V.2
-
9
-
-
80054553400
-
Some thoughts concerning education
-
Eliot, C.W. (ed.) ch. XXXVII. P.F. Collier & Son, New York
-
Locke, J.: Some thoughts concerning education. In: Eliot, C.W. (ed.) The Harvard Classics, ch. XXXVII. P.F. Collier & Son, New York (1909-1914)
-
(1909)
The Harvard Classics
-
-
Locke, J.1
-
11
-
-
84903750957
-
IKEA rewards thousands of staff with pension bonus
-
December 19
-
Hawkes, S.: IKEA rewards thousands of staff with pension bonus. The Telegraph (December 19, 2013)
-
(2013)
The Telegraph
-
-
Hawkes, S.1
-
13
-
-
58149425798
-
A theory of human motivation
-
Maslow, A.H.: A theory of human motivation. Psychological Review 50(4), 370 (1943)
-
(1943)
Psychological Review
, vol.50
, Issue.4
, pp. 370
-
-
Maslow, A.H.1
-
14
-
-
37649005550
-
Section of psychology: Personality and vocation
-
Series II
-
Roe, A.: Section of psychology: Personality and vocation. Transactions of the New York Academy of Sciences 9(7 Series II), 257-267 (1947)
-
(1947)
Transactions of the New York Academy of Sciences
, vol.9
, Issue.7
, pp. 257-267
-
-
Roe, A.1
-
15
-
-
84886306694
-
SCARF: A brain-based model for collaborating with and influencing others
-
Rock, D.: SCARF: a brain-based model for collaborating with and influencing others. NeuroLeadership Journal 1(1), 44-52 (2008)
-
(2008)
NeuroLeadership Journal
, vol.1
, Issue.1
, pp. 44-52
-
-
Rock, D.1
-
16
-
-
79952907472
-
Why do people work? Individual wants versus common goods
-
Lopes, H.: Why do people work? Individual wants versus common goods. Journal of Economic Issues 45(1), 57-74 (2011)
-
(2011)
Journal of Economic Issues
, vol.45
, Issue.1
, pp. 57-74
-
-
Lopes, H.1
-
17
-
-
0001493310
-
Intrinsic motivation, extrinsic reinforcement, and inequity
-
Deci, E.L.: Intrinsic motivation, extrinsic reinforcement, and inequity. Journal of Personality and Social Psychology 22(1), 113 (1972)
-
(1972)
Journal of Personality and Social Psychology
, vol.22
, Issue.1
, pp. 113
-
-
Deci, E.L.1
-
23
-
-
11944259674
-
Integrating concepts from goal theories to understand the achievement of personal goals
-
Webb, T.L., Sheeran, P.: Integrating concepts from goal theories to understand the achievement of personal goals. European Journal of Social Psychology 35(1), 69-96 (2005)
-
(2005)
European Journal of Social Psychology
, vol.35
, Issue.1
, pp. 69-96
-
-
Webb, T.L.1
Sheeran, P.2
-
24
-
-
3142722087
-
Moderation of cognition-intention and cognition-behaviour relations: A meta-analysis of properties of variables from the theory of planned behaviour
-
Cooke, R., Sheeran, P.: Moderation of cognition-intention and cognition-behaviour relations: A meta-analysis of properties of variables from the theory of planned behaviour. British Journal of Social Psychology 43(2), 159-186 (2004)
-
(2004)
British Journal of Social Psychology
, vol.43
, Issue.2
, pp. 159-186
-
-
Cooke, R.1
Sheeran, P.2
-
26
-
-
18144416488
-
Models of attitude-behavior relations
-
Bentler, P.M., Speckart, G.: Models of attitude-behavior relations. Psychological Review 86(5), 452 (1979)
-
(1979)
Psychological Review
, vol.86
, Issue.5
, pp. 452
-
-
Bentler, P.M.1
Speckart, G.2
-
27
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
Herath, T., Rao, H.R.: Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems 18(2), 106- 125 (2009)
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
28
-
-
84886458518
-
Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale
-
Hedstrom, K., Karlsson, F., Kolkowska, E.: Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale. Information Management & Computer Security 21(4), 266-287 (2013)
-
(2013)
Information Management & Computer Security
, vol.21
, Issue.4
, pp. 266-287
-
-
Hedstrom, K.1
Karlsson, F.2
Kolkowska, E.3
-
29
-
-
0000242433
-
Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change
-
Maddux, J.E., Rogers, R.W.: Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology 19(5), 469- 479 (1983)
-
(1983)
Journal of Experimental Social Psychology
, vol.19
, Issue.5
, pp. 469-479
-
-
Maddux, J.E.1
Rogers, R.W.2
-
31
-
-
4544359599
-
Beyond concern: A privacy-trust-behavioral intention model of electronic commerce
-
Liu, C., Marchewka, J.T., Lu, J., Yu, C.-S.: Beyond concern: a privacy-trust-behavioral intention model of electronic commerce. Information & Management 42(1), 127-142 (2004)
-
(2004)
Information & Management
, vol.42
, Issue.1
, pp. 127-142
-
-
Liu, C.1
Marchewka, J.T.2
Lu, J.3
Yu, C.-S.4
-
32
-
-
0001186060
-
The evaluation of setting and a culturally specific HIV/AIDS curriculum: HIV/AIDS knowledge and behavioral intent of african american adolescents
-
Damond, M.E., Breuer, N.L., Pharr, A.E.: The evaluation of setting and a culturally specific HIV/AIDS curriculum: HIV/AIDS knowledge and behavioral intent of african american adolescents. Journal of Black Psychology 19(2), 169-189 (1993)
-
(1993)
Journal of Black Psychology
, vol.19
, Issue.2
, pp. 169-189
-
-
Damond, M.E.1
Breuer, N.L.2
Pharr, A.E.3
-
33
-
-
84875490781
-
A path way to successful management of individual intention to security compliance: A role of organizational security climate
-
IEEE
-
Goo, J., Yim, M.-S., Kim, D.J.: A path way to successful management of individual intention to security compliance: A role of organizational security climate. In: 2013 46th Hawaii International Conference on System Sciences (HICSS), pp. 2959-2968. IEEE (2013)
-
(2013)
2013 46th Hawaii International Conference on System Sciences (HICSS)
, pp. 2959-2968
-
-
Goo, J.1
Yim, M.-S.2
Kim, D.J.3
-
34
-
-
84867013249
-
Health service employees and information security policies: An uneasy partnership?
-
Renaud, K., Goucher, W.: Health service employees and information security policies: an uneasy partnership? Information Management & Computer Security 20(4), 296-311 (2012)
-
(2012)
Information Management & Computer Security
, vol.20
, Issue.4
, pp. 296-311
-
-
Renaud, K.1
Goucher, W.2
-
36
-
-
0000099268
-
A review and meta-analysis of research on the relationship between behavioral intentions and employee turnover
-
Steel, R.P., Ovalle, N.K.: A review and meta-analysis of research on the relationship between behavioral intentions and employee turnover. Journal of Applied Psychology 69(4), 673 (1984)
-
(1984)
Journal of Applied Psychology
, vol.69
, Issue.4
, pp. 673
-
-
Steel, R.P.1
Ovalle, N.K.2
-
37
-
-
84928015675
-
The relationships among teacher immediacy behaviors, student motivation, and learning
-
Christophel, D.M.: The relationships among teacher immediacy behaviors, student motivation, and learning. Communication Education 39(4), 323-340 (1990)
-
(1990)
Communication Education
, vol.39
, Issue.4
, pp. 323-340
-
-
Christophel, D.M.1
-
38
-
-
33645056816
-
Why healthcare workers don't wash their hands: A behavioral explanation
-
Whitby, M., McLaws, M.-L., Ross, M.W.: Why healthcare workers don't wash their hands: a behavioral explanation. Infection Control and Hospital Epidemiology 27(5), 484-492 (2006)
-
(2006)
Infection Control and Hospital Epidemiology
, vol.27
, Issue.5
, pp. 484-492
-
-
Whitby, M.1
McLaws, M.-L.2
Ross, M.W.3
-
39
-
-
2542573278
-
Using the job demands-resources model to predict burnout and performance
-
Bakker, A.B., Demerouti, E., Verbeke, W.: Using the job demands-resources model to predict burnout and performance. Human Resource Management 43(1), 83-104 (2004)
-
(2004)
Human Resource Management
, vol.43
, Issue.1
, pp. 83-104
-
-
Bakker, A.B.1
Demerouti, E.2
Verbeke, W.3
-
40
-
-
84862128773
-
Understanding the influences on information security behaviour
-
Furnell, S., Rajendran, A.: Understanding the influences on information security behaviour. Computer Fraud & Security 2012(3), 12-15 (2012)
-
(2012)
Computer Fraud & Security
, vol.2012
, Issue.3
, pp. 12-15
-
-
Furnell, S.1
Rajendran, A.2
-
41
-
-
84888884622
-
CISOs and organisational culture: Their own worst enemy?
-
Ashenden, D., Sasse, A.: CISOs and organisational culture: Their own worst enemy? Computers & Security 39, 396-405 (2013)
-
(2013)
Computers & Security
, vol.39
, pp. 396-405
-
-
Ashenden, D.1
Sasse, A.2
-
42
-
-
77951209282
-
Information security culture: A management perspective
-
Van Niekerk, J., Von Solms, R.: Information security culture: A management perspective. Computers & Security 29(4), 476-486 (2010)
-
(2010)
Computers & Security
, vol.29
, Issue.4
, pp. 476-486
-
-
Van Niekerk, J.1
Von Solms, R.2
-
43
-
-
0345764837
-
Improving user security behaviour
-
Leach, J.: Improving user security behaviour. Computers & Security 22(8), 685-692 (2003)
-
(2003)
Computers & Security
, vol.22
, Issue.8
, pp. 685-692
-
-
Leach, J.1
-
44
-
-
1542380758
-
The persuasiveness of source credibility: A critical review of five decades' evidence
-
Pornpitakpan, C.: The persuasiveness of source credibility: A critical review of five decades' evidence. Journal of Applied Social Psychology 34(2), 243-281 (2004)
-
(2004)
Journal of Applied Social Psychology
, vol.34
, Issue.2
, pp. 243-281
-
-
Pornpitakpan, C.1
-
45
-
-
61349200300
-
From culture to disobedience: Recognising the varying user acceptance of it security
-
Furnell, S., Thomson, K.-L.: From culture to disobedience: Recognising the varying user acceptance of it security. Computer Fraud & Security 2009(2), 5-10 (2009)
-
(2009)
Computer Fraud & Security
, vol.2009
, Issue.2
, pp. 5-10
-
-
Furnell, S.1
Thomson, K.-L.2
-
46
-
-
79954605289
-
Reducing energy consumption and creating a conservation culture in organizations: A case study of one public school district
-
Schelly, C., Cross, J.E., Franzen, W.S., Hall, P., Reeve, S.: Reducing energy consumption and creating a conservation culture in organizations: A case study of one public school district. Environment and Behavior 43(3), 316-343 (2011)
-
(2011)
Environment and Behavior
, vol.43
, Issue.3
, pp. 316-343
-
-
Schelly, C.1
Cross, J.E.2
Franzen, W.S.3
Hall, P.4
Reeve, S.5
-
47
-
-
33645110997
-
Does changing behavioral intentions engender behavior change? A meta-analysis of the experimental evidence
-
Webb, T.L., Sheeran, P.: Does changing behavioral intentions engender behavior change? a meta-analysis of the experimental evidence. Psychological Bulletin 132(2), 249 (2006)
-
(2006)
Psychological Bulletin
, vol.132
, Issue.2
, pp. 249
-
-
Webb, T.L.1
Sheeran, P.2
-
48
-
-
77957805521
-
From control to commitment in the workplace
-
Sage Publications, California
-
Walton, R.E.: From control to commitment in the workplace. In: The Sociology of Organizations: Classic, Contemporary, and Critical Readings, pp. 114-122. Sage Publications, California (2003)
-
(2003)
The Sociology of Organizations: Classic, Contemporary, and Critical Readings
, pp. 114-122
-
-
Walton, R.E.1
-
49
-
-
84893032945
-
Information security management (ism) practices: Lessons from select cases from India and Germany
-
Singh, A.N., Picot, A., Kranz, J., Gupta, M., Ojha, A.: Information security management (ism) practices: Lessons from select cases from India and Germany. Global Journal of Flexible Systems Management 14(4), 225-239 (2013)
-
(2013)
Global Journal of Flexible Systems Management
, vol.14
, Issue.4
, pp. 225-239
-
-
Singh, A.N.1
Picot, A.2
Kranz, J.3
Gupta, M.4
Ojha, A.5
-
50
-
-
0033628467
-
The longitudinal effects of a rape-prevention program on fraternity mens attitudes, behavioral intent, and behavior
-
Foubert, J.D.: The longitudinal effects of a rape-prevention program on fraternity mens attitudes, behavioral intent, and behavior. Journal of American College Health 48, 158- 163 (2000)
-
(2000)
Journal of American College Health
, vol.48
, pp. 158-163
-
-
Foubert, J.D.1
-
51
-
-
0032385513
-
Habit and intention in everyday life: The multiple processes by which past behavior predicts future behavior
-
Ouellette, J.A., Wood, W.: Habit and intention in everyday life: the multiple processes by which past behavior predicts future behavior. Psychological Bulletin 124(1), 54 (1998)
-
(1998)
Psychological Bulletin
, vol.124
, Issue.1
, pp. 54
-
-
Ouellette, J.A.1
Wood, W.2
-
52
-
-
11144334394
-
The control of the unwanted
-
Gollwitzer, P.M., Bayer, U.C., McCulloch, K.C.: The control of the unwanted. In: The New Unconscious, pp. 485-515 (2005)
-
(2005)
The New Unconscious
, pp. 485-515
-
-
Gollwitzer, P.M.1
Bayer, U.C.2
McCulloch, K.C.3
-
53
-
-
33750923703
-
Cultivating an organizational information security culture
-
Thomson, K.-L., von Solms, R., Louw, L.: Cultivating an organizational information security culture. Computer Fraud & Security 2006(10), 7-11 (2006)
-
(2006)
Computer Fraud & Security
, vol.2006
, Issue.10
, pp. 7-11
-
-
Thomson, K.-L.1
Von Solms, R.2
Louw, L.3
-
54
-
-
3042761355
-
Descriptive norms as an additional predictor in the theory of planned behaviour: A meta-analysis
-
Rivis, A., Sheeran, P.: Descriptive norms as an additional predictor in the theory of planned behaviour: A meta-analysis. Current Psychology 22(3), 218-233 (2003)
-
(2003)
Current Psychology
, vol.22
, Issue.3
, pp. 218-233
-
-
Rivis, A.1
Sheeran, P.2
-
55
-
-
84936823564
-
The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research
-
Sheppard, B.H., Hartwick, J., Warshaw, P.R.: The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research. Journal of Consumer Research, 325-343 (1988)
-
(1988)
Journal of Consumer Research
, pp. 325-343
-
-
Sheppard, B.H.1
Hartwick, J.2
Warshaw, P.R.3
-
56
-
-
0002444106
-
The development and enforcement of group norms
-
Feldman, D.C.: The development and enforcement of group norms. Academy of Management Review 9(1), 47-53 (1984)
-
(1984)
Academy of Management Review
, vol.9
, Issue.1
, pp. 47-53
-
-
Feldman, D.C.1
-
57
-
-
33644533141
-
Information security: Management's effect on culture and policy
-
Knapp, K.J., Marshall, T.E., Rainer, R.K., Ford, F.N.: Information security: management's effect on culture and policy. Information Management & Computer Security 14(1), 24-36 (2006)
-
(2006)
Information Management & Computer Security
, vol.14
, Issue.1
, pp. 24-36
-
-
Knapp, K.J.1
Marshall, T.E.2
Rainer, R.K.3
Ford, F.N.4
|