-
1
-
-
34249871944
-
A qualitative study of user's view on information security
-
Albrechtsen, E. (2007). A qualitative study of user's view on information security. Computers & Security, 26 (4), 276-289.
-
(2007)
Computers & Security
, vol.26
, Issue.4
, pp. 276-289
-
-
Albrechtsen, E.1
-
2
-
-
77951204516
-
Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study
-
Albrechtsen, E. and Hovden, J. (2010). Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study. Computers & Security, 29 (4), 432-445.
-
(2010)
Computers & Security
, vol.29
, Issue.4
, pp. 432-445
-
-
Albrechtsen, E.1
Hovden, J.2
-
4
-
-
77950564668
-
The compliance budget: Managing security behaviour in organisations. New Security Paradigm Workshop
-
ACM, New York USA
-
Beautement, A., Sasse, M.A. and Wonham, M. (2008). The compliance budget: Managing security behaviour in organisations. New Security Paradigm Workshop. In Proceedings of the 2008 Workshop on New Security Paradigms, p. 47-58, ACM, New York USA.
-
(2008)
Proceedings of the 2008 Workshop on New Security Paradigms
, pp. 47-58
-
-
Beautement, A.1
Sasse, M.A.2
Wonham, M.3
-
5
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
Bulgurcy, B., Cavusoglu, H. and Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34 (3), 523-548.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcy, B.1
Cavusoglu, H.2
Benbasat, I.3
-
6
-
-
49149148566
-
The roles of accounting in organizations and society
-
Burchell, S., Clubb, C., Hopwoo, A.G., Hughes, J. and Nahapiet, J. (1980). The roles of accounting in organizations and society. Accounting, Organizations, and Society, 5 (1), 5-27.
-
(1980)
Accounting, Organizations, and Society
, vol.5
, Issue.1
, pp. 5-27
-
-
Burchell, S.1
Clubb, C.2
Hopwoo, A.G.3
Hughes, J.4
Nahapiet, J.5
-
7
-
-
61349159889
-
Perceptions of information security in the workplace: Linking information security climate to compliant behavior
-
Chan, M., Woon, I. and Kankanhalli, A. (2005). Perceptions of information security in the workplace: Linking information security climate to compliant behavior. Journal of Information Privacy & Security, 1 (3), 18-41.
-
(2005)
Journal of Information Privacy & Security
, vol.1
, Issue.3
, pp. 18-41
-
-
Chan, M.1
Woon, I.2
Kankanhalli, A.3
-
8
-
-
34848873123
-
Deterring internal information systems misuse
-
D'arcy, J. and Hovav, A. (2007). Deterring internal information systems misuse. Communications of the ACM, 50 (10), 113-117.
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 113-117
-
-
D'arcy, J.1
Hovav, A.2
-
9
-
-
67649551429
-
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
-
D'arcy, J., Hovav, A. and Galletta, D.F. (2008). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20 (1), 79-98.
-
(2008)
Information Systems Research
, vol.20
, Issue.1
, pp. 79-98
-
-
D'arcy, J.1
Hovav, A.2
Galletta, D.F.3
-
10
-
-
0001009629
-
Diagnosing cultural barriers to knowledge management
-
Delong, D.W. and Fahey, L. (2000). Diagnosing cultural barriers to knowledge management. Academy of Management Executive, 14 (4), 113-127.
-
(2000)
Academy of Management Executive
, vol.14
, Issue.4
, pp. 113-127
-
-
Delong, D.W.1
Fahey, L.2
-
11
-
-
67650318762
-
User behaviour towards protective information technologies: The role of national cultural differences
-
Dinev, T., Goo, J., Hu, Q. and Nam, K. (2009). User behaviour towards protective information technologies: The role of national cultural differences. Information Systems Journal, 19 (4), 391-412.
-
(2009)
Information Systems Journal
, vol.19
, Issue.4
, pp. 391-412
-
-
Dinev, T.1
Goo, J.2
Hu, Q.3
Nam, K.4
-
12
-
-
36448952741
-
Cognitive science implications for enhancing training effectiveness in a serious gaming context
-
Greitzer, F.I., Kucher, O.A. and Huston, K. (2007). Cognitive science implications for enhancing training effectiveness in a serious gaming context. Journal of Educational Resources in Computing, 7 (3), 1-16.
-
(2007)
Journal of Educational Resources in Computing
, vol.7
, Issue.3
, pp. 1-16
-
-
Greitzer, F.I.1
Kucher, O.A.2
Huston, K.3
-
13
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organizations
-
Herath, T. and Rao, H.R. (2009a). Protection motivation and deterrence: A framework for security policy compliance in organizations. European Journal of Information Systems, 18 (2), 106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
14
-
-
67349144062
-
Encouraging information security behaviors in organizations: Role of penalties, pressures, and perceived effectiveness
-
Herath, T. and Rao, H.R. (2009b). Encouraging information security behaviors in organizations: Role of penalties, pressures, and perceived effectiveness. Decision Support Systems, 47 (2), 154-165.
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 154-165
-
-
Herath, T.1
Rao, H.R.2
-
15
-
-
44449084802
-
Two-stage offshoring: An investigation of the Irish bridge
-
Holmström Olsson, H., Conchúir, E., Ågerfalk, P. and Fitzgerald, B. (2008). Two-stage offshoring: An investigation of the Irish bridge. MIS Quarterly, 32 (2), 257-279.
-
(2008)
MIS Quarterly
, vol.32
, Issue.2
, pp. 257-279
-
-
Holmström Olsson, H.1
Conchúir, E.2
Ågerfalk, P.3
Fitzgerald, B.4
-
16
-
-
0003443244
-
-
Thousand Oaks, CA
-
Hofstede, G. (2001). Culture's Consequences: Comparing Values, Behaviors, Institutions, and Organizations Across Nations. Thousand Oaks, CA.
-
(2001)
Culture's Consequences: Comparing Values, Behaviors, Institutions, and Organizations Across Nations
-
-
Hofstede, G.1
-
17
-
-
0345733273
-
Identifying organizational subcultures: An empirical approach
-
Hofstede, G. (1998). Identifying organizational subcultures: An empirical approach. Journal of Management Studies, 35 (1), 1-12.
-
(1998)
Journal of Management Studies
, vol.35
, Issue.1
, pp. 1-12
-
-
Hofstede, G.1
-
18
-
-
0002390117
-
Cultural constraints in management theories
-
Hofstede, G. (1993). Cultural constraints in management theories. Academy of Management Executive, 7 (1), 81-94.
-
(1993)
Academy of Management Executive
, vol.7
, Issue.1
, pp. 81-94
-
-
Hofstede, G.1
-
20
-
-
84859105508
-
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea
-
Hovav, A. and D'arcy, J. (2012). Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea. Information & Management, 49 (2), 99-110.
-
(2012)
Information & Management
, vol.49
, Issue.2
, pp. 99-110
-
-
Hovav, A.1
D'arcy, J.2
-
21
-
-
85071343148
-
Theories of learning and computer-mediated instructional technologies
-
Hung, D. (2001) Theories of learning and computer-mediated instructional technologies. Educational Media International, 38 (4), 281-287.
-
(2001)
Educational Media International
, vol.38
, Issue.4
, pp. 281-287
-
-
Hung, D.1
-
22
-
-
77957057727
-
Fear appeals and information security behaviors: An empirical study
-
Johnston, A.C. and Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34 (3), 549-566.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 549-566
-
-
Johnston, A.C.1
Warkentin, M.2
-
23
-
-
80052902327
-
Toward a new meta-theory for designing information systems (IS) security training approaches
-
Karjalainen, M. and Siponen, M. (2011). Toward a new meta-theory for designing information systems (IS) security training approaches. Journal of the Association for Information Systems, 12 (8), 518-555.
-
(2011)
Journal of the Association for Information Systems
, vol.12
, Issue.8
, pp. 518-555
-
-
Karjalainen, M.1
Siponen, M.2
-
25
-
-
0141860786
-
Generalizing generalizability in information systems research
-
Lee, A.S. and Baskerville, R.L. (2003). Generalizing generalizability in information systems research. Information Systems Research, 14 (3), 221-243.
-
(2003)
Information Systems Research
, vol.14
, Issue.3
, pp. 221-243
-
-
Lee, A.S.1
Baskerville, R.L.2
-
26
-
-
2342489402
-
An integrative model of computer abuse based on social control and general deterrence theories
-
Lee, S.M., Lee, S.G. and Yoo, S. (2004). An integrative model of computer abuse based on social control and general deterrence theories. Information Management, 41 (6), 707-718.
-
(2004)
Information Management
, vol.41
, Issue.6
, pp. 707-718
-
-
Lee, S.M.1
Lee, S.G.2
Yoo, S.3
-
27
-
-
33846010136
-
Review: A review of culture in information systems research: Toward a theory of information technology culture conflict
-
Leidner, D. and Keyworth, T. (2006). Review: A review of culture in information systems research: Toward a theory of information technology culture conflict. MIS Quarterly, 30 (2), 357-399.
-
(2006)
MIS Quarterly
, vol.30
, Issue.2
, pp. 357-399
-
-
Leidner, D.1
Keyworth, T.2
-
28
-
-
75349090403
-
Understanding compliance with Internet use policy from the perspective of rational choice theory
-
Li, H., Zhang, J. and Sarathy, R. (2010). Understanding compliance with Internet use policy from the perspective of rational choice theory. Decision Support Systems, 48 (4), 635-645.
-
(2010)
Decision Support Systems
, vol.48
, Issue.4
, pp. 635-645
-
-
Li, H.1
Zhang, J.2
Sarathy, R.3
-
32
-
-
33846313618
-
The qualitative interview in is research: Examining the craft
-
Myers, M. and Newman, M. (2007). The qualitative interview in IS research: Examining the craft. Information and Organization, 17 (1), 2-26.
-
(2007)
Information and Organization
, vol.17
, Issue.1
, pp. 2-26
-
-
Myers, M.1
Newman, M.2
-
33
-
-
0001790514
-
Beyond models of national culture in information systems research
-
Myers, M.D. and Tan, F.B. (2002). Beyond models of national culture in information systems research. Journal of Global Information Management, 10 (1), 24-32.
-
(2002)
Journal of Global Information Management
, vol.10
, Issue.1
, pp. 24-32
-
-
Myers, M.D.1
Tan, F.B.2
-
34
-
-
67650143327
-
What levels of moral reasoning and values explain adherence to information security rules? An empirical study
-
Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T. and Vance, A. (2009). What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems, 18 (2), 126-139.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 126-139
-
-
Myyry, L.1
Siponen, M.2
Pahnila, S.3
Vartiainen, T.4
Vance, A.5
-
36
-
-
0010026477
-
Social constructivist perspectives on teaching and learning
-
Palincsar, A.S. (1998). Social constructivist perspectives on teaching and learning. Annual Review of Psychology, 49, 345-375.
-
(1998)
Annual Review of Psychology
, vol.49
, pp. 345-375
-
-
Palincsar, A.S.1
-
37
-
-
33749347189
-
Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior
-
Pavlou, P.A. and Fygenson, M. (2005). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. MIS Quarterly, 30 (1), 115-143.
-
(2005)
MIS Quarterly
, vol.30
, Issue.1
, pp. 115-143
-
-
Pavlou, P.A.1
Fygenson, M.2
-
38
-
-
78650770842
-
Improving employee's compliance through is security training: An action research study
-
Puhakainen, P. and Siponen, M. (2010). Improving employee's compliance through IS security training: An action research study. MIS Quarterly, 34 (4), 1-23.
-
(2010)
MIS Quarterly
, vol.34
, Issue.4
, pp. 1-23
-
-
Puhakainen, P.1
Siponen, M.2
-
39
-
-
76949108035
-
Exploring agility in distributed information systems development (ISD) teams: An interpretive study in an offshoring context
-
Sarker, S. and Sarker, S. (2009). Exploring agility in distributed information systems development (ISD) teams: An interpretive study in an offshoring context. Information Systems Research, 20 (3), 440-461.
-
(2009)
Information Systems Research
, vol.20
, Issue.3
, pp. 440-461
-
-
Sarker, S.1
Sarker, S.2
-
40
-
-
33845767551
-
Actor-networks and business process change failure: An interpretive case study
-
Sarker, S., Sarker, S. and Sidorova, A. (2006). Actor-networks and business process change failure: An interpretive case study. Journal of Management Information Systems, 23 (1), 51-86.
-
(2006)
Journal of Management Information Systems
, vol.23
, Issue.1
, pp. 51-86
-
-
Sarker, S.1
Sarker, S.2
Sidorova, A.3
-
41
-
-
0035387175
-
Transforming the 'weakest link' human/computer interaction approach to usable and effective security
-
Sasse, A., Brostoff, S. and Weirich, D. (2001). Transforming the 'weakest link' human/computer interaction approach to usable and effective security. BT Technology Journal, 19 (3), 122-131.
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, A.1
Brostoff, S.2
Weirich, D.3
-
42
-
-
0001307994
-
Quality in qualitative research
-
Seale, C. (1999), Quality in qualitative research. Qualitative Inquiry, 5 (4), 465-478.
-
(1999)
Qualitative Inquiry
, vol.5
, Issue.4
, pp. 465-478
-
-
Seale, C.1
-
43
-
-
84857005992
-
Towards the improved treatment of generalization of knowledge claims in is research: Drawing general conclusions from samples
-
Seddon, P. and Scheepers, R. (2012). Towards the improved treatment of generalization of knowledge claims in IS research: Drawing general conclusions from samples. European Journal of Information Systems, 21 (1), 6-21.
-
(2012)
European Journal of Information Systems
, vol.21
, Issue.1
, pp. 6-21
-
-
Seddon, P.1
Scheepers, R.2
-
44
-
-
0002943369
-
How culture forms, develops and changes
-
Kilmann, R.H., Saxton, M.J., Serpa, R. and Associates Eds, Jossey-Bass, San Francisco
-
Schein, E.H. (1985). How culture forms, develops and changes. In Gaining Control of the Corporate Culture. (Kilmann, R.H., Saxton, M.J., Serpa, R. and Associates Eds.), pp. 17-43, Jossey-Bass, San Francisco.
-
(1985)
Gaining Control of the Corporate Culture
, pp. 17-43
-
-
Schein, E.H.1
-
45
-
-
79651475580
-
Designing interviews to generate rich data for information systems research
-
Schulze, U. and Avital, A. (2011). Designing interviews to generate rich data for information systems research. Information & Organization, 21 (1), 1-16.
-
(2011)
Information & Organization
, vol.21
, Issue.1
, pp. 1-16
-
-
Schulze, U.1
Avital, A.2
-
46
-
-
36248967046
-
Employees' adherence to information security policies: An empirical study
-
(Venter, H., Eloff, M., Labuschagne, L., Eloff, J. and Von Solms, R. Eds), Sandton, South Africa
-
Siponen, M.T., Pahnila, S. and Mahmood, A. (2007). Employees' adherence to information security policies: An empirical study. In Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007): New Approaches for Security, Privacy and Trust in Complex Environments (Venter, H., Eloff, M., Labuschagne, L., Eloff, J. and Von Solms, R. Eds.), p. 133- 144, Sandton, South Africa.
-
(2007)
Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007): New Approaches for Security, Privacy and Trust in Complex Environments
, pp. 133-144
-
-
Siponen, M.T.1
Pahnila, S.2
Mahmood, A.3
-
48
-
-
77957068563
-
Neutralization: New insights into the problem of employee information systems security policy violations
-
Siponen, M. and Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34 (1), 1-15.
-
(2010)
MIS Quarterly
, vol.34
, Issue.1
, pp. 1-15
-
-
Siponen, M.1
Vance, A.2
-
50
-
-
17844366573
-
Analysis of end user security behaviours
-
Stanton, J.M., Stam, K.R., Mastrangelo, P. and Jolton, J. (2005). Analysis of end user security behaviours. Computers and Security, 24 (2), 124-133.
-
(2005)
Computers and Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
51
-
-
0004259198
-
-
Second edition. Sage Publications, Thousand Oaks CA
-
Stinger, E.T. (1999). Action Research. Second edition. Sage Publications, Thousand Oaks CA.
-
(1999)
Action Research
-
-
Stinger, E.T.1
-
52
-
-
0002364735
-
Toward a theory-based measurement of culture
-
Straub, D., Loch, K., Evaristo, R., Karahanna. E., and Srite, M. (2002). Toward a theory-based measurement of culture. Journal of Global Information Management, 10 (1), 13-23.
-
(2002)
Journal of Global Information Management
, vol.10
, Issue.1
, pp. 13-23
-
-
Straub, D.1
Loch, K.2
Evaristo, R.3
Karahanna, E.4
Srite, M.5
-
54
-
-
0041864816
-
Cross-cultural software production and use: A structurational analysis
-
Walsham, G. (2002). Cross-cultural software production and use: A structurational analysis. MIS Quarterly, 26 (4), 359-380.
-
(2002)
MIS Quarterly
, vol.26
, Issue.4
, pp. 359-380
-
-
Walsham, G.1
-
55
-
-
0000533265
-
Theory construction as disciplined imagination
-
Weick, K.E. (1989). Theory construction as disciplined imagination. Academy of Management Review, 14 (4), 516-531.
-
(1989)
Academy of Management Review
, vol.14
, Issue.4
, pp. 516-531
-
-
Weick, K.E.1
|