-
2
-
-
0000357545
-
Estimating Nonresponse Bias in Mail Surveys
-
Armstrong, J. S., and Overton, T. S. 1977. “Estimating Nonresponse Bias in Mail Surveys,” Journal of Marketing Research (14:3), pp. 396-402.
-
(1977)
Journal of Marketing Research
, vol.14
, Issue.3
, pp. 396-402
-
-
Armstrong, J.S.1
Overton, T.S.2
-
4
-
-
0003871216
-
-
New York: Holt, Rinehart and Winston, Inc
-
Bandura, A., and Walters, R. H. 1963. Social Learning and Personality Development, New York: Holt, Rinehart and Winston, Inc.
-
(1963)
Social Learning and Personality Development
-
-
Bandura, A.1
Walters, R.H.2
-
5
-
-
58849132056
-
Shadow systems: The Good, The Bad and The Ugly
-
Behrens, S. 2009. “Shadow systems: The Good, The Bad and The Ugly,” Communications of the ACM (52:2), pp. 124-129.
-
(2009)
Communications of the ACM
, vol.52
, Issue.2
, pp. 124-129
-
-
Behrens, S.1
-
7
-
-
77957061746
-
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
-
Bulgurcu, B., Cavusoglu, H., and Benbasat, I. 2010. “Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness,” MIS Quarterly (34:3), pp. 523-548.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
8
-
-
21144461918
-
Data Analysis Strategies for Mixed-Method Evaluation Designs
-
Caracelli, V. J., and Greene, J. C. 1993. “Data Analysis Strategies for Mixed-Method Evaluation Designs,” Educational Evaluation and Policy Analysis (15:2), pp. 195-207.
-
(1993)
Educational Evaluation and Policy Analysis
, vol.15
, Issue.2
, pp. 195-207
-
-
Caracelli, V.J.1
Greene, J.C.2
-
9
-
-
0003095695
-
The partial least squares approach to structural equation modeling
-
G. A. Marcoulides (ed.), (. Mahwah, NJ: Lawrence Erlbaum
-
Chin, W. W. 1998. “The partial least squares approach to structural equation modeling,” in Modern Methods for Business Research, G. A. Marcoulides (ed.), (Vol. 295) Mahwah, NJ: Lawrence Erlbaum, pp. 295-336.
-
(1998)
Modern Methods for Business Research
, vol.295
, pp. 295-336
-
-
Chin, W.W.1
-
10
-
-
84876570327
-
Future directions for behavioral information security research
-
Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., and Baskerville, R. 2013. “Future directions for behavioral information security research,” Computers & Security (32), pp. 90-101.
-
(2013)
Computers & Security
, vol.32
, pp. 90-101
-
-
Crossler, R.E.1
Johnston, A.C.2
Lowry, P.B.3
Hu, Q.4
Warkentin, M.5
Baskerville, R.6
-
11
-
-
84903215189
-
Understanding Compliance with Bring Your Own Device Policies Utilizing Protection Motivation Theory: Bridging the Intention-Behavior Gap
-
Crossler, R. E., Long, J. H., Loraas, T. M., and Trinkle, B. S. 2014. “Understanding Compliance with Bring Your Own Device Policies Utilizing Protection Motivation Theory: Bridging the Intention-Behavior Gap,” Journal of Information Systems (28:1), pp. 209-226.
-
(2014)
Journal of Information Systems
, vol.28
, Issue.1
, pp. 209-226
-
-
Crossler, R.E.1
Long, J.H.2
Loraas, T.M.3
Trinkle, B.S.4
-
12
-
-
67649551429
-
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
-
D'Arcy, J., Hovav, A., and Galletta, D. 2009. “User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach,” Information Systems Research (20:1), pp. 79-98.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 79-98
-
-
D'Arcy, J.1
Hovav, A.2
Galletta, D.3
-
14
-
-
62949117569
-
Who influences whom? Analyzing workplace referents' social influence on IT adoption and non-adoption
-
Eckhardt, A., Laumer, S., and Weitzel, T. 2009. “Who influences whom? Analyzing workplace referents' social influence on IT adoption and non-adoption,” Journal of Information Technology (24:1), pp. 11-24.
-
(2009)
Journal of Information Technology
, vol.24
, Issue.1
, pp. 11-24
-
-
Eckhardt, A.1
Laumer, S.2
Weitzel, T.3
-
15
-
-
84861165903
-
The Future of Enterprise IT in the Cloud
-
Erbes, J., Motahari-Nezhad, H. R., and Graupner, S. 2012. “The Future of Enterprise IT in the Cloud,” IEEE Computer Society (45:5), pp. 66-72.
-
(2012)
IEEE Computer Society
, vol.45
, Issue.5
, pp. 66-72
-
-
Erbes, J.1
Motahari-Nezhad, H.R.2
Graupner, S.3
-
16
-
-
0001774151
-
The Impact of Developer Responsiveness on Perceptions of Usefulness and Ease of Use: An Extension of the Technology Acceptance Model
-
Gefen, D., and Keil, M. 1998. “The Impact of Developer Responsiveness on Perceptions of Usefulness and Ease of Use: An Extension of the Technology Acceptance Model,” The DATA BASE for Advances in Information Systems (29:2), pp. 35-49.
-
(1998)
The DATA BASE for Advances in Information Systems
, vol.29
, Issue.2
, pp. 35-49
-
-
Gefen, D.1
Keil, M.2
-
17
-
-
3142765528
-
IT Acceptance: Managing User - IT Group Boundaries
-
Gefen, D., and Ridings, C. M. 2003. “IT Acceptance: Managing User - IT Group Boundaries,” The DATA BASE for Advances in Information Systems (34:3), pp. 25-40.
-
(2003)
The DATA BASE for Advances in Information Systems
, vol.34
, Issue.3
, pp. 25-40
-
-
Gefen, D.1
Ridings, C.M.2
-
18
-
-
84942010198
-
Worldwide and Regional Public IT Cloud Services 2013-2017 Forecast
-
Accessed 03 May 2014
-
Gens, F., Adam, M., Bradshaw, D., Christiansen, C. A., DuBois, L., Florean, A., Hochmuth, P., V., K., Mahowald, R. P., Matsumoto, S., Morris, C., Olvet, T., Quinn, K., Turner, M. J., Villars, R. L., and Posey, M. 2013. “Worldwide and Regional Public IT Cloud Services 2013-2017 Forecast,” IDC, http://www.idc.com/getdoc.jsp?containerId=242464; Accessed 03 May 2014
-
(2013)
IDC
-
-
Gens, F.1
Adam, M.2
Bradshaw, D.3
Christiansen, C.A.4
DuBois, L.5
Florean, A.6
Hochmuth, P.V.K.7
Mahowald, R.P.8
Matsumoto, S.9
Morris, C.10
Olvet, T.11
Quinn, K.12
Turner, M.J.13
Villars, R.L.14
Posey, M.15
-
19
-
-
0000326264
-
Toward a Conceptual Framework for Mixed-Method Evaluation Designs
-
Greene, J. C., Caracelli, V. J., and Graham, W. F. 1989. “Toward a Conceptual Framework for Mixed-Method Evaluation Designs,” Educational Evaluation and Policy Analysis (11:3), pp. 255-274.
-
(1989)
Educational Evaluation and Policy Analysis
, vol.11
, Issue.3
, pp. 255-274
-
-
Greene, J.C.1
Caracelli, V.J.2
Graham, W.F.3
-
20
-
-
81255163048
-
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
-
Guo, K. H., Yuan, Y., Archer, N. P., and Connelly, C. E. 2011. “Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model,” Journal of Management Information Systems (28:2), pp. 203-236.
-
(2011)
Journal of Management Information Systems
, vol.28
, Issue.2
, pp. 203-236
-
-
Guo, K.H.1
Yuan, Y.2
Archer, N.P.3
Connelly, C.E.4
-
21
-
-
84905750450
-
Exploring the Shadows: IT Governance Approaches to User-Driven Innovation
-
Barcelona
-
Györy, A., Cleven, A., Uebernickel, F., and Brenner, W. 2012. “Exploring the Shadows: IT Governance Approaches to User-Driven Innovation,” in Proceedings of the 20th European Conference on Information Systems, (Vol. 6312) Barcelona.
-
(2012)
Proceedings of the 20th European Conference on Information Systems
, vol.6312
-
-
Györy, A.1
Cleven, A.2
Uebernickel, F.3
Brenner, W.4
-
22
-
-
84928616214
-
Organizational cloud service adoption: a scientometric and content-based literature analysis
-
Haag, S., and Eckhardt, A. 2014. “Organizational cloud service adoption: a scientometric and content-based literature analysis,” Journal of Business Economics (84:3), pp. 407-440.
-
(2014)
Journal of Business Economics
, vol.84
, Issue.3
, pp. 407-440
-
-
Haag, S.1
Eckhardt, A.2
-
23
-
-
84902256176
-
From the Ground to the Cloud - A Structured Literature Analysis of the Cloud Service Landscape around the Public and Private Sector
-
Big Island, Hawaii
-
Haag, S., Eckhardt, A., and Krönung, J. 2014. “From the Ground to the Cloud - A Structured Literature Analysis of the Cloud Service Landscape around the Public and Private Sector,” in Proceedings of the 47th Hawaii International Conference on System Sciences, Big Island, Hawaii.
-
(2014)
Proceedings of the 47th Hawaii International Conference on System Sciences
-
-
Haag, S.1
Eckhardt, A.2
Krönung, J.3
-
24
-
-
84870388697
-
-
Thousand Oaks, USA: SAGE Publications, Inc.
-
Hair, J. F. J., Hult, G. T. M., Ringle, C. M., and Sarstedt, M. 2013. A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), Thousand Oaks, USA: SAGE Publications, Inc., p. 308.
-
(2013)
A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)
, pp. 308
-
-
Hair, J.F.J.1
Hult, G.T.M.2
Ringle, C.M.3
Sarstedt, M.4
-
25
-
-
0000917858
-
The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions
-
Harrington, S. J. 1996. “The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions,” MIS Quarterly (20:3), pp. 257-278.
-
(1996)
MIS Quarterly
, vol.20
, Issue.3
, pp. 257-278
-
-
Harrington, S.J.1
-
26
-
-
67650152666
-
Protection motivation and deterrence: a framework for security policy compliance in organisations
-
Herath, T., and Rao, H. R. 2009a. “Protection motivation and deterrence: a framework for security policy compliance in organisations,” European Journal of Information Systems (18:2), pp. 106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
27
-
-
67349144062
-
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
-
Herath, T., and Rao, H. R. 2009b. “Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness,” Decision Support Systems (47:2), pp. 154-165.
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 154-165
-
-
Herath, T.1
Rao, H.R.2
-
30
-
-
84859105508
-
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea
-
Hovav, A., and D'Arcy, J. 2012. “Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea,” Information & Management (49:2), pp. 99-110.
-
(2012)
Information & Management
, vol.49
, Issue.2
, pp. 99-110
-
-
Hovav, A.1
D'Arcy, J.2
-
31
-
-
84863542038
-
Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture
-
Hu, Q., Dinev, T., Hart, P., and Cooke, D. 2012. “Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture,” Decision Sciences (43:4), pp. 615-660.
-
(2012)
Decision Sciences
, vol.43
, Issue.4
, pp. 615-660
-
-
Hu, Q.1
Dinev, T.2
Hart, P.3
Cooke, D.4
-
32
-
-
79959944364
-
Does deterrence work in reducing information security policy abuse by employees?
-
Hu, Q., Xu, Z., Dinev, T., and Ling, H. 2011. “Does deterrence work in reducing information security policy abuse by employees?,” Communications of the ACM (54:6), pp. 54-60.
-
(2011)
Communications of the ACM
, vol.54
, Issue.6
, pp. 54-60
-
-
Hu, Q.1
Xu, Z.2
Dinev, T.3
Ling, H.4
-
33
-
-
84856018908
-
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
-
Ifinedo, P. 2012. “Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory,” Computers & Security (31:1), pp. 83-95.
-
(2012)
Computers & Security
, vol.31
, Issue.1
, pp. 83-95
-
-
Ifinedo, P.1
-
34
-
-
34249670742
-
An empirical investigation into the utilization-based information technology success model: integrating task-performance and social influence perspective
-
Kim, C., Jahng, J., and Lee, J. 2006. “An empirical investigation into the utilization-based information technology success model: integrating task-performance and social influence perspective,” Journal of Information Technology (22:2), pp. 152-160.
-
(2006)
Journal of Information Technology
, vol.22
, Issue.2
, pp. 152-160
-
-
Kim, C.1
Jahng, J.2
Lee, J.3
-
35
-
-
84870064352
-
-
Laredo, TX: ScriptWarp Systems. Accessed 15 Dec 2013
-
Kock, N. 2012. “WarpPLS 3.0 User Manual,” Laredo, TX: ScriptWarp Systems. http://www.scriptwarp.com/warppls/. Accessed 15 Dec 2013
-
(2012)
WarpPLS 3.0 User Manual
-
-
Kock, N.1
-
36
-
-
84943709252
-
Use of Ranks in One-Criterion Variance Analysis
-
Kruskal, W. H., and Wallis, W. A. 1952. “Use of Ranks in One-Criterion Variance Analysis,” Journal of the American Statistical Association (47:260), pp. 583-621.
-
(1952)
Journal of the American Statistical Association
, vol.47
, Issue.260
, pp. 583-621
-
-
Kruskal, W.H.1
Wallis, W.A.2
-
37
-
-
26444498526
-
Normative Controls and Self‐Reported Counterproductive Behaviors in the Workplace in China
-
Kwok, C.-K., Au, W. T., and Ho, J. M. C. 2005. “Normative Controls and Self‐Reported Counterproductive Behaviors in the Workplace in China,” Applied Psychology: An International Review (54:4), pp. 456-475.
-
(2005)
Applied Psychology: An International Review
, vol.54
, Issue.4
, pp. 456-475
-
-
Kwok, C.-K.1
Au, W.T.2
Ho, J.M.C.3
-
38
-
-
84897786107
-
Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption
-
Milan
-
Lee, J., Crossler, R. E., and Warkentin, M. 2013. “Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption,” in Proceedings of the 34th International Conference on Information Systems, (Vol. 2) Milan.
-
(2013)
Proceedings of the 34th International Conference on Information Systems
, vol.2
-
-
Lee, J.1
Crossler, R.E.2
Warkentin, M.3
-
39
-
-
2342489402
-
An integrative model of computer abuse based on social control and general deterrence theories
-
Lee, S. M., Lee, S.-G., and Yoo, S. 2004. “An integrative model of computer abuse based on social control and general deterrence theories,” Information & Management (41:6), pp. 707-718.
-
(2004)
Information & Management
, vol.41
, Issue.6
, pp. 707-718
-
-
Lee, S.M.1
Lee, S.-G.2
Yoo, S.3
-
40
-
-
0000133760
-
Threats to Information Systems: Today' s Reality, Yesterday' s Understanding
-
Loch, K. D., Carr, H. H., and Warkentin, M. 1992. “Threats to Information Systems: Today' s Reality, Yesterday' s Understanding,” MIS Quarterly (16:2), pp. 173-186.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.3
-
41
-
-
84973830765
-
Some benefits of integrating qualitative and quantitative methods in program evaluation, with illustrations
-
Madey, D. 1982. “Some benefits of integrating qualitative and quantitative methods in program evaluation, with illustrations,” Educational Evaluation and Policy Analysis (4:2), pp. 223-236.
-
(1982)
Educational Evaluation and Policy Analysis
, vol.4
, Issue.2
, pp. 223-236
-
-
Madey, D.1
-
42
-
-
13244298307
-
Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model
-
Malhotra, N. K., Kim, S. S., and Agarwal, J. 2004. “Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model,” Information Systems Research (15:4), pp. 336-355.
-
(2004)
Information Systems Research
, vol.15
, Issue.4
, pp. 336-355
-
-
Malhotra, N.K.1
Kim, S.S.2
Agarwal, J.3
-
43
-
-
79951515545
-
Cloud computing - The business perspective
-
Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., and Ghalsasi, A. 2011. “Cloud computing - The business perspective,” Decision Support Systems (51:1), pp. 176-189.
-
(2011)
Decision Support Systems
, vol.51
, Issue.1
, pp. 176-189
-
-
Marston, S.1
Li, Z.2
Bandyopadhyay, S.3
Zhang, J.4
Ghalsasi, A.5
-
44
-
-
85135922418
-
IT's new concern: the personal cloud
-
Accessed 25 April 2014
-
Mitchell, R. L. 2013. “IT's new concern: the personal cloud,” Computerworld, http://www.computerworld.com/s/article/9239348/IT_s_new_concern_The_personal_cloud?taxonomyId=220&pageNumber=1. Accessed 25 April 2014
-
(2013)
Computerworld
-
-
Mitchell, R.L.1
-
45
-
-
33846313618
-
The qualitative interview in IS research: Examining the craft
-
Myers, M. D., and Newman, M. 2007. “The qualitative interview in IS research: Examining the craft,” Information and Organization (17:1), pp. 2-26.
-
(2007)
Information and Organization
, vol.17
, Issue.1
, pp. 2-26
-
-
Myers, M.D.1
Newman, M.2
-
46
-
-
67650143327
-
What levels of moral reasoning and values explain adherence to information security rules? An empirical study
-
Nature Publishing Group
-
Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., and Vance, A. 2009. “What levels of moral reasoning and values explain adherence to information security rules? An empirical study,” European Journal of Information Systems (18:2)Nature Publishing Group, pp. 126-139.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 126-139
-
-
Myyry, L.1
Siponen, M.2
Pahnila, S.3
Vartiainen, T.4
Vance, A.5
-
49
-
-
84897799249
-
Individualization of Information Systems - Analyzing Antecedents of IT Consumerization Behavior
-
Milan
-
Ortbach, K., Koeffer, S., Bode, M., and Niehaves, B. 2013. “Individualization of Information Systems - Analyzing Antecedents of IT Consumerization Behavior,” in Proceedings of the 34th International Conference on Information Systems, Milan.
-
(2013)
Proceedings of the 34th International Conference on Information Systems
-
-
Ortbach, K.1
Koeffer, S.2
Bode, M.3
Niehaves, B.4
-
50
-
-
67649951505
-
Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model
-
Pavlou, P. A. 2003. “Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model.,” International Journal of Electronic Commerce (7), pp. 101-134.
-
(2003)
International Journal of Electronic Commerce
, vol.7
, pp. 101-134
-
-
Pavlou, P.A.1
-
51
-
-
2442676514
-
Building Effective Online Marketplaces with Institution-Based Trust
-
Pavlou, P. A., and Gefen, D. 2004. “Building Effective Online Marketplaces with Institution-Based Trust,” Information Systems Research (15:1), pp. 37-59.
-
(2004)
Information Systems Research
, vol.15
, Issue.1
, pp. 37-59
-
-
Pavlou, P.A.1
Gefen, D.2
-
52
-
-
80051795854
-
Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes
-
Posey, C., Bennett, R. J., and Roberts, T. L. 2011. “Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes,” Computers & Security (30:6-7), pp. 486-497.
-
(2011)
Computers & Security
, vol.30
, Issue.6-7
, pp. 486-497
-
-
Posey, C.1
Bennett, R.J.2
Roberts, T.L.3
-
53
-
-
0017980080
-
A Social Information Processing Approach to Job Attitudes and Task Design
-
June)
-
Salancik, G. R., and Pfeffer, J. 1978. “A Social Information Processing Approach to Job Attitudes and Task Design,” Administrative Science Quarterly (23:June), pp. 224-253.
-
(1978)
Administrative Science Quarterly
, vol.23
, pp. 224-253
-
-
Salancik, G.R.1
Pfeffer, J.2
-
54
-
-
84905833699
-
The blurring boundaries of work-related and personal media use: A grounded theory study on the employee's perspective
-
Utrecht
-
Schalow, P. S. R., Winkler, T. J., Repschlaeger, J., and Zarnekow, R. 2013. “The blurring boundaries of work-related and personal media use: A grounded theory study on the employee's perspective,” in Proceedings of the 21st European Conference on Information Systems, (Vol. 2) Utrecht.
-
(2013)
Proceedings of the 21st European Conference on Information Systems
, vol.2
-
-
Schalow, P.S.R.1
Winkler, T.J.2
Repschlaeger, J.3
Zarnekow, R.4
-
55
-
-
0033201389
-
Augmenting the Theory of Planned Behavior: Roles for Anticipated Regret and Descriptive Norms
-
Sheeran, P., and Orbell, S. 1999. “Augmenting the Theory of Planned Behavior: Roles for Anticipated Regret and Descriptive Norms,” Journal of Applied Social Psychology (29:10), pp. 2107-2142.
-
(1999)
Journal of Applied Social Psychology
, vol.29
, Issue.10
, pp. 2107-2142
-
-
Sheeran, P.1
Orbell, S.2
-
57
-
-
84970352082
-
The Integration of Fieldwork and Survey Methods
-
Sieber, S. D. 1973. “The Integration of Fieldwork and Survey Methods,” American Journal of Sociology (78:6), pp. 1335-1359.
-
(1973)
American Journal of Sociology
, vol.78
, Issue.6
, pp. 1335-1359
-
-
Sieber, S.D.1
-
58
-
-
77957068563
-
Neutralization: New Insights into the Problem of Employee Information Systems Security
-
Siponen, M., and Vance, A. 2010. “Neutralization: New Insights into the Problem of Employee Information Systems Security,” MIS Quarterly (34:3), pp. 487-502.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 487-502
-
-
Siponen, M.1
Vance, A.2
-
59
-
-
84923418074
-
The Hidden Truth Behind Shadow IT Six trends impacting your security posture
-
Mountain View, CA
-
Stadtmueller, L. 2013. “The Hidden Truth Behind Shadow IT Six trends impacting your security posture,” Stratecast and Frost & Sullivan; 50 Years of Growth, Innovation and Leadership, Mountain View, CA, pp. 1-13.
-
(2013)
Stratecast and Frost & Sullivan; 50 Years of Growth, Innovation and Leadership
, pp. 1-13
-
-
Stadtmueller, L.1
-
60
-
-
0002699431
-
Discovering and Disciplining Computer Abuse in Organizations: A Field Study
-
Straub, D. W. J., and Nance, W. D. 1990. “Discovering and Disciplining Computer Abuse in Organizations: A Field Study,” MIS Quarterly (14:1), pp. 45-60.
-
(1990)
MIS Quarterly
, vol.14
, Issue.1
, pp. 45-60
-
-
Straub, D.W.J.1
Nance, W.D.2
-
61
-
-
0001133137
-
Coping With Systems Risk: Security Planning Models for Management Decision Making
-
Straub, D. W., and Welke, R. J. 1998. “Coping With Systems Risk: Security Planning Models for Management Decision Making,” MIS Quarterly (22:4), pp. 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
63
-
-
84936094829
-
The Organizational Bases of Ethical Work Climates
-
Victor, B., Cullen, J. B., Quarterly, A. S., and Global, I. 1988. “The Organizational Bases of Ethical Work Climates,” Administrative Science Quarterly (33:1), pp. 101-125.
-
(1988)
Administrative Science Quarterly
, vol.33
, Issue.1
, pp. 101-125
-
-
Victor, B.1
Cullen, J.B.2
Quarterly, A.S.3
Global, I.4
-
64
-
-
10444236138
-
Encouraging citizen adoption of e-government by building trust
-
Warkentin, M., Gefen, D., Pavlou, P. A., and Rose, G. M. 2002. “Encouraging citizen adoption of e-government by building trust,” Electronic Markets (12:3), pp. 157-162.
-
(2002)
Electronic Markets
, vol.12
, Issue.3
, pp. 157-162
-
-
Warkentin, M.1
Gefen, D.2
Pavlou, P.A.3
Rose, G.M.4
-
65
-
-
79955622246
-
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention
-
Warkentin, M., Johnston, A. C., and Shropshire, J. 2011. “The influence of the informal social learning environment on information privacy policy compliance efficacy and intention,” European Journal of Information Systems (20:3), pp. 267-284.
-
(2011)
European Journal of Information Systems
, vol.20
, Issue.3
, pp. 267-284
-
-
Warkentin, M.1
Johnston, A.C.2
Shropshire, J.3
-
66
-
-
1242265154
-
In defense of the realm: Understanding the threats to information security
-
Whitman, M. E. 2004. “In defense of the realm: Understanding the threats to information security,” International Journal of Information Management (24:1), pp. 43-57.
-
(2004)
International Journal of Information Management
, vol.24
, Issue.1
, pp. 43-57
-
-
Whitman, M.E.1
-
67
-
-
84873974226
-
Beyond Deterrence: An Expanded View of Employee Computer Abuse
-
Willison, R., and Warkentin, M. 2013. “Beyond Deterrence: An Expanded View of Employee Computer Abuse,” MIS Quarterly (37:1), pp. 1-20.
-
(2013)
MIS Quarterly
, vol.37
, Issue.1
, pp. 1-20
-
-
Willison, R.1
Warkentin, M.2
-
68
-
-
27544443011
-
Predicting the usage of P2P sharing software: The role of trust and perceived risk
-
Hawaii, Big Island
-
Xu, H., Wang, H., and Teo, H.-H. 2005. “Predicting the usage of P2P sharing software: The role of trust and perceived risk,” in Proceedings of the 38th Annual Hawaii International Conference on System Sciences, Hawaii, Big Island.
-
(2005)
Proceedings of the 38th Annual Hawaii International Conference on System Sciences
-
-
Xu, H.1
Wang, H.2
Teo, H.-H.3
|