-
1
-
-
85047684662
-
Effects of computer surveillance on perceptions of privacy and procedural justice
-
Alge, B. J. Effects of computer surveillance on perceptions of privacy and procedural justice. Journal of Applied Psychology, 86, 4 (2001), 797-804.
-
(2001)
Journal of Applied Psychology
, vol.86
, Issue.4
, pp. 797-804
-
-
Alge, B.J.1
-
2
-
-
77955039272
-
Team size, dispersion, and social loafing in technology-supported teams: A perspective on the theory of moral disengagement
-
Alnuaimi, O. A.; Robert, L. P.; and Maruping, L. M. Team size, dispersion, and social loafing in technology-supported teams: A perspective on the theory of moral disengagement. Journal of Management Information Systems, 27, 1 (Summer 2010), 203-230.
-
(2010)
Journal of Management Information Systems
, vol.27
, Issue.1 SUMMER
, pp. 203-230
-
-
Alnuaimi, O.A.1
Robert, L.P.2
Maruping, L.M.3
-
3
-
-
77957077814
-
Practicing safe computing: A multimedia empirical examination of home computer user security behavioral intentions
-
Anderson, C. L., and Agarwal, R. Practicing safe computing: A multimedia empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34, 3, (2010), 613-643.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 613-643
-
-
Anderson, C.L.1
Agarwal, R.2
-
4
-
-
81355153720
-
Technostress: Technological antecedents and implications
-
Ayyagari, R.; Grover, V.; and Purvis, R. Technostress: Technological antecedents and implications. MIS Quarterly, 35, 4 (2011), 831-858.
-
(2011)
MIS Quarterly
, vol.35
, Issue.4
, pp. 831-858
-
-
Ayyagari, R.1
Grover, V.2
Purvis, R.3
-
6
-
-
0002915827
-
Social cognitive theory of moral thought and action
-
In W. M. Kurtines and J. L. Gewitz (eds. ) Hillsdale, NJ: Lawrence Erlbaum
-
Bandura, A. Social cognitive theory of moral thought and action. In W. M. Kurtines and J. L. Gewitz (eds. ), Handbook of Moral Behavior and Development, vol. 1. Hillsdale, NJ: Lawrence Erlbaum, 1991, pp. 45-103.
-
(1991)
Handbook of Moral Behavior and Development
, vol.1
, pp. 45-103
-
-
Bandura, A.1
-
7
-
-
0030489733
-
Mechanisms of moral disengagement in the exercise of moral agency
-
Bandura, A.; Barbaranelli, C.; Caprara, G. V.; and Pastorelli, C. Mechanisms of moral disengagement in the exercise of moral agency. Journal of Personality and Social Psychology, 71, 2 (1996), 364-374.
-
(1996)
Journal of Personality and Social Psychology
, vol.71
, Issue.2
, pp. 364-374
-
-
Bandura, A.1
Barbaranelli, C.2
Caprara, G.V.3
Pastorelli, C.4
-
8
-
-
79956273163
-
Lack of sleep and unethical conduct
-
Barnes, C. M.; Schaubroeck, J.; Huth, M.; and Ghumman, S. Lack of sleep and unethical conduct. Organizational Behavior and Human Decision Processes, 115, 2 (2011), 169-180.
-
(2011)
Organizational Behavior and Human Decision Processes
, vol.115
, Issue.2
, pp. 169-180
-
-
Barnes, C.M.1
Schaubroeck, J.2
Huth, M.3
Ghumman, S.4
-
9
-
-
0035534048
-
Why don't people act morally? Motivational considerations
-
Batson, C. D., and Thompson, E. R. Why don't people act morally? Motivational considerations. Current Directions in Psychological Science, 10, 2 (2001), 54-57.
-
(2001)
Current Directions in Psychological Science
, vol.10
, Issue.2
, pp. 54-57
-
-
Batson, C.D.1
Thompson, E.R.2
-
11
-
-
33645301638
-
Understanding user responses to information technology: A coping model of user adaptation
-
Beaudry, A., and Pinsonneault, A. Understanding user responses to information technology: A coping model of user adaptation. MIS Quarterly, 29, 3 (2005), 493-524.
-
(2005)
MIS Quarterly
, vol.29
, Issue.3
, pp. 493-524
-
-
Beaudry, A.1
Pinsonneault, A.2
-
13
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
Bulgurcu B.; Cavusoglu, H.; and Benbasat, I. Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34, 3 (2010), 523-548.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
14
-
-
84877935501
-
Organizations' information security policy compliance: Stick or carrot approach
-
Chen, Y.; Ramamurthy, K.; and Wen, K.-W. Organizations' information security policy compliance: Stick or carrot approach? Journal of Management Information Systems, 29, 3 (Winter 2012-13), 157-188.
-
(2012)
Journal of Management Information Systems
, vol.29
, Issue.3 WINTER
, pp. 157-188
-
-
Chen, Y.1
Ramamurthy, K.2
Wen, K.-W.3
-
15
-
-
77956571989
-
When formal controls undermine trust and cooperation
-
Christ, M. H.; Sedatole, K. L.; Towry, K. L.; and Thomas, M. A. When formal controls undermine trust and cooperation. Strategic Finance, 89, 7 (2010), 39-44.
-
(2010)
Strategic Finance
, vol.89
, Issue.7
, pp. 39-44
-
-
Christ, M.H.1
Sedatole, K.L.2
Towry, K.L.3
Thomas, M.A.4
-
17
-
-
77957341507
-
Linking job demands and resources to employee engagement and burnout: A theoretical extension and meta-analytic test
-
Crawford, E. R.; LePine, J. A.; and Rich, B. L. Linking job demands and resources to employee engagement and burnout: A theoretical extension and meta-analytic test. Journal of Applied Psychology, 95, 5 (2010), 834-848.
-
(2010)
Journal of Applied Psychology
, vol.95
, Issue.5
, pp. 834-848
-
-
Crawford, E.R.1
LePine, J.A.2
Rich, B.L.3
-
18
-
-
84876570327
-
Future directions for behavioral information security research
-
Crossler, R. E.; Johnston, A. C.; Lowry, P. B.; Hu, Q.; Warkentin, M.; and Baskerville, R . Future directions for behavioral information security research. Computers & Security, 32, 1 (2013), 90-101.
-
(2013)
Computers & Security
, vol.32
, Issue.1
, pp. 90-101
-
-
Crossler, R.E.1
Johnston, A.C.2
Lowry, P.B.3
Hu, Q.4
Warkentin, M.5
Baskerville, R.6
-
19
-
-
84870743776
-
Employee misuse of information technology resources: Testing a contemporary deterrence model
-
D'Arcy, J., and Devaraj, S. Employee misuse of information technology resources: Testing a contemporary deterrence model. Decision Sciences, 43, 6 (2012), 1091-1124.
-
(2012)
Decision Sciences
, vol.43
, Issue.6
, pp. 1091-1124
-
-
D'Arcy, J.1
Devaraj, S.2
-
20
-
-
67649551429
-
User awareness of security countermeasures and its impact on information systems misuse: A deterrence perspective
-
D'Arcy, J.; Hovav, A.; and Galletta, D. G. User awareness of security countermeasures and its impact on information systems misuse: A deterrence perspective. Information Systems Research, 20, 1 (2009), 79-98.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 79-98
-
-
D'Arcy, J.1
Hovav, A.2
Galletta, D.G.3
-
21
-
-
41549124000
-
Moral disengagement in ethical decision making: A study of antecedents and outcomes
-
Detert, J. R.; Trevino, L. K.; and Sweitzer, V. L. Moral disengagement in ethical decision making: A study of antecedents and outcomes. Journal of Applied Psychology, 93, 2 (2008), 374-391.
-
(2008)
Journal of Applied Psychology
, vol.93
, Issue.2
, pp. 374-391
-
-
Detert, J.R.1
Trevino, L.K.2
Sweitzer, V.L.3
-
22
-
-
84862236837
-
A social context model of envy and social undermining
-
Duffy, M. K.; Scott, K. L.; Shaw, J. D.; Tepper, B. J.; and Aquino, K. A social context model of envy and social undermining. Academy of Management Journal, 55, 3 (2012), 643-666.
-
(2012)
Academy of Management Journal
, vol.55
, Issue.3
, pp. 643-666
-
-
Duffy, M.K.1
Scott, K.L.2
Shaw, J.D.3
Tepper, B.J.4
Aquino, K.5
-
23
-
-
77953112413
-
Information systems appraisal and coping: The role of user perceptions
-
Fadel, K. J., and Brown, S. A. Information systems appraisal and coping: The role of user perceptions. Communications of the Association for Information Systems, 26, 6 (2010), 107-126.
-
(2010)
Communications of the Association for Information Systems
, vol.26
, Issue.6
, pp. 107-126
-
-
Fadel, K.J.1
Brown, S.A.2
-
25
-
-
43949123279
-
A meta-analysis of work demand stressors and job performance: Examining main and moderating effects
-
Gilboa, S.; Shirom, A.; Fried, Y.; and Cooper, G. A meta-analysis of work demand stressors and job performance: Examining main and moderating effects. Personnel Psychology, 61, 2 (2008), 227-271.
-
(2008)
Personnel Psychology
, vol.61
, Issue.2
, pp. 227-271
-
-
Gilboa, S.1
Shirom, A.2
Fried, Y.3
Cooper, G.4
-
26
-
-
78649994214
-
Metrics for characterizing the form of security policies
-
Goel, S., and Chengalur-Smith, I. N. Metrics for characterizing the form of security policies. Journal of Strategic Information Systems, 19, 4 (2010), 281-295.
-
(2010)
Journal of Strategic Information Systems
, vol.19
, Issue.4
, pp. 281-295
-
-
Goel, S.1
Chengalur-Smith, I.N.2
-
27
-
-
81255163048
-
Understanding non-malicious security violations in the workplace: A composite behavior model
-
Guo, K. H.; Yuan, Y.; Archer, N. P.; and Connelly, C. E. Understanding non-malicious security violations in the workplace: A composite behavior model. Journal of Management Information Systems, 28, 2 (Fall 2011), 203-236.
-
(2011)
Journal of Management Information Systems
, vol.28
, Issue.2 FALL
, pp. 203-236
-
-
Guo, K.H.1
Yuan, Y.2
Archer, N.P.3
Connelly, C.E.4
-
28
-
-
84973806845
-
A five-item measure of socially desirable response set
-
Hays, R. D.; Hayashi, T.; and Stewart, A. L. A five-item measure of socially desirable response set. Educational and Psychological Measurement, 49, 3 (1989), 629-637.
-
(1989)
Educational and Psychological Measurement
, vol.49
, Issue.3
, pp. 629-637
-
-
Hays, R.D.1
Hayashi, T.2
Stewart, A.L.3
-
29
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
Herath, T., and Rao, H. R. Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18, 2 (2009), 106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
30
-
-
84889663520
-
Security services as coping mechanisms: An investigation into user intention to adopt an email authentication service
-
Herath, T.; Chen, R.; Wang, J.; Banjara, K.; Wilbur, J.; and Rao. H. R. Security services as coping mechanisms: An investigation into user intention to adopt an email authentication service. Information Systems Journal, 24, 1 (2014), 61-84.
-
(2014)
Information Systems Journal
, vol.24
, Issue.1
, pp. 61-84
-
-
Herath, T.1
Chen, R.2
Wang, J.3
Banjara, K.4
Wilbur, J.5
Rao, H.R.6
-
31
-
-
0024632747
-
Conservation of resources
-
Hobfoll, S. E. Conservation of resources. American Psychologist, 44, 3 (1989), 513-524.
-
(1989)
American Psychologist
, vol.44
, Issue.3
, pp. 513-524
-
-
Hobfoll, S.E.1
-
32
-
-
84863542038
-
Managing employee compliance with information security policies: The critical role of top management and organizational culture
-
Hu, Q.; Dinev, T.; Hart, P.; and Cooke, D. Managing employee compliance with information security policies: The critical role of top management and organizational culture. Decision Sciences, 43, 4 (2012), 615-660.
-
(2012)
Decision Sciences
, vol.43
, Issue.4
, pp. 615-660
-
-
Hu, Q.1
Dinev, T.2
Hart, P.3
Cooke, D.4
-
33
-
-
79959944364
-
Does deterrence work in reducing information security policy abuse by employees
-
Hu, Q.; Zhengchuan, X.; Dinev, T.; and Ling, H. Does deterrence work in reducing information security policy abuse by employees? Communications of the ACM, 54, 6 (2011), 54-60.
-
(2011)
Communications of the ACM
, vol.54
, Issue.6
, pp. 54-60
-
-
Hu, Q.1
Zhengchuan, X.2
Dinev, T.3
Ling, H.4
-
34
-
-
0242424963
-
A critical review of construct indicators and measurement model misspecification in marketing and consumer research
-
Jarvis, C. B.; MacKenzie, S. B.; and Podsakoff, P. M. A critical review of construct indicators and measurement model misspecification in marketing and consumer research. Journal of Consumer Research, 30, 2 (2003), 199-218.
-
(2003)
Journal of Consumer Research
, vol.30
, Issue.2
, pp. 199-218
-
-
Jarvis, C.B.1
MacKenzie, S.B.2
Podsakoff, P.M.3
-
35
-
-
76449087987
-
Bad apples, bad cases, and bad barrels: Meta-analytic evidence about sources of unethical decisions at work
-
Kish-Gephart, J. J.; Harrison, D. A.; and Trevino, L. K. Bad apples, bad cases, and bad barrels: Meta-analytic evidence about sources of unethical decisions at work. Journal of Applied Psychology, 95, 1 (2010), 1-31.
-
(2010)
Journal of Applied Psychology
, vol.95
, Issue.1
, pp. 1-31
-
-
Kish-Gephart, J.J.1
Harrison, D.A.2
Trevino, L.K.3
-
36
-
-
84898403246
-
Healthcare security strategies for information security and regulatory compliance
-
Kwon, J., and Johnson, M. E. Healthcare security strategies for information security and regulatory compliance. Journal of Management Information Systems, 30, 2 (Fall 2013), 41-66.
-
(2013)
Journal of Management Information Systems
, vol.30
, Issue.2 FALL
, pp. 41-66
-
-
Kwon, J.1
Johnson, M.E.2
-
38
-
-
0003704999
-
-
New York: Springer
-
Lazarus, R. S., and Folkman, S. Stress, Appraisal, and Coping. New York: Springer, 1984.
-
(1984)
Stress, Appraisal, and Coping
-
-
Lazarus, R.S.1
Folkman, S.2
-
39
-
-
28744432352
-
A meta-analytic test of the challenge stressor-hindrance stressor framework: An explanation for inconsistent relationships among stressors and performance
-
LePine, J. A.; Podsakoff, N. P.; and LePine, M. A. A meta-analytic test of the challenge stressor-hindrance stressor framework: An explanation for inconsistent relationships among stressors and performance. Journal of Applied Psychology, 48, 5 (2005), 764-775.
-
(2005)
Journal of Applied Psychology
, vol.48
, Issue.5
, pp. 764-775
-
-
LePine, J.A.1
Podsakoff, N.P.2
LePine, M.A.3
-
40
-
-
75349090403
-
Understanding compliance with Internet use policy from the perspective of rational choice theory
-
Li, H.; Zhang, J.; and Sarathy, R. Understanding compliance with Internet use policy from the perspective of rational choice theory. Decision Support Systems, 48, 4 (2010), 635-645.
-
(2010)
Decision Support Systems
, vol.48
, Issue.4
, pp. 635-645
-
-
Li, H.1
Zhang, J.2
Sarathy, R.3
-
41
-
-
60649084770
-
Avoidance of information technology threats: A theoretical perspective
-
Liang, H., and Xue, Y. Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33, 1 (2009), 71-90.
-
(2009)
MIS Quarterly
, vol.33
, Issue.1
, pp. 71-90
-
-
Liang, H.1
Xue, Y.2
-
42
-
-
0142123338
-
The IT way of loafing on the job: Cyberloafing, neutralizing, and organizational justice
-
Lim, V. K. G. The IT way of loafing on the job: Cyberloafing, neutralizing, and organizational justice. Journal of Organizational Behavior, 23, 5 (2002), 675-694.
-
(2002)
Journal of Organizational Behavior
, vol.23
, Issue.5
, pp. 675-694
-
-
Lim, V.K.G.1
-
43
-
-
80051733015
-
Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques
-
MacKenzie, S. B.; Podsakoff, P. M.; and Podsakoff, N. P. Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques. MIS Quarterly, 35, 2 (2011), 293-334.
-
(2011)
MIS Quarterly
, vol.35
, Issue.2
, pp. 293-334
-
-
MacKenzie, S.B.1
Podsakoff, P.M.2
Podsakoff, N.P.3
-
44
-
-
84857478874
-
Why employees do bad things: Moral disengagement and unethical organizational behavior
-
Moore, C.; Detert, J. R.; Trevino, L. K.; Baker, V. I.; and Mayer, D. M. Why employees do bad things: Moral disengagement and unethical organizational behavior. Personnel Psychology, 65, 1 (2012), 1-48.
-
(2012)
Personnel Psychology
, vol.65
, Issue.1
, pp. 1-48
-
-
Moore, C.1
Detert, J.R.2
Trevino, L.K.3
Baker, V.I.4
Mayer, D.M.5
-
45
-
-
0039302410
-
Individual adjustment during technological innovation: A research framework
-
Nelson, D., and Kletke, M. G. Individual adjustment during technological innovation: A research framework. Behavior and Information Technology, 9, 4 (1995), 257-271.
-
(1995)
Behavior and Information Technology
, vol.9
, Issue.4
, pp. 257-271
-
-
Nelson, D.1
Kletke, M.G.2
-
46
-
-
0030521693
-
Sanction threats and appeals to morality: Testing a rational choice model of corporate crime
-
Paternoster, R., and Simpson, S. Sanction threats and appeals to morality: Testing a rational choice model of corporate crime. Law & Society Review, 30, 3 (1996), 549-584.
-
(1996)
Law & Society Review
, vol.30
, Issue.3
, pp. 549-584
-
-
Paternoster, R.1
Simpson, S.2
-
47
-
-
64249147797
-
Coping with challenge and hindrance stressors in teams: Behavioral, cognitive, and affective outcomes
-
Pearsall, M. J.; Ellis, A. P. J.; and Steinm, J. H. Coping with challenge and hindrance stressors in teams: Behavioral, cognitive, and affective outcomes. Organizational Behavior and Human Decision Processes, 109, 1 (2009), 18-28.
-
(2009)
Organizational Behavior and Human Decision Processes
, vol.109
, Issue.1
, pp. 18-28
-
-
Pearsall, M.J.1
Ellis, A.P.J.2
Steinm, J.H.3
-
48
-
-
0033442650
-
An examination of attributions and emotions in the transactional approach to organizational stress process
-
Perrewe, P. L., and Zellars, K. L. An examination of attributions and emotions in the transactional approach to organizational stress process. Journal of Organizational Behavior, 20, 5 (1999), 739-752.
-
(1999)
Journal of Organizational Behavior
, vol.20
, Issue.5
, pp. 739-752
-
-
Perrewe, P.L.1
Zellars, K.L.2
-
49
-
-
33947416694
-
Differential challenge stressor-hindrance stressor relationships with job attitudes, turnover intentions, turnover, and withdrawal behavior: A meta-analysis
-
Podsakoff, N. P.; LePine, J. A.; and LePine, M. A. Differential challenge stressor-hindrance stressor relationships with job attitudes, turnover intentions, turnover, and withdrawal behavior: A meta-analysis. Journal of Applied Psychology, 92, 2 (2007), 438-454.
-
(2007)
Journal of Applied Psychology
, vol.92
, Issue.2
, pp. 438-454
-
-
Podsakoff, N.P.1
LePine, J.A.2
LePine, M.A.3
-
50
-
-
0141907688
-
Common method biases in behavioral research: A critical review of the literature and recommended remedies
-
Podsakoff, P. M.; MacKenzie, S. B.; Lee, J. Y.; and Podsakoff, N. P. Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88, 5 (2003), 879-903.
-
(2003)
Journal of Applied Psychology
, vol.88
, Issue.5
, pp. 879-903
-
-
Podsakoff, P.M.1
MacKenzie, S.B.2
Lee, J.Y.3
Podsakoff, N.P.4
-
51
-
-
80051795854
-
Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes
-
Posey, C.; Bennett, R. J.; and Roberts, T. L. Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes. Computers & Security, 30, 6 (2011), 486-497.
-
(2011)
Computers & Security
, vol.30
, Issue.6
, pp. 486-497
-
-
Posey, C.1
Bennett, R.J.2
Roberts, T.L.3
-
52
-
-
84875487357
-
When computer monitoring backfires: Privacy invasions and organizational injustice as precursors to computer abuse
-
Posey, C.; Bennett, R. J.; Roberts, T. L.; and Lowry, P. B. When computer monitoring backfires: Privacy invasions and organizational injustice as precursors to computer abuse. Journal of Information Systems Security, 7, 1 (2011), 24-47.
-
(2011)
Journal of Information Systems Security
, vol.7
, Issue.1
, pp. 24-47
-
-
Posey, C.1
Bennett, R.J.2
Roberts, T.L.3
Lowry, P.B.4
-
53
-
-
34248334263
-
Evaluating information security tradeoffs: Restricting access can interfere with user tasks
-
Post, G. V., and Kagan, A. Evaluating information security tradeoffs: Restricting access can interfere with user tasks. Computers & Security, 26, 3 (2007), 229-237.
-
(2007)
Computers & Security
, vol.26
, Issue.3
, pp. 229-237
-
-
Post, G.V.1
Kagan, A.2
-
55
-
-
78650770842
-
Improving employees' compliance through information systems security training: An action research study
-
Puhakainen, P., and Siponen, M. Improving employees' compliance through information systems security training: An action research study. MIS Quarterly, 34, 4 (2010), 757-778.
-
(2010)
MIS Quarterly
, vol.34
, Issue.4
, pp. 757-778
-
-
Puhakainen, P.1
Siponen, M.2
-
56
-
-
61349088062
-
The consequences of technostress for end users in organizations: Conceptual development and empirical validation
-
Ragu-Nathan, T. S.; Tarafdar, M.; and Ragu-Nathan, B. S. The consequences of technostress for end users in organizations: Conceptual development and empirical validation. Information Systems Research, 19, 4 (2008), 417-433.
-
(2008)
Information Systems Research
, vol.19
, Issue.4
, pp. 417-433
-
-
Ragu-Nathan, T.S.1
Tarafdar, M.2
Ragu-Nathan, B.S.3
-
57
-
-
72249121847
-
Can "good" stressors spark "bad" behaviors? the mediating role of emotions in links of challenge and hindrance stressors with citizenship and counterproductive behaviors
-
Rodell, J. B., and Judge, T. A. Can "good" stressors spark "bad" behaviors? The mediating role of emotions in links of challenge and hindrance stressors with citizenship and counterproductive behaviors. Journal of Applied Psychology, 94, 6 (2009), 1438-1451.
-
(2009)
Journal of Applied Psychology
, vol.94
, Issue.6
, pp. 1438-1451
-
-
Rodell, J.B.1
Judge, T.A.2
-
58
-
-
84867631863
-
Honesty requires time (and lack of justifications)
-
Shalvi, S.; Eldar, O.; and Bereby-Meyer, Y. Honesty requires time (and lack of justifications). Psychological Science, 23, 10 (2012), 1264-1270.
-
(2012)
Psychological Science
, vol.23
, Issue.10
, pp. 1264-1270
-
-
Shalvi, S.1
Eldar, O.2
Bereby-Meyer, Y.3
-
59
-
-
79751492511
-
Dishonest deed, clear conscience: When cheating leads to moral disengagement and motivated forgetting
-
Shu, L. L.; Gino, F.; and Bazerman, M. H. Dishonest deed, clear conscience: When cheating leads to moral disengagement and motivated forgetting. Personality and Social Psychology Bulletin, 37, 3 (2011), 330-349.
-
(2011)
Personality and Social Psychology Bulletin
, vol.37
, Issue.3
, pp. 330-349
-
-
Shu, L.L.1
Gino, F.2
Bazerman, M.H.3
-
60
-
-
8744290801
-
Critical analysis of different approaches to minimizing user-related faults in information systems security: Implications for research and practice
-
Siponen, M. Critical analysis of different approaches to minimizing user-related faults in information systems security: Implications for research and practice. Information Management & Computer Security, 8, 5 (2000), 197-209.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.5
, pp. 197-209
-
-
Siponen, M.1
-
61
-
-
77957068563
-
Neutralization: New insights into the problem of employee information systems security policy violations
-
Siponen, M., and Vance, A. Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34, 3 (2010), 487-502.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 487-502
-
-
Siponen, M.1
Vance, A.2
-
62
-
-
84901290529
-
Guidelines for improving the contextual relevance of field surveys: The case of information security policy violations
-
Siponen, M., and Vance, A. Guidelines for improving the contextual relevance of field surveys: The case of information security policy violations. European Journal of Information Systems, 23, 3 (2014), 289-305.
-
(2014)
European Journal of Information Systems
, vol.23
, Issue.3
, pp. 289-305
-
-
Siponen, M.1
Vance, A.2
-
63
-
-
77957070672
-
User participation in information systems security risk management
-
Spears, J. L., and Barki, H. User participation in information systems security risk management. MIS Quarterly, 34, 3, (2010), 503-522.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 503-522
-
-
Spears, J.L.1
Barki, H.2
-
65
-
-
79953303602
-
Time and moral judgment
-
Suter, R. S., and Hertwig, R. Time and moral judgment. Cognition, 119, 3 (2011), 454-458.
-
(2011)
Cognition
, vol.119
, Issue.3
, pp. 454-458
-
-
Suter, R.S.1
Hertwig, R.2
-
66
-
-
0001155759
-
Techniques of neutralization: A theory of delinquency
-
Sykes, G., and Matza, D. Techniques of neutralization: A theory of delinquency. American Sociological Review, 22, 6 (1957), 664-670.
-
(1957)
American Sociological Review
, vol.22
, Issue.6
, pp. 664-670
-
-
Sykes, G.1
Matza, D.2
-
67
-
-
79951919849
-
Impact of technostress on end-user satisfaction and performance
-
Tarafdar, M.; Tu, Q.; and Ragu-Nathan, T. S. Impact of technostress on end-user satisfaction and performance. Journal of Management Information Systems, 27, 3 (Winter 2010-11), 303-334.
-
(2010)
Journal of Management Information Systems
, vol.27
, Issue.3 WINTER
, pp. 303-334
-
-
Tarafdar, M.1
Tu, Q.2
Ragu-Nathan, T.S.3
-
69
-
-
84876717966
-
Organizational security and the insider threat: Malicious, negligent, and wellmeaning insiders
-
Mountain View, CA
-
Wall, D. S. Organizational security and the insider threat: Malicious, negligent, and wellmeaning insiders. Symantec Research Report, Mountain View, CA, 2011.
-
(2011)
Symantec Research Report
-
-
Wall, D.S.1
-
70
-
-
79955622246
-
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention
-
Warkentin, M.; Johnston, A. C.; and Shropshire, J. The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. European Journal of Information Systems, 20, 3 (2011), 267-284.
-
(2011)
European Journal of Information Systems
, vol.20
, Issue.3
, pp. 267-284
-
-
Warkentin, M.1
Johnston, A.C.2
Shropshire, J.3
-
71
-
-
84873974226
-
Beyond deterrence: An expanded view of employee computer abuse
-
Willison, R., and Warkentin, M. Beyond deterrence: An expanded view of employee computer abuse. MIS Quarterly, 37, 1 (2013), 1-20.
-
(2013)
MIS Quarterly
, vol.37
, Issue.1
, pp. 1-20
-
-
Willison, R.1
Warkentin, M.2
-
72
-
-
84888862290
-
Operationalizing multidimensional constructs in structural equation modeling: Recommendations for is research
-
Wright, R. T.; Campbell, D. E.; Thatcher, J. B.; and Roberts, N. Operationalizing multidimensional constructs in structural equation modeling: Recommendations for IS research. Communications of the Association for Information Systems, 30, 23 (2012), 367-412.
-
(2012)
Communications of the Association for Information Systems
, vol.30
, Issue.23
, pp. 367-412
-
-
Wright, R.T.1
Campbell, D.E.2
Thatcher, J.B.3
Roberts, N.4
-
73
-
-
35148899544
-
Hacking into the minds of hackers
-
Young, R.; Zhang, L.; and Prybutok, V. R. Hacking into the minds of hackers. Information Systems Management, 24, 4 (2007), 281-287.
-
(2007)
Information Systems Management
, vol.24
, Issue.4
, pp. 281-287
-
-
Young, R.1
Zhang, L.2
Prybutok, V.R.3
-
74
-
-
84883204511
-
Managing interdependent information security risks: Cyberinsurance, managed security services, and risk pooling arrangements
-
Zhao, X.; Xue, L.; and Whinston, A. Managing interdependent information security risks: Cyberinsurance, managed security services, and risk pooling arrangements. Journal of Management Information Systems, 30, 1 (Summer 2013), 123-152.
-
(2013)
Journal of Management Information Systems
, vol.30
, Issue.1 SUMMER
, pp. 123-152
-
-
Zhao, X.1
Xue, L.2
Whinston, A.3
|