-
1
-
-
34249871944
-
A qualitative study of users' view on information security
-
Albrechtsen, E. (2007), "A qualitative study of users' view on information security", Computers & Security, Vol. 26 No. 4, pp. 276-289.
-
(2007)
Computers & Security
, vol.26
, Issue.4
, pp. 276-289
-
-
Albrechtsen, E.1
-
2
-
-
84965668130
-
Theories of organizational culture
-
Allaire, Y. and Firsirotu, M. E. (1984), "Theories of organizational culture", Organization Studies, Vol. 5 No. 3, pp. 193-226.
-
(1984)
Organization Studies
, vol.5
, Issue.3
, pp. 193-226
-
-
Allaire, Y.1
Firsirotu, M.E.2
-
4
-
-
84936824236
-
Assessing construct validity in organizational research
-
Bagozzi, R. P. and Phillips, L. W. (1991), "Assessing construct validity in organizational research", Administrative Science Quarterly, Vol. 36 No. 3, pp. 421-458.
-
(1991)
Administrative Science Quarterly
, vol.36
, Issue.3
, pp. 421-458
-
-
Bagozzi, R.P.1
Phillips, L.W.2
-
5
-
-
71749099834
-
The economics of user effort in information security
-
Beautement, A. and Sasse, A. (2009), "The economics of user effort in information security", Computer Fraud & Security, Vol. 10, pp. 8-12.
-
(2009)
Computer Fraud & Security
, vol.10
, pp. 8-12
-
-
Beautement, A.1
Sasse, A.2
-
6
-
-
67650100804
-
If someone is watching, I'll do what I'm asked: Mandatoriness, control, and information security
-
Boss, S. R., Kirsch, L. J., Angermeier, I., Shingler, R. A. and Boss, R. W. (2009), "If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security", European Journal of Information Systems, Vol. 18 No. 2, pp. 151-164.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 151-164
-
-
Boss, S.R.1
Kirsch, L.J.2
Angermeier, I.3
Shingler, R.A.4
Boss, R.W.5
-
7
-
-
0001593791
-
An index of job satisfaction
-
Brayfield, A. H. and Rothe, H. F. (1951), "An index of job satisfaction", Journal of Applied Psychology, Vol. 35 No. 5, pp. 307-311.
-
(1951)
Journal of Applied Psychology
, vol.35
, Issue.5
, pp. 307-311
-
-
Brayfield, A.H.1
Rothe, H.F.2
-
8
-
-
61349159889
-
Perceptions of information security at the workplace: Linking information security climate to compliant behavior
-
Chan, M., Woon, I. and Kankanhalli, A. (2005), "Perceptions of information security at the workplace: linking information security climate to compliant behavior", Journal of Information Privacy & Security, Vol. 1 No. 3, pp. 18-41.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.3
, pp. 18-41
-
-
Chan, M.1
Woon, I.2
Kankanhalli, A.3
-
9
-
-
33947189095
-
Exploring organizational culture for information security management
-
Chang, S. E. and Lin, C.-S. (2007), "Exploring organizational culture for information security management", Industrial Management & Data Systems, Vol. 107 No. 3, pp. 438-458.
-
(2007)
Industrial Management & Data Systems
, vol.107
, Issue.3
, pp. 438-458
-
-
Chang, S.E.1
Lin, C.-S.2
-
12
-
-
67649551429
-
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
-
D'Arcy, J., Hovav, A. and Galletta, D. G (2009), "User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach", Information Systems Research, Vol. 20 No. 1, pp. 79-98.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 79-98
-
-
D'Arcy, J.1
Hovav, A.2
Galletta, D.G.3
-
13
-
-
0003727636
-
-
Addison-Wesley, Reading, MA
-
Deal, T. and Kennedy, A. (1982), Corporate Cultures: The Rites and Rituals of Corporate Life, Addison-Wesley, Reading, MA.
-
(1982)
Corporate Cultures: The Rites and Rituals of Corporate Life
-
-
Deal, T.1
Kennedy, A.2
-
14
-
-
0000281443
-
Perceived organizational support
-
Eisenberger, R, Huntington, R, Hutchison, S. and Sowa, D. (1986), "Perceived organizational support", Journal of Applied Psychology, Vol. 71 No. 3, pp. 500-507.
-
(1986)
Journal of Applied Psychology
, vol.71
, Issue.3
, pp. 500-507
-
-
Eisenberger, R.1
Huntington, R.2
Hutchison, S.3
Sowa, D.4
-
15
-
-
67650117204
-
Assessing IT security culture: System administrator and end-user
-
Las Vegas, NV
-
Finch, J. H., Furnell, S. M. and Dowland, P. S. (2003), "Assessing IT security culture: system administrator and end-user", in Proceedings of the ISOneWorld Conference, Las Vegas, NV.
-
(2003)
Proceedings of the ISOneWorld Conference
-
-
Finch, J.H.1
Furnell, S.M.2
Dowland, P.S.3
-
16
-
-
0003702233
-
-
3rd ed., Oxford University Press, New York, NY
-
Hatch, M. J. and Cunliffe, A. L. (2012), Organization Theory: Modern Symbolic and Postmodern Perspectives, 3rd ed., Oxford University Press, New York, NY.
-
(2012)
Organization Theory: Modern Symbolic and Postmodern Perspectives
-
-
Hatch, M.J.1
Cunliffe, A.L.2
-
17
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
Herath, T. and Rao, H. R (2009), "Protection motivation and deterrence: a framework for security policy compliance in organisations", European Journal of Information Systems, Vol. 18 No. 2, pp. 106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
18
-
-
84863542038
-
Managing employee compliance with information security policies: The critical role of top management and organizational culture
-
Hu, Q., Dinev, T., Hart, P. and Cooke, D. (2012), "Managing employee compliance with information security policies: the critical role of top management and organizational culture", Decision Sciences, Vol. 43 No. 4, pp. 615-660.
-
(2012)
Decision Sciences
, vol.43
, Issue.4
, pp. 615-660
-
-
Hu, Q.1
Dinev, T.2
Hart, P.3
Cooke, D.4
-
19
-
-
0035349869
-
The job satisfaction - Job performance relationship: A qualitative and quantitative review
-
Judge, T. A., Bono, J. E., Thoreson, C. J. and Patton, GK. (2001), "The job satisfaction - job performance relationship: a qualitative and quantitative review", Psychological Bulletin, Vol. 127 No. 3, pp. 376-407.
-
(2001)
Psychological Bulletin
, vol.127
, Issue.3
, pp. 376-407
-
-
Judge, T.A.1
Bono, J.E.2
Thoreson, C.J.3
Patton, G.K.4
-
20
-
-
60349122362
-
On the role of positive and negative affectivity in job performance: A meta-analytic investigation
-
Kaplan, S., Bradley, J. C., Luchman, J. N. and Haynes, D. (2009), "On the role of positive and negative affectivity in job performance: a meta-analytic investigation", Journal of Applied Psychology, Vol. 94 No. 1, pp. 162-176.
-
(2009)
Journal of Applied Psychology
, vol.94
, Issue.1
, pp. 162-176
-
-
Kaplan, S.1
Bradley, J.C.2
Luchman, J.N.3
Haynes, D.4
-
21
-
-
33644533141
-
Information security: Management's effect on culture and policy
-
Knapp, K. J. (2006), "Information security: management's effect on culture and policy", Information Management & Computer Security, Vol. 14 No. 1, pp. 24-36.
-
(2006)
Information Management & Computer Security
, vol.14
, Issue.1
, pp. 24-36
-
-
Knapp, K.J.1
-
22
-
-
57049180578
-
Managerial dimensions in information security: A theoretical model of organizational effectiveness
-
Framingham, MA and Auburn, AL
-
Knapp, K. J., Marshall, T. E., Rainer, RK. and Ford, FN. (2005), "Managerial dimensions in information security: a theoretical model of organizational effectiveness", ISC2 Inc and Auburn University Research Report, Framingham, MA and Auburn, AL.
-
(2005)
ISC2 Inc and Auburn University Research Report
-
-
Knapp, K.J.1
Marshall, T.E.2
Rainer, R.K.3
Ford, F.N.4
-
23
-
-
0036481258
-
The nature and dimensionality of organizational citizenship behavior: A critical review and meta-analysis
-
LePine, J. A., Erez, A. and Johnson, D. E. (2002), "The nature and dimensionality of organizational citizenship behavior: a critical review and meta-analysis", Journal of Applied Psychology, Vol. 87 No. 1, pp. 52-65.
-
(2002)
Journal of Applied Psychology
, vol.87
, Issue.1
, pp. 52-65
-
-
LePine, J.A.1
Erez, A.2
Johnson, D.E.3
-
24
-
-
80051733015
-
Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques
-
MacKenzie, S. B., Podsakoff, P. M. and Podsakoff, N. P. (2011), "Construct measurement and validation procedures in MIS and behavioral research: integrating new and existing techniques", MIS Quarterly, Vol. 35 No. 2, pp. 293-334.
-
(2011)
MIS Quarterly
, vol.35
, Issue.2
, pp. 293-334
-
-
MacKenzie, S.B.1
Podsakoff, P.M.2
Podsakoff, N.P.3
-
25
-
-
84949750062
-
Organizational culture: Beyond struggles for intellectual dominance
-
Clegg, S., Hardy, C, Nord, W. and Lawrence, T. Eds, 2nd ed., Sage Publications, London
-
Martin, J., Frost, P. J. and O'Neill, O. A. (2006), "Organizational culture: beyond struggles for intellectual dominance", in Clegg, S., Hardy, C, Nord, W. and Lawrence, T. (Eds), Handbook of Organization Studies, 2nd ed., Sage Publications, London, pp. 725-753.
-
(2006)
Handbook of Organization Studies
, pp. 725-753
-
-
Martin, J.1
Frost, P.J.2
O'Neill, O.A.3
-
26
-
-
38549116762
-
Specifying formative constructs in information systems research
-
Petter, S., Straub, D. and Rai, A. (2007), "Specifying formative constructs in information systems research", MIS Quarterly, Vol. 31 No. 4, pp. 623-656.
-
(2007)
MIS Quarterly
, vol.31
, Issue.4
, pp. 623-656
-
-
Petter, S.1
Straub, D.2
Rai, A.3
-
27
-
-
0000635401
-
On studying organizational cultures
-
Pettigrew, A. M. (1979), "On studying organizational cultures", Administrative Science Quarterly, Vol. 24 No. 4, pp. 570-581.
-
(1979)
Administrative Science Quarterly
, vol.24
, Issue.4
, pp. 570-581
-
-
Pettigrew, A.M.1
-
28
-
-
0141907688
-
Common method biases in behavioral research: A critical review of the literature and recommended remedies
-
Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y. and Podsakoff, N. P. (2003), "Common method biases in behavioral research: a critical review of the literature and recommended remedies" Journal of Applied Psychology, Vol. 88 No. 5, pp. 879-903.
-
(2003)
Journal of Applied Psychology
, vol.88
, Issue.5
, pp. 879-903
-
-
Podsakoff, P.M.1
MacKenzie, S.B.2
Lee, J.Y.3
Podsakoff, N.P.4
-
29
-
-
49249119924
-
Insiders behaving badly
-
Predd, J., Pfleeger, S. L., Hunker, J. and Bulford, C. (2008), "Insiders behaving badly", IEEE Security & Privacy, Vol. 6 No. 4, pp. 66-70.
-
(2008)
IEEE Security & Privacy
, vol.6
, Issue.4
, pp. 66-70
-
-
Predd, J.1
Pfleeger, S.L.2
Hunker, J.3
Bulford, C.4
-
30
-
-
78650770842
-
Improving employees' compliance through information systems security training: An action research study
-
Puhakainen, P. and Siponen, M. (2010), "Improving employees' compliance through information systems security training: an action research study", MIS Quarterly, Vol. 34 No. 4, pp. 757-778.
-
(2010)
MIS Quarterly
, vol.34
, Issue.4
, pp. 757-778
-
-
Puhakainen, P.1
Siponen, M.2
-
31
-
-
84880973434
-
Perceived organizational support: A review of the literature
-
Rhoades, L. and Eisenberger, R. (2002), "Perceived organizational support: a review of the literature", Journal of Applied Psychology, Vol. 87 No. 4, pp. 698-714.
-
(2002)
Journal of Applied Psychology
, vol.87
, Issue.4
, pp. 698-714
-
-
Rhoades, L.1
Eisenberger, R.2
-
32
-
-
33846849570
-
Organisational security culture: Extending the end-user perspective
-
Ruighaver, S. B., Maynard, S. B. and Chang, S. (2007), "Organisational security culture: extending the end-user perspective", Computers & Security, Vol. 25 No. 1, pp. 56-62.
-
(2007)
Computers & Security
, vol.25
, Issue.1
, pp. 56-62
-
-
Ruighaver, S.B.1
Maynard, S.B.2
Chang, S.3
-
33
-
-
0030553889
-
Social exchange in organizations: Perceived organizational support, leader-member exchange, and employee reciprocity
-
Settoon, R. P., Bennett, N. and Liden, RC. (1996), "Social exchange in organizations: perceived organizational support, leader-member exchange, and employee reciprocity", Journal of Applied Psychology, Vol. 81 No. 3, pp. 219-227.
-
(1996)
Journal of Applied Psychology
, vol.81
, Issue.3
, pp. 219-227
-
-
Settoon, R.P.1
Bennett, N.2
Liden, R.C.3
-
34
-
-
71149100808
-
Are employees putting your company at risk by not following information security policies?
-
Siponen, M., Mahmood, MA. and Pahnila, S. (2009), "Are employees putting your company at risk by not following information security policies?", Communications of the ACM, Vol. 52 No. 12, pp. 145-147.
-
(2009)
Communications of the ACM
, vol.52
, Issue.12
, pp. 145-147
-
-
Siponen, M.1
Mahmood, M.A.2
Pahnila, S.3
-
35
-
-
80051785246
-
-
Information Today, Medford, NJ
-
Stanton, J. M. and Stam, K. R. (2006), The Visible Employee, Information Today, Medford, NJ.
-
(2006)
The Visible Employee
-
-
Stanton, J.M.1
Stam, K.R.2
-
36
-
-
22444455782
-
Organizational citizenship behavior of contingent workers in Singapore
-
Van Dyne, L. and Ang, S. (1998), "Organizational citizenship behavior of contingent workers in Singapore", Academy of Management Journal, Vol. 41 No. 6, pp. 692-703.
-
(1998)
Academy of Management Journal
, vol.41
, Issue.6
, pp. 692-703
-
-
Van Dyne, L.1
Ang, S.2
-
37
-
-
2942564710
-
From policies to culture
-
von Solms, R. and von Solms, B. (2004), "From policies to culture", Computers & Security, Vol. 23 No. 4, pp. 275-279.
-
(2004)
Computers & Security
, vol.23
, Issue.4
, pp. 275-279
-
-
Von Solms, R.1
Von Solms, B.2
-
38
-
-
2342475711
-
Towards information security behavioural compliance
-
Vroom, C. and von Solms, R (2004), "Towards information security behavioural compliance", Computers & Security, Vol. 23 No. 3, pp. 191-198.
-
(2004)
Computers & Security
, vol.23
, Issue.3
, pp. 191-198
-
-
Vroom, C.1
Von Solms, R.2
-
39
-
-
79955622246
-
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention
-
Warkentin, M., Johnston, A. C and Shropshire, J. (2011), "The influence of the informal social learning environment on information privacy policy compliance efficacy and intention", European Journal of Information Systems, Vol. 20 No. 3, pp. 267-284.
-
(2011)
European Journal of Information Systems
, vol.20
, Issue.3
, pp. 267-284
-
-
Warkentin, M.1
Johnston, A.C.2
Shropshire, J.3
-
40
-
-
51249115578
-
-
Harvard Business School Press, Boston, MA
-
Westerman, G. and Hunter, R. (2007), IT Risk: Turning Business Threats into Competitive Advantage, Harvard Business School Press, Boston, MA.
-
(2007)
IT Risk: Turning Business Threats Into Competitive Advantage
-
-
Westerman, G.1
Hunter, R.2
-
41
-
-
60649096896
-
Using PLS path modeling for assessing hierarchical construct models: Guidelines and empirical illustration
-
Wetzels, M., Oderkerken-Schroder, G. and van Oppen, C. (2009), "Using PLS path modeling for assessing hierarchical construct models: guidelines and empirical illustration", MIS Quarterly, Vol. 33 No. 1, pp. 177-195.
-
(2009)
MIS Quarterly
, vol.33
, Issue.1
, pp. 177-195
-
-
Wetzels, M.1
Oderkerken-Schroder, G.2
Van Oppen, C.3
-
42
-
-
0025752384
-
Job satisfaction and organizational commitment as predictors of organizational citizenship and in-role behaviors
-
Williams, L. J. and Anderson, S. E. (1991), "Job satisfaction and organizational commitment as predictors of organizational citizenship and in-role behaviors", Journal of Management, Vol. 17 No. 3, pp. 601-617.
-
(1991)
Journal of Management
, vol.17
, Issue.3
, pp. 601-617
-
-
Williams, L.J.1
Anderson, S.E.2
-
43
-
-
84897376001
-
-
InformationWeek Research Report, San Francisco, CA
-
Wilson, T. (2009), "Understanding the danger within", InformationWeek Research Report, San Francisco, CA.
-
(2009)
Understanding the Danger Within
-
-
Wilson, T.1
|