-
1
-
-
85139077377
-
-
Allen, N.J., and Meyer, J.P. (1990). The measurement and antecedents of affective, continuance and normative commitment to organizations. Journal of Occupational and Organizational Psychology, 63, 1-18.
-
Allen, N.J., and Meyer, J.P. (1990). The measurement and antecedents of affective, continuance and normative commitment to organizations. Journal of Occupational and Organizational Psychology, 63, 1-18.
-
-
-
-
2
-
-
85138992731
-
-
Anderson, R. H., Feldman, P. M., Gerwehr, S., Houghton, B., Mesic, R., Pinder, J. D., Rothenberg, J., and Chiesa, J. (1999). Securing the U.S. defense information infrastructure: A proposed approach. Washington, DC: Rand.
-
Anderson, R. H., Feldman, P. M., Gerwehr, S., Houghton, B., Mesic, R., Pinder, J. D., Rothenberg, J., and Chiesa, J. (1999). Securing the U.S. defense information infrastructure: A proposed approach. Washington, DC: Rand.
-
-
-
-
3
-
-
85139077786
-
-
Armstrong, L., Phillips, J. G., and Saling, L. L. (2000). Potential determinants of heavier Internet usage. International Journal of Human-Computer Studies, 53 (4), 537-550.
-
Armstrong, L., Phillips, J. G., and Saling, L. L. (2000). Potential determinants of heavier Internet usage. International Journal of Human-Computer Studies, 53 (4), 537-550.
-
-
-
-
4
-
-
85139058426
-
-
Dhillon, G. (Ed.) (2001). Information security management: Global challenges in the new millennium. Hershey, PA: Idea Group Publishing.
-
Dhillon, G. (Ed.) (2001). Information security management: Global challenges in the new millennium. Hershey, PA: Idea Group Publishing.
-
-
-
-
5
-
-
85139063586
-
-
Ernst and Young LLP. (2002) Global Information Security Survey. London: Presentation Services.
-
Ernst and Young LLP. (2002) Global Information Security Survey. London: Presentation Services.
-
-
-
-
6
-
-
85139078146
-
-
Loch, K. D., and Conger, S. (1996). Evaluating ethical decision-making and computer use. Communications of the ACM, 39 (7), 74-83.
-
Loch, K. D., and Conger, S. (1996). Evaluating ethical decision-making and computer use. Communications of the ACM, 39 (7), 74-83.
-
-
-
-
7
-
-
85139041691
-
-
Morahan-Martin, J., and Schumacher, P. (2000). Incidence and correlates of pathological Internet use among college students. Computers in Human Behavior, 16 (1), 13-29.
-
Morahan-Martin, J., and Schumacher, P. (2000). Incidence and correlates of pathological Internet use among college students. Computers in Human Behavior, 16 (1), 13-29.
-
-
-
-
8
-
-
85139006025
-
-
Mangione, T. W., Quinn, R. P. (1975). Job satisfaction, counterproductive behavior, and drug use at work. Journal of Applied Psychology, 60:114-116.
-
Mangione, T. W., Quinn, R. P. (1975). Job satisfaction, counterproductive behavior, and drug use at work. Journal of Applied Psychology, 60:114-116.
-
-
-
-
9
-
-
85139069743
-
-
Miles, D. E., Borman, W. E., Spector, P. E., and Fox, S. (2002). Building an integrative model of extra role work behaviors: A Comparison of counterproductive work behavior with organizational citizenship behavior. International Journal of Selection and Assessment, 10: 51-57.
-
Miles, D. E., Borman, W. E., Spector, P. E., and Fox, S. (2002). Building an integrative model of extra role work behaviors: A Comparison of counterproductive work behavior with organizational citizenship behavior. International Journal of Selection and Assessment, 10: 51-57.
-
-
-
-
10
-
-
85139003558
-
-
Organisation for Economic Co-Operation and Development (2002). Guidelines for the Security of Information Systems. Available at: http://www.ftc.gov/bcp/conline/edcams/infosecurity/popups/OECD_guidelines.pdf.
-
Organisation for Economic Co-Operation and Development (2002). Guidelines for the Security of Information Systems. Available at: http://www.ftc.gov/bcp/conline/edcams/infosecurity/popups/OECD_guidelines.pdf.
-
-
-
-
11
-
-
85139066327
-
-
Schneier, B. (2000). Secrets and Lies. New York: Wiley.
-
Schneier, B. (2000). Secrets and Lies. New York: Wiley.
-
-
-
-
12
-
-
85139011508
-
-
Shaw, E. D., Post, J. M., and Ruby, K. G. (2002). Inside the Mind of the Insider. Available at: http://www.securitymanagement.com/library/000762.html.
-
Shaw, E. D., Post, J. M., and Ruby, K. G. (2002). Inside the Mind of the Insider. Available at: http://www.securitymanagement.com/library/000762.html.
-
-
-
-
13
-
-
85139021155
-
-
Spector, P. E., and Fox, S. (2002). An emotion-centered model of voluntary work behavior: Some parallels between counterproductive work behavior and organizational citizenship behavior. Human Resource Management Review, 12:269-292.
-
Spector, P. E., and Fox, S. (2002). An emotion-centered model of voluntary work behavior: Some parallels between counterproductive work behavior and organizational citizenship behavior. Human Resource Management Review, 12:269-292.
-
-
-
-
14
-
-
85139084150
-
-
Stanton, J. M. (2002a). Company profile of the frequent Internet user: Web addict or happy employee? Communications of the Association for Computing Machinery, 45 (1), 55-59.
-
Stanton, J. M. (2002a). Company profile of the frequent Internet user: Web addict or happy employee? Communications of the Association for Computing Machinery, 45 (1), 55-59.
-
-
-
-
15
-
-
85139084133
-
-
Stanton, J. M., Stam, K. R., Guzman, I., and Caldera, C. (2003, October). Examining the linkage between organizational commitment and information security. Proceedings of the IEEE Systems, Man, and Cybernetics Conference, Washington, DC.
-
Stanton, J. M., Stam, K. R., Guzman, I., and Caldera, C. (2003, October). Examining the linkage between organizational commitment and information security. Proceedings of the IEEE Systems, Man, and Cybernetics Conference, Washington, DC.
-
-
-
-
16
-
-
85139022763
-
-
Straub, D.W. (1990). Effective IS security: an empirical study. Information System Research, 1 (2), 255-77.
-
Straub, D.W. (1990). Effective IS security: an empirical study. Information System Research, 1 (2), 255-77.
-
-
-
-
17
-
-
85139059817
-
-
Trice, H. M. (1993). Occupational subcultures in the workplace. Ithaca, N.Y.: ILR Press.
-
Trice, H. M. (1993). Occupational subcultures in the workplace. Ithaca, N.Y.: ILR Press.
-
-
-
-
18
-
-
85139059392
-
-
Won, D. (Ed.) (2001). Proceedings of the Third International Conference on Information security and cryptology (ICISC 2000), Seoul, Korea, December 8-9, 2000. Berlin: Springer.
-
Won, D. (Ed.) (2001). Proceedings of the Third International Conference on Information security and cryptology (ICISC 2000), Seoul, Korea, December 8-9, 2000. Berlin: Springer.
-
-
-
|