-
1
-
-
0036644509
-
Computer monitoring: Benefts and pitfalls facing management
-
Ariss, S.S. (2002). Computer monitoring: Benefts and pitfalls facing management. Information & Management, 39(7), 553–558.
-
(2002)
Information & Management
, vol.39
, Issue.7
, pp. 553-558
-
-
Ariss, S.S.1
-
2
-
-
30744434347
-
An analysis of the growth of computer and internet security breaches
-
Bagchi, K., & Udo, G. (2003). An analysis of the growth of computer and internet security breaches. Communications of the AIS, 12(46), 684–700.
-
(2003)
Communications of the AIS
, vol.12
, Issue.46
, pp. 684-700
-
-
Bagchi, K.1
Udo, G.2
-
3
-
-
16344391307
-
Special issue on action research in information systems: Making IS research relevant to practice. Forward
-
Baskerville, R.L., & Myers, M.D. (2004). Special issue on action research in information systems: Making IS research relevant to practice. Forward. MIS Quarterly, 28(3), 329–335.
-
(2004)
MIS Quarterly
, vol.28
, Issue.3
, pp. 329-335
-
-
Baskerville, R.L.1
Myers, M.D.2
-
4
-
-
0002624070
-
Empirical research in information systems: The practice of relevance
-
Benbasat, I., & Zmud, R.W. (1999). Empirical research in information systems: The practice of relevance. MIS Quarterly, 23(1), 3–16.
-
(1999)
MIS Quarterly
, vol.23
, Issue.1
, pp. 3-16
-
-
Benbasat, I.1
Zmud, R.W.2
-
6
-
-
33751224822
-
Convergent and discriminant validation by the multi-trait-multimethod matrix
-
Campbell, D.T., & Fiske, D.W. (1959). Convergent and discriminant validation by the multi-trait-multimethod matrix. Psychological Bulletin, 56(2), 81–105.
-
(1959)
Psychological Bulletin
, vol.56
, Issue.2
, pp. 81-105
-
-
Campbell, D.T.1
Fiske, D.W.2
-
7
-
-
33644519719
-
-
Retrieved May 2004, from http://www.cert.org/stats/ cert_stats.html#incidents.
-
Computer Emergency Response Team (CERT). (2004). CERT statistics. Retrieved May 2004, from http://www.cert.org/stats/ cert_stats.html#incidents.
-
(2004)
CERT statistics
-
-
-
8
-
-
0001840539
-
Scale development
-
2nd ed Thousand Oaks, CA: Sage Publications
-
DeVellis, R.F. (2003). Scale development. Theory and applications (2nd ed.) (Vol. 26). Thousand Oaks, CA: Sage Publications.
-
(2003)
Theory and applications
, vol.26
-
-
DeVellis, R.F.1
-
9
-
-
23044525969
-
Current directions in IS security research: Towards socio-organizational perspectives
-
Dhillon, G., & Backhouse, J. (2001). Current directions in IS security research: Towards socio-organizational perspectives. Information Systems Journal, 11(2), 127–153.
-
(2001)
Information Systems Journal
, vol.11
, Issue.2
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
10
-
-
0001313519
-
The infuence of general perceptions of training environment on pretraining motivation and perceived training transfer
-
Facteau, J.D., Dobbins, G.H., Russell, J.E.A., Ladd, R.T., & Kudisch, J.D. (1995). The infuence of general perceptions of training environment on pretraining motivation and perceived training transfer. Journal of Management, 21(1), 1–25.
-
(1995)
Journal of Management
, vol.21
, Issue.1
, pp. 1-25
-
-
Facteau, J.D.1
Dobbins, G.H.2
Russell, J.E.A.3
Ladd, R.T.4
Kudisch, J.D.5
-
12
-
-
0842346778
-
Testing moderator and mediator effects in counseling psychology
-
Frazier, P.A., Barron, K.E., & Tix, A.P. (2004). Testing moderator and mediator effects in counseling psychology. Journal of Counseling Psychology, 51(1), 115–134.
-
(2004)
Journal of Counseling Psychology
, vol.51
, Issue.1
, pp. 115-134
-
-
Frazier, P.A.1
Barron, K.E.2
Tix, A.P.3
-
13
-
-
24044457431
-
From contexts to constructs: The use of grounded theory in operationalising contingent process models
-
Galal, G.H. (2001). From contexts to constructs: The use of grounded theory in operationalising contingent process models. European Journal of Information Systems, 10, 2–14.
-
(2001)
European Journal of Information Systems
, vol.10
, pp. 2-14
-
-
Galal, G.H.1
-
14
-
-
85013136025
-
The fnancial impact of IT security breaches: What do investors think?
-
Garg, A., Curtis, J., & Halper, H. (2003). The fnancial impact of IT security breaches: What do investors think? Information Systems Security, 12(1), 22–34.
-
(2003)
Information Systems Security
, vol.12
, Issue.1
, pp. 22-34
-
-
Garg, A.1
Curtis, J.2
Halper, H.3
-
15
-
-
20344406702
-
Assessing unidimensionality through LISREL: An explanation and example
-
Gefen, D. (2003). Assessing unidimensionality through LISREL: An explanation and example. Communications of the AIS, 12, 23–46.
-
(2003)
Communications of the AIS
, vol.12
, pp. 23-46
-
-
Gefen, D.1
-
16
-
-
0000249403
-
Computer-based monitoring: Common perceptions and empirical results
-
George, J.F. (1996). Computer-based monitoring: Common perceptions and empirical results. MIS Quarterly, 20(4), 459–480.
-
(1996)
MIS Quarterly
, vol.20
, Issue.4
, pp. 459-480
-
-
George, J.F.1
-
17
-
-
33845358961
-
Bad management theories are destroying good management practices
-
Ghoshal, S. (2005). Bad management theories are destroying good management practices. Academy of Management Learning & Education, 4(1), 75–91.
-
(2005)
Academy of Management Learning & Education
, vol.4
, Issue.1
, pp. 75-91
-
-
Ghoshal, S.1
-
19
-
-
0031288375
-
Preventive and deterrent controls for software piracy
-
Gopal, R.D., & Sanders, G.L. (1997). Preventive and deterrent controls for software piracy. Journal of Management Information Systems, 13(4), 29–47.
-
(1997)
Journal of Management Information Systems
, vol.13
, Issue.4
, pp. 29-47
-
-
Gopal, R.D.1
Sanders, G.L.2
-
20
-
-
3242808612
-
-
San Francisco, CA: Computer Security Institute
-
Gordon, L.A., Loeb, M.P., Lucyshyn, W., & Richardson, R. (2005). 10th annual CSI/FBI computer crime and security survey. San Francisco, CA: Computer Security Institute.
-
(2005)
10th annual CSI/FBI computer crime and security survey
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
21
-
-
0000917858
-
The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
-
Harrington, S.J. (1996). The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly, 20(3), 257–278.
-
(1996)
MIS Quarterly
, vol.20
, Issue.3
, pp. 257-278
-
-
Harrington, S.J.1
-
22
-
-
0003054486
-
A brief tutorial on the development of measures for use in survey questionnaires
-
Hinkin, T.R. (1998). A brief tutorial on the development of measures for use in survey questionnaires. Organizational Research Methods, 1(1), 104–121.
-
(1998)
Organizational Research Methods
, vol.1
, Issue.1
, pp. 104-121
-
-
Hinkin, T.R.1
-
23
-
-
0002390117
-
Cultural constraints in management theories
-
Hofstede, G. (1993). Cultural constraints in management theories. Academy of Management Journal, 7(1), 81–94.
-
(1993)
Academy of Management Journal
, vol.7
, Issue.1
, pp. 81-94
-
-
Hofstede, G.1
-
24
-
-
0039396840
-
Executive involvement and participation in the management of information technology
-
Jarvenpaa, S.L., & Ives, B. (1991). Executive involvement and participation in the management of information technology. MIS Quarterly, 15(2), 205–221.
-
(1991)
MIS Quarterly
, vol.15
, Issue.2
, pp. 205-221
-
-
Jarvenpaa, S.L.1
Ives, B.2
-
25
-
-
1242318217
-
Power and information technology research: A metatriangulation review
-
Jasperson, J.S., Carte, T.A., Saunders, C.S., Butler, B.S., Croes, H.J.P., & Zheng, W. (2002). Power and information technology research: A metatriangulation review. MIS Quarterly, 26(4), 397–459.
-
(2002)
MIS Quarterly
, vol.26
, Issue.4
, pp. 397-459
-
-
Jasperson, J.S.1
Carte, T.A.2
Saunders, C.S.3
Butler, B.S.4
Croes, H.J.P.5
Zheng, W.6
-
26
-
-
0037400028
-
An integrative study of information systems security effectiveness
-
Kankanhalli, A., Hock-Hai, T., Bernard, C.Y.T., & Kwok-Kee, W. (2003). An integrative study of information systems security effectiveness. International Journal of Information Management, 23(2), 139–154.
-
(2003)
International Journal of Information Management
, vol.23
, Issue.2
, pp. 139-154
-
-
Kankanhalli, A.1
Hock-Hai, T.2
Bernard, C.Y.T.3
Kwok-Kee, W.4
-
27
-
-
84900037986
-
Methodological issues in MIS crosscultural research
-
In M.E. Whitman & A.B. Woszczynski (Eds.) Hershey, PA: Idea Group Publishing
-
Karahanna, E., Evaristo, R., & Srite, M. (2004). Methodological issues in MIS crosscultural research. In M.E. Whitman & A.B. Woszczynski (Eds.), The handbook of information systems research (pp. 166–177). Hershey, PA: Idea Group Publishing.
-
(2004)
The handbook of information systems research
, pp. 166-177
-
-
Karahanna, E.1
Evaristo, R.2
Srite, M.3
-
28
-
-
1242263532
-
Why there aren't more information security research studies
-
Kotulic, A.G., & Clark, J.G. (2004). Why there aren't more information security research studies. Information & Management, 41(5), 597–607.
-
(2004)
Information & Management
, vol.41
, Issue.5
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, J.G.2
-
29
-
-
0345764837
-
Improving user security behavior
-
Leach, J. (2003). Improving user security behavior. Computers & Security, 22(8), 685–692.
-
(2003)
Computers & Security
, vol.22
, Issue.8
, pp. 685-692
-
-
Leach, J.1
-
30
-
-
2342489402
-
An integrative model of computer abuse based on social control and general deterrence theories
-
Lee, S.M., Lee, S.G., & Yoo, S. (2004). An integrative model of computer abuse based on social control and general deterrence theories. Information & Management, 41(6), 707–718.
-
(2004)
Information & Management
, vol.41
, Issue.6
, pp. 707-718
-
-
Lee, S.M.1
Lee, S.G.2
Yoo, S.3
-
31
-
-
84900223393
-
Mediation, confounding, and suppression: Different names for the same effect
-
MacKinnon, D.P., Krull, J.L., & Lockwood, C. (2000). Mediation, confounding, and suppression: Different names for the same effect. Prevention Science, 2, 15–27.
-
(2000)
Prevention Science
, vol.2
, pp. 15-27
-
-
MacKinnon, D.P.1
Krull, J.L.2
Lockwood, C.3
-
32
-
-
23444456749
-
Integrating national culture into IS research: The need for current individual-level measures
-
McCoy, S., Galletta, D.F., & King, W.R. (2005). Integrating national culture into IS research: The need for current individual-level measures. Communications of the Association for Information Systems, 15, 211–224.
-
(2005)
Communications of the Association for Information Systems
, vol.15
, pp. 211-224
-
-
McCoy, S.1
Galletta, D.F.2
King, W.R.3
-
34
-
-
1542493643
-
CASE tools as organizational change: Investigating incremental and radical changes in systems development
-
Orlikowski, W. (1993). CASE tools as organizational change: Investigating incremental and radical changes in systems development. MIS Quarterly, 17(3), 309–340.
-
(1993)
MIS Quarterly
, vol.17
, Issue.3
, pp. 309-340
-
-
Orlikowski, W.1
-
36
-
-
0041426663
-
Software piracy in the workplace: A model and empirical test
-
Peace, A.G., Galletta, D.F., & Thong, J.Y.L. (2002). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153–177.
-
(2002)
Journal of Management Information Systems
, vol.20
, Issue.1
, pp. 153-177
-
-
Peace, A.G.1
Galletta, D.F.2
Thong, J.Y.L.3
-
37
-
-
0141907688
-
Common method bias in behavioral research: A critical review of the literature and recommended remedies
-
Podsakoff, P.M., MacKenzie, S.B., Lee, J.Y., & Podsakoff, N.P. (2003). Common method bias in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.
-
(2003)
Journal of Applied Psychology
, vol.88
, Issue.5
, pp. 879-903
-
-
Podsakoff, P.M.1
MacKenzie, S.B.2
Lee, J.Y.3
Podsakoff, N.P.4
-
38
-
-
84970235764
-
Self-reports in organizational research: Problems and prospects
-
Podsakoff, P.M., & Organ, D.W. (1986). Self-reports in organizational research: Problems and prospects. Journal of Management, 12(4), 531–544.
-
(1986)
Journal of Management
, vol.12
, Issue.4
, pp. 531-544
-
-
Podsakoff, P.M.1
Organ, D.W.2
-
39
-
-
9744262493
-
Strategic information systems planning success: An investigation of the construct and its measurement
-
Segars, A.H., & Grover, V. (1998). Strategic information systems planning success: An investigation of the construct and its measurement. MIS Quarterly, 22(2), 139–163.
-
(1998)
MIS Quarterly
, vol.22
, Issue.2
, pp. 139-163
-
-
Segars, A.H.1
Grover, V.2
-
40
-
-
9744271734
-
The contingent effects of management support and task interdependence on successful information systems implementation
-
Sharma, R., & Yetton, P. (2003). The contingent effects of management support and task interdependence on successful information systems implementation. MIS Quarterly, 27(4), 533–555.
-
(2003)
MIS Quarterly
, vol.27
, Issue.4
, pp. 533-555
-
-
Sharma, R.1
Yetton, P.2
-
41
-
-
84985286296
-
Using self-report questionnaires in OB research: A comment on the use of a controversial method
-
Spector, P.E. (1994). Using self-report questionnaires in OB research: A comment on the use of a controversial method. Journal of Organizational Behavior, 15, 385–392.
-
(1994)
Journal of Organizational Behavior
, vol.15
, pp. 385-392
-
-
Spector, P.E.1
-
42
-
-
0000199952
-
Alternative measures of system effectiveness: Associations and implications
-
Srinivasan, A. (1985). Alternative measures of system effectiveness: Associations and implications. MIS Quarterly, 9(3), 243–253.
-
(1985)
MIS Quarterly
, vol.9
, Issue.3
, pp. 243-253
-
-
Srinivasan, A.1
-
43
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub, D.W. (1990). Effective IS security: An empirical study. Information Systems Research, 1(3), 255–276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
44
-
-
13244286108
-
Validating guidelines for IS positivist research
-
Straub, D.W., Boudreau, M.C., & Gefen, D. (2004). Validating guidelines for IS positivist research. Communications of the AIS, 13(24), 380–427.
-
(2004)
Communications of the AIS
, vol.13
, Issue.24
, pp. 380-427
-
-
Straub, D.W.1
Boudreau, M.C.2
Gefen, D.3
-
45
-
-
0003196246
-
Measuring system usage: Implications for IS theory testing
-
Straub, D.W., Limayem, M., & Karahanna-Evaristo, E. (1995). Measuring system usage: Implications for IS theory testing. MIS Quarterly, 41(8), 1328–1342.
-
(1995)
MIS Quarterly
, vol.41
, Issue.8
, pp. 1328-1342
-
-
Straub, D.W.1
Limayem, M.2
Karahanna-Evaristo, E.3
-
46
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations: A feld study
-
Straub, D.W., & Nance, W.D. (1990). Discovering and disciplining computer abuse in organizations: A feld study. MIS Quarterly, 14(1), 45–60.
-
(1990)
MIS Quarterly
, vol.14
, Issue.1
, pp. 45-60
-
-
Straub, D.W.1
Nance, W.D.2
-
47
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D.W., & Welke, R.J. (1998). Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22(4), 441–469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
50
-
-
84970314226
-
Measurement of business economic performance: An examination of method convergency
-
Venkatraman, N., & Ramanujam, V. (1987). Measurement of business economic performance: An examination of method convergency. Journal of Management, 13(1), 109–122.
-
(1987)
Journal of Management
, vol.13
, Issue.1
, pp. 109-122
-
-
Venkatraman, N.1
Ramanujam, V.2
-
52
-
-
84886183445
-
Plugging the leaks in computer security
-
Wasserman, J.J. (1969). Plugging the leaks in computer security. Harvard Business Review, 47(5), 119–129.
-
(1969)
Harvard Business Review
, vol.47
, Issue.5
, pp. 119-129
-
-
Wasserman, J.J.1
-
53
-
-
0000712087
-
Lack of method variance in self-reported affect and perceptions at work: Reality or artifact?
-
Williams, L.J., Cote, J.A., & Buckley, M.R. (1989). Lack of method variance in self-reported affect and perceptions at work: Reality or artifact? Journal of Applied Psychology, 74, 462–468.
-
(1989)
Journal of Applied Psychology
, vol.74
, pp. 462-468
-
-
Williams, L.J.1
Cote, J.A.2
Buckley, M.R.3
-
54
-
-
0002861762
-
Will societal modernization eventually eliminate cross-cultural psychological differences
-
In M.H. Bond (Ed.) Newbury Park, CA: Sage
-
Yang, K.S. (1986). Will societal modernization eventually eliminate cross-cultural psychological differences. In M.H. Bond (Ed.), The cross-cultural challenge to social psychology. Newbury Park, CA: Sage.
-
(1986)
The cross-cultural challenge to social psychology
-
-
Yang, K.S.1
|