-
1
-
-
34247609746
-
E-government: Past, present and future
-
Irani, Z.; Love, P.E.; Montazemi, A. E-Government: Past, present and future. Eur. J. Inf. Syst. 2007, 16, 103-105.
-
(2007)
Eur. J. Inf. Syst.
, vol.16
, pp. 103-105
-
-
Irani, Z.1
Love, P.E.2
Montazemi, A.3
-
2
-
-
84874586939
-
E-Government Adoption in Public Administration Organizations: Integrating Institutional Theory Perspective and Resource-Based View
-
Zheng, D.; Chen, J.; Huang, L.; Zhang, C. E-Government Adoption in Public Administration Organizations: Integrating Institutional Theory Perspective and Resource-Based View. Eur. J. Inf. Syst. 2013, 22, 221-234.
-
(2013)
Eur. J. Inf. Syst.
, vol.22
, pp. 221-234
-
-
Zheng, D.1
Chen, J.2
Huang, L.3
Zhang, C.4
-
3
-
-
70450213380
-
Sustainable it services: Assessing the impact of green computing practices
-
Portland, OR, USA, 2-6 August
-
Harmon, R.R.; Auseklis, N. Sustainable IT Services: Assessing the Impact of Green Computing Practices. In Proceedings of the Portland International Conference on Management of Engineering & Technology, Portland, OR, USA, 2-6 August 2009.
-
(2009)
Proceedings of the Portland International Conference on Management of Engineering & Technology
-
-
Harmon, R.R.1
Auseklis, N.2
-
4
-
-
84856516922
-
Sustainable cloud computing
-
Müller, G.; Sonehara, N.; Echizen, I.; Wohlgemuth, S. Sustainable Cloud Computing. Bus. Inf. Syst. Eng. 2011, 3, 129-131.
-
(2011)
Bus. Inf. Syst. Eng.
, vol.3
, pp. 129-131
-
-
Müller, G.1
Sonehara, N.2
Echizen, I.3
Wohlgemuth, S.4
-
5
-
-
84886220343
-
-
accessed on 9 June
-
Clifford, A. Sustainable IT. Available online: http://it.toolbox.com/blogs/minimalit/sustainable-it-30157 (accessed on 9 June 2009).
-
(2009)
Sustainable IT
-
-
Clifford, A.1
-
6
-
-
41149125559
-
Models of e-government: Are they correct? An empirical assessment
-
Coursey, D.; Norris, D.F. Models of E-Government: Are They Correct? An Empirical Assessment. Public Adm. Rev. 2008, 68, 523-536.
-
(2008)
Public Adm. Rev.
, vol.68
, pp. 523-536
-
-
Coursey, D.1
Norris, D.F.2
-
7
-
-
31344436619
-
Information privacy in organizations: Empowering creative and extrarole performance
-
Alge, B.J.; Ballinger, G.A.; Tangirala, S.; Oakley, J.L. Information Privacy in Organizations: Empowering Creative and Extrarole Performance. J. Appl. Psychol. 2006, 91, 221-232.
-
(2006)
J. Appl. Psychol.
, vol.91
, pp. 221-232
-
-
Alge, B.J.1
Ballinger, G.A.2
Tangirala, S.3
Oakley, J.L.4
-
8
-
-
17844366573
-
Analysis of end user security behaviors
-
Stanton, J.M.; Stam, K.R.; Mastrangelo, P.; Jolton, J. Analysis of End User Security Behaviors. Comput. Secur. 2005, 24, 124-133.
-
(2005)
Comput. Secur.
, vol.24
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
9
-
-
84887227513
-
A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis
-
Feng, N.;Wang, H.J.; Li, M.Q. A Security Risk Analysis Model for Information Systems: Causal Relationships of Risk Factors and Vulnerability Propagation Analysis. Inf. Sci. 2014, 256, 57-73.
-
(2014)
Inf. Sci.
, vol.256
, pp. 57-73
-
-
Feng, N.1
Wang, H.J.2
Li, M.Q.3
-
10
-
-
84945237161
-
Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations
-
Choi, M.; Lee, C.H. Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations. Sustainability 2015, 7, 12032-12051.
-
(2015)
Sustainability
, vol.7
, pp. 12032-12051
-
-
Choi, M.1
Lee, C.H.2
-
11
-
-
67650100804
-
If someone iswatching, i'll do what i'm asked: Mandatoriness, control, and information security
-
Boss, S.R.; Kirsch, L.J.; Angermeier, I.; Shingler, R.A.; Boss, R.W. If Someone isWatching, I'll Do What I'm Asked: Mandatoriness, Control, and Information Security. Eur. J. Inf. Syst. 2009, 18, 151-164.
-
(2009)
Eur. J. Inf. Syst.
, vol.18
, pp. 151-164
-
-
Boss, S.R.1
Kirsch, L.J.2
Angermeier, I.3
Shingler, R.A.4
Boss, R.W.5
-
12
-
-
84982723008
-
Information security: An overview and resource guide for information managers
-
Hill, L.B.; Pemberton, J.M. Information Security: An Overview and Resource Guide for Information Managers. Rec. Manag. Q. 1995, 29, 14-24.
-
(1995)
Rec. Manag. Q.
, vol.29
, pp. 14-24
-
-
Hill, L.B.1
Pemberton, J.M.2
-
14
-
-
84926022697
-
-
Ph.D. Thesis, Stevens Institute of Technology, Hoboken, NJ, USA, September
-
Rohmeyer, P. An Evaluation of Information Security Management Effectiveness. Ph.D. Thesis, Stevens Institute of Technology, Hoboken, NJ, USA, September 2006.
-
(2006)
An Evaluation of Information Security Management Effectiveness
-
-
Rohmeyer, P.1
-
15
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality based beliefs and information security awareness
-
Bulgurcu, B.; Cavusoglu, H.; Benbasat, I. Information Security Policy Compliance: An Empirical Study of Rationality Based Beliefs and Information Security Awareness. MIS Q. 2010, 34, 523-548.
-
(2010)
MIS Q.
, vol.34
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
16
-
-
84887697195
-
Insiders' protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors
-
Posey, C.; Roberts, T.L.; Lowry, P.B.; Bennett, R.J.; Courtney, J.F. Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors. MIS Q. 2013, 37, 1189-1210.
-
(2013)
MIS Q.
, vol.37
, pp. 1189-1210
-
-
Posey, C.1
Roberts, T.L.2
Lowry, P.B.3
Bennett, R.J.4
Courtney, J.F.5
-
17
-
-
84905975061
-
Control-related motivations and information security policy compliance: The role of autonomy and efficacy
-
Wall, J.D.; Palvia, P.; Lowry, P.B. Control-Related Motivations and Information Security Policy Compliance: The Role of Autonomy and Efficacy. J. Inf. Priv. Secur. 2013, 9, 52-79.
-
(2013)
J. Inf. Priv. Secur.
, vol.9
, pp. 52-79
-
-
Wall, J.D.1
Palvia, P.2
Lowry, P.B.3
-
18
-
-
56649107890
-
Sociopolitical dynamics in relations between top managers and security analysts: Favor rendering, reciprocity, and analyst stock recommendations
-
Westphal, J.D.; Clement, M.B. Sociopolitical Dynamics in Relations between Top Managers and Security Analysts: Favor Rendering, Reciprocity, and Analyst Stock Recommendations. Acad. Manag. J. 2008, 51, 873-897.
-
(2008)
Acad. Manag. J.
, vol.51
, pp. 873-897
-
-
Westphal, J.D.1
Clement, M.B.2
-
19
-
-
84921472616
-
An implementation framework for e-government 2.0
-
Sun, P.L.; Ku, C.Y.; Shih, D.H. An Implementation Framework for E-Government 2.0. Telemat. Inform. 2015, 32, 504-520.
-
(2015)
Telemat. Inform.
, vol.32
, pp. 504-520
-
-
Sun, P.L.1
Ku, C.Y.2
Shih, D.H.3
-
20
-
-
84982932433
-
-
UNPOG. E-Government of Korea: Best Practices; Ministry of Public Administration and Security, National Information Society Agency: Seoul, Korea, 2009
-
UNPOG. E-Government of Korea: Best Practices; Ministry of Public Administration and Security, National Information Society Agency: Seoul, Korea, 2009.
-
-
-
-
21
-
-
84982671195
-
Ways to establish public authorities information security governance utilizing e-government information security management system (G-ISMS)
-
Ryu, S.H.; Jeong, D.R.; Jung, H.K.Ways to Establish Public Authorities Information Security Governance Utilizing E-Government Information Security Management System (G-ISMS). Korea Inst. Inf. Commun. Eng. 2013, 17, 769-774.
-
(2013)
Korea Inst. Inf. Commun. Eng.
, vol.17
, pp. 769-774
-
-
Ryu, S.H.1
Jeong, D.R.2
Jung, H.K.3
-
22
-
-
23044525969
-
Current directions in is security research: Towards socio-organizational perspectives
-
Dhillon, G.; Backhouse, J. Current Directions in IS Security Research: Towards Socio-Organizational Perspectives. Inf. Syst. J. 2001, 11, 127-153.
-
(2001)
Inf. Syst. J.
, vol.11
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
23
-
-
84863542038
-
Managing employee compliance with information security policies: The critical role of top management and organizational culture
-
Hu, Q.; Dinev, T.; Hart, P.; Cooke, D. Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture. Decis. Sci. 2012, 43, 615-660.
-
(2012)
Decis. Sci.
, vol.43
, pp. 615-660
-
-
Hu, Q.1
Dinev, T.2
Hart, P.3
Cooke, D.4
-
24
-
-
33644533141
-
Information security: Management's effect on culture and policy
-
Knapp, K.J.; Marshall, T.E.; Kelly Rainer, R.; Nelson Ford, F. Information Security: Management's Effect on Culture and Policy. Inf. Manag. Comput. Secur. 2006, 14, 24-36.
-
(2006)
Inf. Manag. Comput. Secur.
, vol.14
, pp. 24-36
-
-
Knapp, K.J.1
Marshall, T.E.2
Kelly Rainer, R.3
Nelson Ford, F.4
-
25
-
-
0001983842
-
Social role theory of sex differences and similarities: A current appraisal
-
Eckes, T., Trautner, H.M., Eds.; Psychology Press: New York, NY, USA
-
Eagly, A.H.; Wood, W.; Diekman, A.B. Social Role Theory of Sex Differences and Similarities: A Current Appraisal. In The Developmental Social Psychology of Gender; Eckes, T., Trautner, H.M., Eds.; Psychology Press: New York, NY, USA, 2000; Volume 5, pp. 123-174.
-
(2000)
The Developmental Social Psychology of Gender
, vol.5
, pp. 123-174
-
-
Eagly, A.H.1
Wood, W.2
Diekman, A.B.3
-
26
-
-
49249132793
-
-
Ph.D. Thesis, The University of Texas at Austin, Austin, TX, USA, September
-
Long, C.L. A Socio-Technical Perspective on Information Security Knowledge and Attitudes. Ph.D. Thesis, The University of Texas at Austin, Austin, TX, USA, September 1999.
-
(1999)
A Socio-Technical Perspective on Information Security Knowledge and Attitudes
-
-
Long, C.L.1
-
27
-
-
67649116155
-
Educational requirement analysis for information security professionals in korea
-
Kim, S.; Choi, M. Educational Requirement Analysis for Information Security Professionals in Korea. J. Inf. Syst. Educ. 2002, 13, 237-248.
-
(2002)
J. Inf. Syst. Educ.
, vol.13
, pp. 237-248
-
-
Kim, S.1
Choi, M.2
-
28
-
-
33947135863
-
Curriculum design and evaluation for e-commerce security education using ahp
-
Kim, H.; Han, Y.; Choi, M.; Kim, S. Curriculum Design and Evaluation for E-Commerce Security Education Using AHP. IEICE Trans. Inf. Syst. 2007, 90, 668-675.
-
(2007)
IEICE Trans. Inf. Syst.
, vol.90
, pp. 668-675
-
-
Kim, H.1
Han, Y.2
Choi, M.3
Kim, S.4
-
29
-
-
84982680413
-
-
Auerbach Publication, CRC Press LLC: New York, NY, USA
-
Wylder, J. The Life Cycle of Security Managers; Auerbach Publication, CRC Press LLC: New York, NY, USA, 2001.
-
(2001)
The Life Cycle of Security Managers
-
-
Wylder, J.1
-
31
-
-
84982684625
-
-
Møller, C., Chaudhry, S., Eds.; Springer: Berlin/Heidelberg, Germany
-
Chaudhry, P.E.; Chaudhry, S.S.; Reese, R.; Jones, D.S. Enterprise Information Systems Security: A Conceptual Framework; Møller, C., Chaudhry, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2012.
-
(2012)
Enterprise Information Systems Security: A Conceptual Framework
-
-
Chaudhry, P.E.1
Chaudhry, S.S.2
Reese, R.3
Jones, D.S.4
-
32
-
-
0242721359
-
Applying information security governance
-
Moulton, R.; Coles, R.S. Applying Information Security Governance. Comput. Secur. 2003, 22, 580-584.
-
(2003)
Comput. Secur.
, vol.22
, pp. 580-584
-
-
Moulton, R.1
Coles, R.S.2
-
33
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations: A field study
-
Straub, D.W.; Nance,W.D. Discovering and Disciplining Computer Abuse in Organizations: A Field Study. MIS Q. 1990, 14, 45-60.
-
(1990)
MIS Q.
, vol.14
, pp. 45-60
-
-
Straub, D.W.1
Nance, W.D.2
-
34
-
-
0000280419
-
Effective is security: An empirical study
-
Straub, D.W. Effective IS security: An empirical study. Inf. Syst. Res. 1990, 1, 255-276.
-
(1990)
Inf. Syst. Res.
, vol.1
, pp. 255-276
-
-
Straub, D.W.1
-
35
-
-
0031288375
-
Preventive and deterrent controls for software piracy
-
Gopal, R.D.; Sanders, G.L. Preventive and Deterrent Controls for Software Piracy. J. Manag. Inf. Syst. 1997, 13, 29-47.
-
(1997)
J. Manag. Inf. Syst.
, vol.13
, pp. 29-47
-
-
Gopal, R.D.1
Sanders, G.L.2
-
36
-
-
0041426663
-
Software piracy in the workplace: A model and empirical test
-
Peace, A.G.; Galletta, D.F.; Thong, J.Y. Software Piracy in the Workplace: A Model and Empirical Test. J. Manag. Inf. Syst. 2003, 20, 153-177.
-
(2003)
J. Manag. Inf. Syst.
, vol.20
, pp. 153-177
-
-
Peace, A.G.1
Galletta, D.F.2
Thong, J.Y.3
-
37
-
-
77957068563
-
Neutralization: New insights into the problem of employee information systems security policy violations
-
Siponen, M.; Vance, A. Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations. MIS Q. 2010, 34, 487-502.
-
(2010)
MIS Q.
, vol.34
, pp. 487-502
-
-
Siponen, M.1
Vance, A.2
-
38
-
-
79959944364
-
Does deterrence work in reducing information security policy abuse by employees?
-
Hu, Q.; Xu, Z.; Dinev, T.; Ling, H. Does Deterrence Work in Reducing Information Security Policy Abuse by Employees? Commun. ACM 2011, 54, 54-60.
-
(2011)
Commun. ACM
, vol.54
, pp. 54-60
-
-
Hu, Q.1
Xu, Z.2
Dinev, T.3
Ling, H.4
-
39
-
-
24644439555
-
Information security policy's impact on reporting security incidents
-
Wiant, T.L. Information Security Policy's Impact on Reporting Security Incidents. Comput. Secur. 2005, 24, 448-459.
-
(2005)
Comput. Secur.
, vol.24
, pp. 448-459
-
-
Wiant, T.L.1
-
40
-
-
0004289281
-
-
Reston Publication, Prentice-Hall: Reston, VA, USA
-
Parker, D.B. Computer Security Management; Reston Publication, Prentice-Hall: Reston, VA, USA, 1981.
-
(1981)
Computer Security Management
-
-
Parker, D.B.1
-
41
-
-
60549111652
-
Leadership: Current theories, research, and future directions
-
Avolio, B.J.; Walumbwa, F.O.; Weber, T.J. Leadership: Current Theories, Research, and Future Directions. Annu. Rev. Psychol. 2009, 60, 421-449.
-
(2009)
Annu. Rev. Psychol.
, vol.60
, pp. 421-449
-
-
Avolio, B.J.1
Walumbwa, F.O.2
Weber, T.J.3
-
42
-
-
0003446464
-
-
Prentice-Hall: Upper Saddle River, NJ, USA
-
Yukl, G. Leadership in Organizations; Prentice-Hall: Upper Saddle River, NJ, USA, 2010.
-
(2010)
Leadership in Organizations
-
-
Yukl, G.1
-
43
-
-
0003842485
-
-
Harper & Row: New York, NY, USA
-
Burns, J.M. Leadership; Harper & Row: New York, NY, USA, 1978.
-
(1978)
Leadership
-
-
Burns, J.M.1
-
46
-
-
0000476502
-
Ten years of the leadership quarterly: Contributions and challenges for the future
-
Lowe, K.B.; Gardner, W.L. Ten Years of the Leadership Quarterly: Contributions and Challenges for the Future. Leadersh. Q. 2000, 11, 459-514.
-
(2000)
Leadersh. Q.
, vol.11
, pp. 459-514
-
-
Lowe, K.B.1
Gardner, W.L.2
-
47
-
-
58149322472
-
Relationship-based approach to leadership: Development of leader-member exchange (lmx) theory of leadership over 25 years: Applying a multi-level multi-domain perspective
-
Graen, G.B.; Uhl-Bien, M. Relationship-Based Approach to Leadership: Development of Leader-Member Exchange (LMX) Theory of Leadership over 25 Years: Applying a Multi-Level Multi-Domain Perspective. Leadersh. Q. 1995, 6, 219-247.
-
(1995)
Leadersh. Q.
, vol.6
, pp. 219-247
-
-
Graen, G.B.1
Uhl-Bien, M.2
-
49
-
-
7444265887
-
Transformational and Transactional Leadership: A Meta-Analytic Test of Their Relative Validity
-
Judge, T.A.; Piccolo, R.F. Transformational and Transactional Leadership: A Meta-Analytic Test of Their Relative Validity. J. Appl. Psychol. 2004, 89, 755-768.
-
(2004)
J. Appl. Psychol.
, vol.89
, pp. 755-768
-
-
Judge, T.A.1
Piccolo, R.F.2
-
50
-
-
38549155674
-
Authentic leadership: Development and analysis of a multidimensional theory-based measure
-
Walumbwa, F.O.; Avolio, B.J.; Gardner, W.L.; Wernsing, T.S.; Peterson, S.J. Authentic Leadership: Development and Analysis of a Multidimensional Theory-Based Measure. J. Manag. 2008, 34, 89-126.
-
(2008)
J. Manag.
, vol.34
, pp. 89-126
-
-
Walumbwa, F.O.1
Avolio, B.J.2
Gardner, W.L.3
Wernsing, T.S.4
Peterson, S.J.5
-
51
-
-
34548845567
-
Transforming service employees and climate: A multilevel, multisource examination of transformational leadership in building long-term service relationships
-
Liao, H.; Chuang, A. Transforming Service Employees and Climate: A Multilevel, Multisource Examination of Transformational Leadership in Building Long-Term Service Relationships. J. Appl. Psychol. 2007, 92, 1006-1019.
-
(2007)
J. Appl. Psychol.
, vol.92
, pp. 1006-1019
-
-
Liao, H.1
Chuang, A.2
-
52
-
-
33646550159
-
Transformational leadership and job behaviors: The mediating role of core job characteristics
-
Piccolo, R.F.; Colquitt, J.A. Transformational Leadership and Job Behaviors: The Mediating Role of Core Job Characteristics. Acad. Manag. J. 2006, 49, 327-340.
-
(2006)
Acad. Manag. J.
, vol.49
, pp. 327-340
-
-
Piccolo, R.F.1
Colquitt, J.A.2
-
53
-
-
22944482170
-
Leader-member exchange as a mediator of the relationship between transformational leadership and followers' performance and organizational citizenship behavior
-
Wang, H.; Law, K.S.; Hackett, R.D.; Wang, D.; Chen, Z.X. Leader-Member Exchange as a Mediator of the Relationship between Transformational Leadership and Followers' Performance and Organizational Citizenship Behavior. Acad. Manag. J. 2005, 48, 420-432.
-
(2005)
Acad. Manag. J.
, vol.48
, pp. 420-432
-
-
Wang, H.1
Law, K.S.2
Hackett, R.D.3
Wang, D.4
Chen, Z.X.5
-
54
-
-
0037396266
-
Predicting unit performance by assessing transformational and transactional leadership
-
Bass, B.M.; Avolio, B.J.; Jung, D.I.; Berson, Y. Predicting Unit Performance by Assessing Transformational and Transactional Leadership. J. Appl. Psychol. 2003, 85, 207-218.
-
(2003)
J. Appl. Psychol.
, vol.85
, pp. 207-218
-
-
Bass, B.M.1
Avolio, B.J.2
Jung, D.I.3
Berson, Y.4
-
55
-
-
34548814132
-
Embracing transformational leadership: Team values and the impact of leader behavior on team performance
-
Schaubroeck, J.; Lam, S.S.; Cha, S.E. Embracing Transformational Leadership: Team Values and the Impact of Leader Behavior on Team Performance. J. Appl. Psychol. 2007, 92, 1020-1030.
-
(2007)
J. Appl. Psychol.
, vol.92
, pp. 1020-1030
-
-
Schaubroeck, J.1
Lam, S.S.2
Cha, S.E.3
-
56
-
-
58349086999
-
Strategic leadership for exploration and exploitation: The moderating role of environmental dynamism
-
Jansen, J.J.; Vera, D.; Crossan, M. Strategic Leadership for Exploration and Exploitation: The Moderating Role of Environmental Dynamism. Leadersh. Q. 2009, 20, 5-18.
-
(2009)
Leadersh. Q.
, vol.20
, pp. 5-18
-
-
Jansen, J.J.1
Vera, D.2
Crossan, M.3
-
57
-
-
10744219817
-
Effects of leadership style, anonymity, and rewards on creativity-relevant processes and outcomes in an electronic meeting system context
-
Kahai, S.S.; Sosik, J.J.; Avolio, B.J. Effects of Leadership Style, Anonymity, and Rewards on Creativity-Relevant Processes and Outcomes in an Electronic Meeting System Context. Leadersh. Q. 2003, 14, 499-524.
-
(2003)
Leadersh. Q.
, vol.14
, pp. 499-524
-
-
Kahai, S.S.1
Sosik, J.J.2
Avolio, B.J.3
-
58
-
-
0037398619
-
The two faces of transformational leadership: Empowerment and dependency
-
Kark, R.; Shamir, B.; Chen, G. The Two Faces of Transformational Leadership: Empowerment and Dependency. J. Appl. Psychol. 2003, 88, 246-255.
-
(2003)
J. Appl. Psychol.
, vol.88
, pp. 246-255
-
-
Kark, R.1
Shamir, B.2
Chen, G.3
-
59
-
-
0041905260
-
Leadership, values, and subordinate self-concepts
-
Lord, R.G.; Brown, D.J. Leadership, Values, and Subordinate Self-Concepts. Leadersh. Q. 2001, 12, 133-152.
-
(2001)
Leadersh. Q.
, vol.12
, pp. 133-152
-
-
Lord, R.G.1
Brown, D.J.2
-
61
-
-
0033249338
-
Re-examining the components of transformational and transactional leadership using the multifactor leadership
-
Avolio, B.J.; Bass, B.M.; Jung, D.I. Re-Examining the Components of Transformational and Transactional Leadership Using the Multifactor Leadership. J. Occup. Organ. Psychol. 1999, 72, 441-462.
-
(1999)
J. Occup. Organ. Psychol.
, vol.72
, pp. 441-462
-
-
Avolio, B.J.1
Bass, B.M.2
Jung, D.I.3
-
62
-
-
0005049310
-
Effective correlation of transformational and transactional leadership: A meta-analytical review
-
Lowe, K.B.; Kroeck, K.G.; Sivasubramaniam, N. Effective Correlation of Transformational and Transactional Leadership: A Meta-Analytical Review. Leadersh. Q. 1996, 7, 385-425.
-
(1996)
Leadersh. Q.
, vol.7
, pp. 385-425
-
-
Lowe, K.B.1
Kroeck, K.G.2
Sivasubramaniam, N.3
-
63
-
-
24044451509
-
Beyond trust: Security policies and defence in depth
-
Kemp, M. Beyond Trust: Security Policies and Defence in Depth. Netw. Secur. 2005, 2005, 14-16.
-
(2005)
Netw. Secur.
, vol.2005
, pp. 14-16
-
-
Kemp, M.1
-
64
-
-
33744520370
-
Towards an information security competence maturity model
-
Thomson, K.L.; von Solms, R. Towards an Information Security Competence Maturity Model. Comput. Fraud Secur. 2006, 2006, 11-15.
-
(2006)
Comput. Fraud Secur.
, vol.2006
, pp. 11-15
-
-
Thomson, K.L.1
Von Solms, R.2
-
65
-
-
85001799501
-
Information security effectiveness: Conceptualization and validation of a theory
-
Knapp, K.J.; Marshall, T.E.; Rainer, R.K., Jr.; Ford, F.N. Information Security Effectiveness: Conceptualization and Validation of a Theory. Int. J. Inf. Secur. Priv. 2007, 1, 37-60.
-
(2007)
Int. J. Inf. Secur. Priv.
, vol.1
, pp. 37-60
-
-
Knapp, K.J.1
Marshall, T.E.2
Rainer, R.K.3
Ford, F.N.4
-
66
-
-
0003424343
-
-
Aldine Transaction: New Brunswick, NJ, USA; London, UK
-
Glaser, B.G.; Strauss, A.L. The Discovery of Grounded Research: Strategies for Qualitative Research; Aldine Transaction: New Brunswick, NJ, USA; London, UK, 1967.
-
(1967)
The Discovery of Grounded Research: Strategies for Qualitative Research
-
-
Glaser, B.G.1
Strauss, A.L.2
-
67
-
-
0036330173
-
Information security policy-what do international security standards say?
-
Hone, K.; Eloff, J.H.P. Information Security Policy-What Do International Security Standards Say? Comput. Secur. 2002, 21, 402-409.
-
(2002)
Comput. Secur.
, vol.21
, pp. 402-409
-
-
Hone, K.1
Eloff, J.H.P.2
-
68
-
-
18844431067
-
Information systems security policies: A contextual perspective
-
Karyda, M.; Kiountouzis, E.; Kokolakis, S. Information Systems Security Policies: A Contextual Perspective. Comput. Secur. 2005, 24, 246-260.
-
(2005)
Comput. Secur.
, vol.24
, pp. 246-260
-
-
Karyda, M.1
Kiountouzis, E.2
Kokolakis, S.3
-
69
-
-
54949146918
-
Implementation and effectiveness of organizational information security measures
-
Hagen, J.M.; Albrechtsen, E.; Hovden, J. Implementation and Effectiveness of Organizational Information Security Measures. Inf. Manag. Secur. 2008, 16, 377-397.
-
(2008)
Inf. Manag. Secur.
, vol.16
, pp. 377-397
-
-
Hagen, J.M.1
Albrechtsen, E.2
Hovden, J.3
-
70
-
-
0037400028
-
An integrative study of information systems security effectiveness
-
Kankanhalli, A.; Teo, H.H.; Tan, B.C.; Wei, K.K. An Integrative Study of Information Systems Security Effectiveness. Int. J. Inf. Manag. 2003, 23, 139-154.
-
(2003)
Int. J. Inf. Manag.
, vol.23
, pp. 139-154
-
-
Kankanhalli, A.1
Teo, H.H.2
Tan, B.C.3
Wei, K.K.4
-
71
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D.W. Coping with Systems Risk: Security Planning Models for Management Decision Making. MIS Q. 1998, 22, 441-469.
-
(1998)
MIS Q.
, vol.22
, pp. 441-469
-
-
Straub, D.W.1
-
72
-
-
1642374239
-
The relevance of transformational leadership to nontraditional accounting services: Information systems assurance and business consulting
-
Viator, R.E. The Relevance of Transformational Leadership to Nontraditional Accounting Services: Information Systems Assurance and Business Consulting. J. Inf. Syst. 2001, 15, 99-125.
-
(2001)
J. Inf. Syst.
, vol.15
, pp. 99-125
-
-
Viator, R.E.1
-
73
-
-
0000893909
-
Transformational leader behavior and their effects on followers' trust in leader, satisfaction, and organizational citizenship behaviors
-
Podsakoff, P.M.; MacKenzie, S.B.; Moorman, R.H.; Fetter, R. Transformational Leader Behavior and Their Effects on Followers' Trust in Leader, Satisfaction, and Organizational Citizenship Behaviors. Leadersh. Q. 1990, 1, 107-142.
-
(1990)
Leadersh. Q.
, vol.1
, pp. 107-142
-
-
Podsakoff, P.M.1
MacKenzie, S.B.2
Moorman, R.H.3
Fetter, R.4
-
74
-
-
43249115124
-
Organizational culture and leadership in erp implementation
-
Ke, W.; Wei, K.K. Organizational Culture and Leadership in ERP Implementation. Decis. Support Syst. 2008, 45, 208-218.
-
(2008)
Decis. Support Syst.
, vol.45
, pp. 208-218
-
-
Ke, W.1
Wei, K.K.2
-
75
-
-
33749347189
-
Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior
-
Pavlou, P.A.; Fygenson, M. Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior. MIS Q. 2006, 30, 115-143.
-
(2006)
MIS Q.
, vol.30
, pp. 115-143
-
-
Pavlou, P.A.1
Fygenson, M.2
-
76
-
-
0002042337
-
Issues and opinion on structural equation modeling
-
Chin, W.W. Issues and Opinion on Structural Equation Modeling. MIS Q. 1998, 22, 7-16.
-
(1998)
MIS Q.
, vol.22
, pp. 7-16
-
-
Chin, W.W.1
-
77
-
-
0023020183
-
The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations
-
Baron, R.M.; Kenny, D.A. The Moderator-Mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic, and Statistical Considerations. J. Personal. Soc. Psychol. 1986, 51, 1173-1182.
-
(1986)
J. Personal. Soc. Psychol.
, vol.51
, pp. 1173-1182
-
-
Baron, R.M.1
Kenny, D.A.2
-
78
-
-
49249127269
-
Information security management objectives and practices: A parsimonious framework
-
Ma, Q.; Johnston, A.C.; Pearson, J.M. Information Security Management Objectives and Practices: A Parsimonious Framework. Inf. Manag. Comput. Secur. 2008, 16, 251-270.
-
(2008)
Inf. Manag. Comput. Secur.
, vol.16
, pp. 251-270
-
-
Ma, Q.1
Johnston, A.C.2
Pearson, J.M.3
-
79
-
-
3042812983
-
The 10 deadly sins of information security management
-
Von Solms, B.; von Solms, R. The 10 deadly sins of information security management. Comput. Secur. 2004, 23, 371-376.
-
(2004)
Comput. Secur.
, vol.23
, pp. 371-376
-
-
Von Solms, B.1
Von Solms, R.2
-
80
-
-
4344705413
-
Institutional isomorphism and public sector organizations
-
Frumkin, P.; Galaskiewicz, J. Institutional Isomorphism and Public Sector Organizations. J. Public Adm. Res. Theory 2004, 14, 283-307.
-
(2004)
J. Public Adm. Res. Theory
, vol.14
, pp. 283-307
-
-
Frumkin, P.1
Galaskiewicz, J.2
-
81
-
-
16544376163
-
Transactional versus transformational style of leadership-employee perception of leadership efficacy in public and private hospitals in Kuwait
-
Al-Mailam, F.F. Transactional versus Transformational Style of Leadership-Employee Perception of Leadership Efficacy in Public and Private Hospitals in Kuwait. Qual. Manag. Health Care 2004, 13, 278-284.
-
(2004)
Qual. Manag. Health Care
, vol.13
, pp. 278-284
-
-
Al-Mailam, F.F.1
|