-
2
-
-
78650385795
-
A comprehensive review and synthesis of open source research
-
Aksulu, A., & Wade, M. (2010). A comprehensive review and synthesis of open source research. Journal of the Association for Information Systems, 11(11), 576-656.
-
(2010)
Journal of the Association for Information Systems
, vol.11
, Issue.11
, pp. 576-656
-
-
Aksulu, A.1
Wade, M.2
-
3
-
-
77953969323
-
Actor-network theory, organizations and critique: Towards a politics of organizing
-
Alcadipani, R., & Hassard, J. (2010). Actor-network theory, organizations and critique: Towards a politics of organizing. Organization, 17(4), 419-435.
-
(2010)
Organization
, vol.17
, Issue.4
, pp. 419-435
-
-
Alcadipani, R.1
Hassard, J.2
-
4
-
-
79952786467
-
Generating research questions through problematization
-
Alvesson, M., & Sandberg, J. (2011). Generating research questions through problematization. Academy of Management Review, 36(2), 247-271.
-
(2011)
Academy of Management Review
, vol.36
, Issue.2
, pp. 247-271
-
-
Alvesson, M.1
Sandberg, J.2
-
5
-
-
79958697053
-
Measurement and meaning in information systems and organizational research: Methodological and philosophical foundations
-
Bagozzi, R. P. (2011). Measurement and meaning in information systems and organizational research: Methodological and philosophical foundations. MIS Quarterly, 35(2), 261-292.
-
(2011)
MIS Quarterly
, vol.35
, Issue.2
, pp. 261-292
-
-
Bagozzi, R.P.1
-
6
-
-
0018083950
-
Compliance, adherence and the therapeutic alliance: Steps in the development of selfcare
-
Barofsky, I. (1978). Compliance, adherence and the therapeutic alliance: Steps in the development of selfcare. Social Science and Medicine, 12(5), 369-376.
-
(1978)
Social Science and Medicine
, vol.12
, Issue.5
, pp. 369-376
-
-
Barofsky, I.1
-
7
-
-
81355150547
-
Privacy in the digital age: A review of information privacy research in information systems
-
Belanger, F., & Crossler, R. E. (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, 35(4), 1017-1041.
-
(2011)
MIS Quarterly
, vol.35
, Issue.4
, pp. 1017-1041
-
-
Belanger, F.1
Crossler, R.E.2
-
8
-
-
33751507430
-
Collaborative information synthesis II: Recommendations for information systems to support synthesis activities
-
Blake, C., & Pratt, W. (2006). Collaborative information synthesis II: Recommendations for information systems to support synthesis activities. Journal of the American Society for Information Science and Technology, 57(14), 1888-1895.
-
(2006)
Journal of the American Society for Information Science and Technology
, vol.57
, Issue.14
, pp. 1888-1895
-
-
Blake, C.1
Pratt, W.2
-
9
-
-
84893068754
-
A hermeneutic approach to conducting literature reviews and literature searches
-
Boell, S. K., & Cecez-Kecmanovic, D. (2014). A hermeneutic approach to conducting literature reviews and literature searches. Communications of AIS, 34(1), 257-286.
-
(2014)
Communications of AIS
, vol.34
, Issue.1
, pp. 257-286
-
-
Boell, S.K.1
Cecez-Kecmanovic, D.2
-
10
-
-
67650100804
-
If someone is watching, I'll do what I'm asked: Manditoriness, control, and information security
-
Boss, S. R., Kirsch, L. J., Angermeier, I., Shingler, R. A., & Boss, W. R. (2009). If someone is watching, I'll do what I'm asked: Manditoriness, control, and information security. European Journal of Information Systems, 18, 151-164.
-
(2009)
European Journal of Information Systems
, vol.18
, pp. 151-164
-
-
Boss, S.R.1
Kirsch, L.J.2
Angermeier, I.3
Shingler, R.A.4
Boss, W.R.5
-
11
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523-527.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-527
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
12
-
-
0012589538
-
Doing critical IS research: The question of methodology
-
In E. M. Trauth (Ed.), Hershey, PA: Idea Group Publishing
-
Cecez-Kecmanovic, D. (2001). Doing critical IS research: The question of methodology. In E. M. Trauth (Ed.), Qualitative research in IS: Issues and trends. Hershey, PA: Idea Group Publishing.
-
(2001)
Qualitative Research in IS: Issues and Trends
-
-
Cecez-Kecmanovic, D.1
-
13
-
-
84877935501
-
Organizations’ information security policy compliance: Stick or carrot approach?
-
Chen, Y., Ramamurthy, K. R., & Wen, K.-W. (2012). Organizations’ information security policy compliance: Stick or carrot approach? Journal of Management Information Systems, 29(3), 157-188.
-
(2012)
Journal of Management Information Systems
, vol.29
, Issue.3
, pp. 157-188
-
-
Chen, Y.1
Ramamurthy, K.R.2
Wen, K.-W.3
-
14
-
-
84875523871
-
Assessing researcher publication productivity in the leading information systems journals: A 2005-2009 update
-
Clark, J. G., Au, Y. A., Walz, D. B., & Warren, J. (2011). Assessing researcher publication productivity in the leading information systems journals: A 2005-2009 update. Communications of the Association for Information Systems, 29, 459-504.
-
(2011)
Communications of the Association for Information Systems
, vol.29
, pp. 459-504
-
-
Clark, J.G.1
Au, Y.A.2
Walz, D.B.3
Warren, J.4
-
16
-
-
34247732721
-
Grounded theory method: Procedures, canons, and evaluative criteria
-
Corbin, J., & Strauss, A. (1990). Grounded theory method: Procedures, canons, and evaluative criteria. Qualitative Sociology, 13, 3-21.
-
(1990)
Qualitative Sociology
, vol.13
, pp. 3-21
-
-
Corbin, J.1
Strauss, A.2
-
17
-
-
84876570327
-
Future directions for behavioral information security research
-
Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. Computers & Security, 32, 90-101.
-
(2013)
Computers & Security
, vol.32
, pp. 90-101
-
-
Crossler, R.E.1
Johnston, A.C.2
Lowry, P.B.3
Hu, Q.4
Warkentin, M.5
Baskerville, R.6
-
18
-
-
60249094410
-
A critical analysis of media discourse on information technology: Preliminary results of a proposed method for critical discourse analysis
-
Cukier, W., Ngwenyama, O., Bauer, R., & Middleton, C. (2009). A critical analysis of media discourse on information technology: Preliminary results of a proposed method for critical discourse analysis. Information Systems Journal, 19(2), 175-196.
-
(2009)
Information Systems Journal
, vol.19
, Issue.2
, pp. 175-196
-
-
Cukier, W.1
Ngwenyama, O.2
Bauer, R.3
Middleton, C.4
-
19
-
-
67649551429
-
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
-
D'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79-98.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 79-98
-
-
D'arcy, J.1
Hovav, A.2
Galletta, D.3
-
21
-
-
0033220501
-
A meta-analytic review of experiments examining the effects of extrinsic rewards on intrinsic motivation
-
Deci, E. L., Koestner, R., & Ryan, R. M. (1999). A meta-analytic review of experiments examining the effects of extrinsic rewards on intrinsic motivation. Psychological Bulletin, 125(6), 627-668.
-
(1999)
Psychological Bulletin
, vol.125
, Issue.6
, pp. 627-668
-
-
Deci, E.L.1
Koestner, R.2
Ryan, R.M.3
-
22
-
-
72249114849
-
Information systems success: The quest for the dependent variable
-
DeLone, W. H., & McLean, E. R. (1992). Information systems success: The quest for the dependent variable. Information Systems Research, 3(1), 60-95.
-
(1992)
Information Systems Research
, vol.3
, Issue.1
, pp. 60-95
-
-
Delone, W.H.1
McLean, E.R.2
-
23
-
-
10044273544
-
The discipline and practice of qualitative research
-
In N. K. Denzin, & Y. S. Lincoln (Eds.), Thousand Oaks, CA: Sage
-
Denzin, N. K., & Lincoln, Y. S. (2005). The discipline and practice of qualitative research. In N. K. Denzin, & Y. S. Lincoln (Eds.), The Sage handbook of qualitative research (pp. 1-33). Thousand Oaks, CA: Sage
-
(2005)
The Sage Handbook of Qualitative Research
, pp. 1-33
-
-
Denzin, N.K.1
Lincoln, Y.S.2
-
24
-
-
23044525969
-
Current directions in IS security research: Towards socioorganizational perspectives
-
Dhillon, G., & Backhouse, J. (2001). Current directions in IS security research: Towards socioorganizational perspectives. Information Systems Journal, 11(2), 127-153.
-
(2001)
Information Systems Journal
, vol.11
, Issue.2
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
25
-
-
67650318762
-
User behaviour towards protective information technologies: The role of national cultural differences
-
Dinev, T., Goo, J., Hu, Q., & Nam, K. (2009). User behaviour towards protective information technologies: The role of national cultural differences. Information Systems Journal, 19(4), 391-412.
-
(2009)
Information Systems Journal
, vol.19
, Issue.4
, pp. 391-412
-
-
Dinev, T.1
Goo, J.2
Hu, Q.3
Nam, K.4
-
26
-
-
49049114397
-
The centrality of awareness in the formation of user behavioral intention toward protective information technologies
-
Dinev, T., & Hu, Q. (2007). The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems, 8(7), 386-408.
-
(2007)
Journal of the Association for Information Systems
, vol.8
, Issue.7
, pp. 386-408
-
-
Dinev, T.1
Hu, Q.2
-
27
-
-
0020021336
-
Compliance: An interactionist approach
-
Dracup, A., & Meleis, A. (1982). Compliance: An interactionist approach. Nursing Research, 31(1), 31-36.
-
(1982)
Nursing Research
, vol.31
, Issue.1
, pp. 31-36
-
-
Dracup, A.1
Meleis, A.2
-
28
-
-
0037244449
-
Managing empowerment and control in an intranet environment
-
Duane, A., & Finnegan, P. (2003). Managing empowerment and control in an intranet environment. Information Systems Journal, 13, 133-158.
-
(2003)
Information Systems Journal
, vol.13
, pp. 133-158
-
-
Duane, A.1
Finnegan, P.2
-
29
-
-
84952320536
-
Critical discourse analysis
-
In T. A. van Dijk (Ed.), London: SAGE Publications
-
Fairclough, N., Mulderrig, J., & Wodak, R. (1997). Critical discourse analysis. In T. A. van Dijk (Ed.), Discourse studies: A multidisciplinary introduction (pp. 357-378). London: SAGE Publications.
-
(1997)
Discourse Studies: A Multidisciplinary Introduction
, pp. 357-378
-
-
Fairclough, N.1
Mulderrig, J.2
Wodak, R.3
-
34
-
-
0004021557
-
-
Beverly Hills, CA: Sage
-
Glass, G. V., McGaw, B., & Smith, M. L. (1981). Meta-analysis in social research. Beverly Hills, CA: Sage.
-
(1981)
Meta-Analysis in Social Research
-
-
Glass, G.V.1
McGaw, B.2
Smith, M.L.3
-
35
-
-
84876665025
-
Security-related behavior in using information systems in the workplace: A review and synthesis
-
Guo, K. H. (2013). Security-related behavior in using information systems in the workplace: A review and synthesis. Computers & Security, 32, 242-251.
-
(2013)
Computers & Security
, vol.32
, pp. 242-251
-
-
Guo, K.H.1
-
36
-
-
81255163048
-
Understanding nonmalicious security violations in the workplace: A composite behavior model
-
Guo, K. H., Yuan, Y., Archer, N. P., & Connelly, C. E. (2011). Understanding nonmalicious security violations in the workplace: A composite behavior model. Journal of Management Information Systems, 28(2), 203-236.
-
(2011)
Journal of Management Information Systems
, vol.28
, Issue.2
, pp. 203-236
-
-
Guo, K.H.1
Yuan, Y.2
Archer, N.P.3
Connelly, C.E.4
-
38
-
-
33750613422
-
Political communication in media society: Does democracy still enjoy an epistemic dimension? The impact of normative theory on empirical research
-
Habermas, J. (2006). Political communication in media society: Does democracy still enjoy an epistemic dimension? The impact of normative theory on empirical research. Communication Theory, 16(4), 411-426.
-
(2006)
Communication Theory
, vol.16
, Issue.4
, pp. 411-426
-
-
Habermas, J.1
-
39
-
-
33846126313
-
-
2nd ed.). London: Routledge
-
Hawkes, D. (2003). Ideology (2nd ed.). London: Routledge.
-
(2003)
Ideology
-
-
Hawkes, D.1
-
40
-
-
84889663520
-
Security services as coping mechanisms: An investigation into user intention to adopt an email authentication service
-
Herath, T., Chen, R., Wang, J., Banjara, K., Wilbur, J., & Rao, H. R. (2012). Security services as coping mechanisms: An investigation into user intention to adopt an email authentication service. Information Systems Journal, 24(1), 61-48.
-
(2012)
Information Systems Journal
, vol.24
, Issue.1
, pp. 61-68
-
-
Herath, T.1
Chen, R.2
Wang, J.3
Banjara, K.4
Wilbur, J.5
Rao, H.R.6
-
41
-
-
67349144062
-
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
-
Herath, T., & Rao, H. R. (2009a). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154-165.
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 154-165
-
-
Herath, T.1
Rao, H.R.2
-
42
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
Herath, T., & Rao, H. R. (2009b). Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18, 106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
44
-
-
84859105508
-
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. And South Korea
-
Hovav, A., & D'Arcy, J. (2012). Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. And South Korea. Information & Management, 49(2), 99-110.
-
(2012)
Information & Management
, vol.49
, Issue.2
, pp. 99-110
-
-
Hovav, A.1
D'arcy, J.2
-
46
-
-
1442303699
-
Disciplining information systems: Truth and its regimes
-
Introna, L. D. (2003). Disciplining information systems: Truth and its regimes. European Journal of Information Systems, 12(3), 235-240.
-
(2003)
European Journal of Information Systems
, vol.12
, Issue.3
, pp. 235-240
-
-
Introna, L.D.1
-
47
-
-
1242318217
-
Power and information technology research: A metatriangulation review
-
Jasperson, J., Butler, B. S., Carte, T. A., Croes, H. J. P., Saunders, C. S., & Zheng, W. (2002). Power and information technology research: A metatriangulation review. MIS Quarterly, 26(4), 397-459.
-
(2002)
MIS Quarterly
, vol.26
, Issue.4
, pp. 397-459
-
-
Jasperson, J.1
Butler, B.S.2
Carte, T.A.3
Croes, H.4
Saunders, C.S.5
Zheng, W.6
-
48
-
-
77957057727
-
Fear appeals and information security behaviors: An empirical study
-
Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3), 549-566.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 549-566
-
-
Johnston, A.C.1
Warkentin, M.2
-
49
-
-
34548383363
-
Turnover of information technology professionals: A narrative review, meta-analytic structural equation modeling, and model development
-
Joseph, D., Ng, K.-Y., Koh, C., & Ang, S. (2007). Turnover of information technology professionals: A narrative review, meta-analytic structural equation modeling, and model development. MIS Quarterly, 31(3), 547-577.
-
(2007)
MIS Quarterly
, vol.31
, Issue.3
, pp. 547-577
-
-
Joseph, D.1
Ng, K.-Y.2
Koh, C.3
Ang, S.4
-
50
-
-
18844431067
-
Information systems security policies: A contextual perspective
-
Karyda, M., Kiountouzis, E., & Kokolakis, S. (2005). Information systems security policies: A contextual perspective. Computers & Security, 24(3), 246-260.
-
(2005)
Computers & Security
, vol.24
, Issue.3
, pp. 246-260
-
-
Karyda, M.1
Kiountouzis, E.2
Kokolakis, S.3
-
51
-
-
0003437064
-
Critique and power: Recasting the Foucault
-
(Ed.), Cambridge, MA: MIT Press
-
Kelly, M. (Ed.). (1994). Critique and power: Recasting the Foucault. Habermas debate. Cambridge, MA: MIT Press.
-
(1994)
Habermas Debate
-
-
Kelly, M.1
-
52
-
-
61349195732
-
Clarifying the Foucault-Habermas debate: Morality, ethics, and “normative foundations”
-
King, M. (2009). Clarifying the Foucault-Habermas debate: Morality, ethics, and “normative foundations”. Philosophy & Social Criticism, 35(3), 287-314.
-
(2009)
Philosophy & Social Criticism
, vol.35
, Issue.3
, pp. 287-314
-
-
King, M.1
-
53
-
-
33747865449
-
Understanding the role and methods of meta-analysis in IS research
-
King, W. R., & He, J. (2005). Understanding the role and methods of meta-analysis in IS research. Communications of the AIS, 16, 665-686
-
(2005)
Communications of the AIS
, vol.16
, pp. 665-686
-
-
King, W.R.1
He, J.2
-
54
-
-
0001946339
-
A set of principles for conducting and evaluating interpretive field studies in information systems
-
Klein, H. K., & Myers, M. D. (1999). A set of principles for conducting and evaluating interpretive field studies in information systems. MIS Quarterly, 23(1), 67-94.
-
(1999)
MIS Quarterly
, vol.23
, Issue.1
, pp. 67-94
-
-
Klein, H.K.1
Myers, M.D.2
-
55
-
-
84965719345
-
Corporate strategy, organizations, and subjectivity: A critique
-
Knights, D., & Morgan, G. (1991). Corporate strategy, organizations, and subjectivity: A critique. Organization Studies, 12(2), 251-273.
-
(1991)
Organization Studies
, vol.12
, Issue.2
, pp. 251-273
-
-
Knights, D.1
Morgan, G.2
-
56
-
-
85027950618
-
Organizational power and information security rule compliance
-
Kolkowska, E., & Dhillon, G. (2013). Organizational power and information security rule compliance. Computers & Security, 33, 3-11.
-
(2013)
Computers & Security
, vol.33
, pp. 3-11
-
-
Kolkowska, E.1
Dhillon, G.2
-
58
-
-
47249153911
-
A multidimensional conceptualization of organizational corruption control
-
Lange, D. (2008). A multidimensional conceptualization of organizational corruption control. Academy of Management Review, 33(3), 710-729.
-
(2008)
Academy of Management Review
, vol.33
, Issue.3
, pp. 710-729
-
-
Lange, D.1
-
59
-
-
33846010136
-
A review of culture in information systems research: Toward a theory of information technology culture conflict
-
Leidner, D., & Kayworth, T. (2006). A review of culture in information systems research: Toward a theory of information technology culture conflict. MIS Quarterly, 30(2), 357-399.
-
(2006)
MIS Quarterly
, vol.30
, Issue.2
, pp. 357-399
-
-
Leidner, D.1
Kayworth, T.2
-
60
-
-
75349090403
-
Understanding compliance with internet use policy from the perspective of rational choice theory
-
Li, H., Zhang, J., & Sarathy, R. (2010). Understanding compliance with internet use policy from the perspective of rational choice theory. Decision Support Systems, 48(4), 635-645.
-
(2010)
Decision Support Systems
, vol.48
, Issue.4
, pp. 635-645
-
-
Li, H.1
Zhang, J.2
Sarathy, R.3
-
61
-
-
84857365270
-
HIPAA privacy rule compliance: An interpretive study using Norman’s action theory
-
Liginlal, D., Sim, I., Khansa, L., & Fearn, P. (2012). HIPAA privacy rule compliance: An interpretive study using Norman’s action theory. Computers & Security, 31(2), 206-220.
-
(2012)
Computers & Security
, vol.31
, Issue.2
, pp. 206-220
-
-
Liginlal, D.1
Sim, I.2
Khansa, L.3
Fearn, P.4
-
62
-
-
84855531961
-
Paradigmatic controversies, contradictions, and emerging confluences, revisited
-
In N. K. Denzin & Y. S. Lincoln (Eds.), Thousand Oaks, CA: Sage
-
Lincoln, Y. S., Lynham, S. A., & Guba, E. G. (2011). Paradigmatic controversies, contradictions, and emerging confluences, revisited. In N. K. Denzin & Y. S. Lincoln (Eds.), The Sage handbook of qualitative research (pp. 97-128). Thousand Oaks, CA: Sage.
-
(2011)
The Sage Handbook of Qualitative Research
, pp. 97-128
-
-
Lincoln, Y.S.1
Lynham, S.A.2
Guba, E.G.3
-
63
-
-
84883188346
-
The drivers in the use of online whistle-blowing reporting systems
-
Lowry, P. B., Moody, G., Galletta, D., & Vance, A. (2012). The drivers in the use of online whistle-blowing reporting systems. Journal of Management Information Systems, 30(1), 153-189.
-
(2012)
Journal of Management Information Systems
, vol.30
, Issue.1
, pp. 153-189
-
-
Lowry, P.B.1
Moody, G.2
Galletta, D.3
Vance, A.4
-
64
-
-
80051733015
-
Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques
-
MacKenzie, S. B., Podsakoff, P. M., & Podsakoff, N. P. (2011). Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques. MIS Quarterly, 35(2), 293-334.
-
(2011)
MIS Quarterly
, vol.35
, Issue.2
, pp. 293-334
-
-
Mackenzie, S.B.1
Podsakoff, P.M.2
Podsakoff, N.P.3
-
65
-
-
33847691905
-
Editor's comments: Looking for a few good concepts and theories for the information systems field
-
Markus, M. L., & Saunders, C. (2007). Editor's comments: Looking for a few good concepts and theories for the information systems field. MIS Quarterly, 31(1), 3-4.
-
(2007)
MIS Quarterly
, vol.31
, Issue.1
, pp. 3-4
-
-
Markus, M.L.1
Saunders, C.2
-
67
-
-
79959546460
-
A set of principles for conducting critical research in information systems
-
Myers, M. D., & Klein, H. K. (2011). A set of principles for conducting critical research in information systems. MIS Quarterly, 35(1), 17-36.
-
(2011)
MIS Quarterly
, vol.35
, Issue.1
, pp. 17-36
-
-
Myers, M.D.1
Klein, H.K.2
-
68
-
-
67650143327
-
What levels of moral reasoning and values explain adherence to information security rules? An empirical study
-
Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., & Vance, A. (2009). What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems, 18(2), 126-139.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 126-139
-
-
Myyry, L.1
Siponen, M.2
Pahnila, S.3
Vartiainen, T.4
Vance, A.5
-
69
-
-
61349092288
-
Studying users' computer security behavior: A health belief perspective
-
Ng, B.-Y., Kankanhalli, A., & Xu, Y. C. (2009). Studying users' computer security behavior: A health belief perspective. Decision Support Systems, 46(4), 815-825.
-
(2009)
Decision Support Systems
, vol.46
, Issue.4
, pp. 815-825
-
-
Ng, B.-Y.1
Kankanhalli, A.2
Xu, Y.C.3
-
70
-
-
71549126429
-
Studying information technology in organizations: Research approaches and assumptions
-
Orlikowski, W. J., & Baroudi, J. J. (1991). Studying information technology in organizations: Research approaches and assumptions. Information Systems Research, 2(1), 1-28.
-
(1991)
Information Systems Research
, vol.2
, Issue.1
, pp. 1-28
-
-
Orlikowski, W.J.1
Baroudi, J.J.2
-
71
-
-
0035611374
-
Research commentary: Desperately seeking the "IT" in IT research--a Call to theorizing the IT artifact
-
Orlikowski, W. J., & Iacono, C. S. (2001). Research commentary: Desperately seeking the "IT" in IT research--a Call to theorizing the IT artifact. Information Systems Research, 12(2), 121-134.
-
(2001)
Information Systems Research
, vol.12
, Issue.2
, pp. 121-134
-
-
Orlikowski, W.J.1
Iacono, C.S.2
-
72
-
-
79960118806
-
The impact of norm-conforming behaviors on firm reputation
-
Philippe, D., & Durand, R. (2011). The impact of norm-conforming behaviors on firm reputation. Strategic Management Journal, 32(9), 969-993.
-
(2011)
Strategic Management Journal
, vol.32
, Issue.9
, pp. 969-993
-
-
Philippe, D.1
Durand, R.2
-
73
-
-
0141907688
-
Common method biases in behavioral research: A critical review of the literature and recommended remedies
-
Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879-903.
-
(2003)
Journal of Applied Psychology
, vol.88
, Issue.5
, pp. 879-903
-
-
Podsakoff, P.M.1
Mackenzie, S.B.2
Lee, J.Y.3
Podsakoff, N.P.4
-
74
-
-
84875487357
-
When computer monitoring backfires: Privacy invasions and organizational injustice as precursors to computer abuse
-
Posey, C., Bennett, R. J., Roberts, T. L., & Lowry, P. B. (2011). When computer monitoring backfires: Privacy invasions and organizational injustice as precursors to computer abuse. Journal of Information Systems Security, 7(1), 24-47.
-
(2011)
Journal of Information Systems Security
, vol.7
, Issue.1
, pp. 24-47
-
-
Posey, C.1
Bennett, R.J.2
Roberts, T.L.3
Lowry, P.B.4
-
75
-
-
84887697195
-
Insiders’ protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors
-
Posey, C., Roberts, T. L., Lowry, P. B., Bennett, R. J., & Courtney, J. (2013). Insiders’ protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors. MIS Quarterly, 37(4), 1189-1210.
-
(2013)
MIS Quarterly
, vol.37
, Issue.4
, pp. 1189-1210
-
-
Posey, C.1
Roberts, T.L.2
Lowry, P.B.3
Bennett, R.J.4
Courtney, J.5
-
76
-
-
78650770842
-
Improving employees' compliance through information systems security training: An action research study
-
Puhakainen, P., & Siponen, M. (2010). Improving employees' compliance through information systems security training: An action research study. MIS Quarterly, 34(4), 757-778.
-
(2010)
MIS Quarterly
, vol.34
, Issue.4
, pp. 757-778
-
-
Puhakainen, P.1
Siponen, M.2
-
77
-
-
55849105212
-
Information security awareness in higher education: An exploratory study
-
Rezgui, Y., & Marks, A. (2008). Information security awareness in higher education: An exploratory study. Computers & Security, 27(7), 421-253.
-
(2008)
Computers & Security
, vol.27
, Issue.7
, pp. 421-453
-
-
Rezgui, Y.1
Marks, A.2
-
78
-
-
84860658465
-
Absorptive capacity and information systems research: Review, synthesis, and directions for future research
-
Roberts, N., Galluch, P. S., Dinger, M., & Grover, V. (2012). Absorptive capacity and information systems research: Review, synthesis, and directions for future research. MIS Quarterly, 36(2), 625-648.
-
(2012)
MIS Quarterly
, vol.36
, Issue.2
, pp. 625-648
-
-
Roberts, N.1
Galluch, P.S.2
Dinger, M.3
Grover, V.4
-
80
-
-
77957068563
-
Neutralization: New insights into the problem of employee information systems security policy violations
-
Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487-A412.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 487-512
-
-
Siponen, M.1
Vance, A.2
-
81
-
-
84870957440
-
Power and practice in information systems security research
-
Paris, France
-
Siponen, M., Willison, R., & Baskerville, R. (2008). Power and practice in information systems security research. Paper presented at the 29th International Conference on Information Systems, Paris, France.
-
(2008)
Paper Presented at the 29Th International Conference on Information Systems
-
-
Siponen, M.1
Willison, R.2
Baskerville, R.3
-
82
-
-
58149367515
-
Organizational citizenship behavior: Its nature and antecedents
-
Smith, C. A., Organ, D. W., & Near, J. P. (1983). Organizational citizenship behavior: Its nature and antecedents. Journal of Applied Psychology, 68(4), 653-663.
-
(1983)
Journal of Applied Psychology
, vol.68
, Issue.4
, pp. 653-663
-
-
Smith, C.A.1
Organ, D.W.2
Near, J.P.3
-
83
-
-
81355150537
-
Information privacy research: An interdisciplinary review
-
Smith, J. H., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989-1015.
-
(2011)
MIS Quarterly
, vol.35
, Issue.4
, pp. 989-1015
-
-
Smith, J.H.1
Dinev, T.2
Xu, H.3
-
84
-
-
80054707541
-
Out of fear or desire? Toward a better understanding of employees’ motivation to follow IS security policies
-
Son, J.-Y. (2011). Out of fear or desire? Toward a better understanding of employees’ motivation to follow IS security policies. Information & Management, 48, 296-302.
-
(2011)
Information & Management
, vol.48
, pp. 296-302
-
-
Son, J.-Y.1
-
85
-
-
77957070672
-
User participation in information systems security risk management
-
Spears, J. L., & H. Barki (2010). User participation in information systems security risk management. MIS Quarterly, 34(3), 503-522.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 503-522
-
-
Spears, J.L.1
Barki, H.2
-
87
-
-
84855226627
-
Information security policies in the UK healthcare sector: A critical evaluation
-
Stahl, B. C., Doherty, N. F., & Shaw, M. (2012). Information security policies in the UK healthcare sector: A critical evaluation. Information Systems Journal, 22(1), 77-94.
-
(2012)
Information Systems Journal
, vol.22
, Issue.1
, pp. 77-94
-
-
Stahl, B.C.1
Doherty, N.F.2
Shaw, M.3
-
88
-
-
67249159713
-
Editor's comments: Why top journals accept your paper
-
Straub, D. W. (2009). Editor's comments: Why top journals accept your paper. MIS Quarterly, 33(3), 3-10.
-
(2009)
MIS Quarterly
, vol.33
, Issue.3
, pp. 3-10
-
-
Straub, D.W.1
-
91
-
-
84861093724
-
Motivating IS security compliance: Insights from habit and protection motivation theory
-
Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory. Information & Management, 49, 190-198.
-
(2012)
Information & Management
, vol.49
, pp. 190-198
-
-
Vance, A.1
Siponen, M.2
Pahnila, S.3
-
92
-
-
9744223613
-
The resource-based view and information systems research: Review, extension, and suggestions for future research
-
Wade, M., & Hulland, J. (2004). The resource-based view and information systems research: Review, extension, and suggestions for future research. MIS Quarterly, 28(1), 107-142.
-
(2004)
MIS Quarterly
, vol.28
, Issue.1
, pp. 107-142
-
-
Wade, M.1
Hulland, J.2
-
93
-
-
84905975061
-
Control-related motivations and information security policy compliance: The role of autonomy and efficacy
-
Wall, J. D., Palvia, P., & Lowry, P. B. (2013). Control-related motivations and information security policy compliance: The role of autonomy and efficacy. Journal of Information Privacy and Security, 9(4), 52-79.
-
(2013)
Journal of Information Privacy and Security
, vol.9
, Issue.4
, pp. 52-79
-
-
Wall, J.D.1
Palvia, P.2
Lowry, P.B.3
-
95
-
-
79955622246
-
The Influence of the informal social learning environment on information privacy policy compliance efficacy and intention
-
Warkentin, M., Johnston, A. C., & Shropshire, J. (2011). The Influence of the informal social learning environment on information privacy policy compliance efficacy and intention. European Journal of Information Systems, 20, 267-284.
-
(2011)
European Journal of Information Systems
, vol.20
, pp. 267-284
-
-
Warkentin, M.1
Johnston, A.C.2
Shropshire, J.3
-
96
-
-
9744248960
-
Editor's comments: Theoretically speaking
-
Weber, R. (2003). Editor's comments: Theoretically speaking. MIS Quarterly, 27(3), 3-7.
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. 3-7
-
-
Weber, R.1
-
97
-
-
0012903874
-
Analyzing the past to prepare for the future: Writing a literature review
-
Webster, J., & Watson, R. T. (2002). Analyzing the past to prepare for the future: Writing a literature review. MIS Quarterly, 26(2), 8-23.
-
(2002)
MIS Quarterly
, vol.26
, Issue.2
, pp. 8-23
-
-
Webster, J.1
Watson, R.T.2
-
98
-
-
40849131050
-
Is actor network theory critique?
-
Whittle, A., & Spicer, A. (2008). Is actor network theory critique? Organization Studies, 29(4), 611-629.
-
(2008)
Organization Studies
, vol.29
, Issue.4
, pp. 611-629
-
-
Whittle, A.1
Spicer, A.2
-
99
-
-
84873974226
-
Beyond deterrence: An expanded view of employee computer abuse
-
Willison, R., & Warkentin, M. (2013). Beyond deterrence: An expanded view of employee computer abuse. MIS Quarterly, 37(1), 1-20.
-
(2013)
MIS Quarterly
, vol.37
, Issue.1
, pp. 1-20
-
-
Willison, R.1
Warkentin, M.2
-
100
-
-
79960702988
-
Punishment, justice, and compliance in Mandatory IT settings
-
Xue, Y., Liang, H., & Wu, L. (2011). Punishment, justice, and compliance in Mandatory IT settings. Information Systems Research, 22(2), 400-414.
-
(2011)
Information Systems Research
, vol.22
, Issue.2
, pp. 400-414
-
-
Xue, Y.1
Liang, H.2
Wu, L.3
|