-
4
-
-
84986086702
-
Fear as a strategy: effects and impact within the organization
-
No
-
Appelbaum, S.H., Bregman, M and Moroz, P (1998), “Fear as a strategy: effects and impact within the organization”, Journal of European Industrial Training, Vol. 22 No 2, pp. 113-27
-
(1998)
Journal of European Industrial Training
, vol.22
, Issue.2
, pp. 113-127
-
-
Appelbaum, S.H.1
Bregman, M.2
Moroz, P.3
-
5
-
-
85056007615
-
The deterrence concept in criminology and law
-
Ball, J.C. (1955), “The deterrence concept in criminology and law”, The Journal of Criminal Law, Criminology and Police Science, Vol. 46, pp. 347-54
-
(1955)
The Journal of Criminal Law, Criminology and Police Science
, vol.46
, pp. 347-354
-
-
Ball, J.C.1
-
6
-
-
0004171316
-
-
Second International ed., McGraw-Hill, New York, NY
-
Bartol, K.M. and Martin, D.C. (1994), Management, Second International ed., McGraw-Hill, New York, NY
-
(1994)
Management
-
-
Bartol, K.M.1
Martin, D.C.2
-
8
-
-
0002082632
-
The developmental duality of information systems security
-
Baskerville, R. (1992), “The developmental duality of information systems security”, Journal of Management Systems, Vol. 4 No. 1, pp. 1-12
-
(1992)
Journal of Management Systems
, vol.4
, Issue.1
, pp. 1-12
-
-
Baskerville, R.1
-
9
-
-
0030712013
-
Proactive password checking with decision trees
-
Zurich
-
Bergadano, F., Crispo, B. and Ruffo, C. (1997), “Proactive password checking with decision trees’, Proceedings of the 4th ACM Conference on Computer and Communication Security, Zurich
-
(1997)
Proceedings of the 4th ACM Conference on Computer and Communication Security
-
-
Bergadano, F.1
Crispo, B.2
Ruffo, C.3
-
10
-
-
0004078797
-
-
Houghton Mifflin Company, Boston, MA
-
Bernstein, D.A., Clarke-Stewart, A, Roy, E.J., Sprull, T.K. and Wickens, C.D. (1994), Psychology, Houghton Mifflin Company, Boston, MA
-
(1994)
Psychology
-
-
Bernstein, D.A.1
Clarke-Stewart, A.2
Roy, E.J.3
Sprull, T.K.4
Wickens, C.D.5
-
11
-
-
0031209960
-
The threat from the net [Internet security]
-
No
-
Bishop, M., Cheung, S. and Wee, C. (1997), “The threat from the net [Internet security]”, IEEE Spectrum, Vol. 34 No 8
-
(1997)
IEEE Spectrum
, vol.34
, Issue.8
-
-
Bishop, M.1
Cheung, S.2
Wee, C.3
-
12
-
-
84986021455
-
Crime, punishment and deterrence in Australia: a further empirical investigation
-
Boldman, P.M. and Maultby, C. (1997), “Crime, punishment and deterrence in Australia: a further empirical investigation”, Journal of Social Economics, Vol. 24, pp. 884-901
-
(1997)
Journal of Social Economics
, vol.24
, pp. 884-901
-
-
Boldman, P.M.1
Maultby, C.2
-
13
-
-
0002608856
-
In search of the moral manager
-
March-April
-
Carrol, A.B. (1987), “In search of the moral manager”, Business Horizons, March-April, p. 8
-
(1987)
Business Horizons
, pp. 8
-
-
Carrol, A.B.1
-
15
-
-
0000130004
-
Radical developments in accounting thought
-
Chua, W.F. (1986), “Radical developments in accounting thought”, Accounting Review, Vol. 61 No. 5, pp. 583-98
-
(1986)
Accounting Review
, vol.61
, Issue.5
, pp. 583-598
-
-
Chua, W.F.1
-
16
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
September
-
Davis, F. (1989), “Perceived usefulness, perceived ease of use, and user acceptance of information technology”, MIS Quarterly, Vol. 13 No. 3, September, pp. 319-40
-
(1989)
MIS Quarterly
, vol.13
, Issue.3
, pp. 319-340
-
-
Davis, F.1
-
18
-
-
33845225017
-
The empirical exploration of intrinsic motivational processes
-
in, Berkowitz, L (Ed.), Academic Press
-
Deci, E.L. and Ryan, R.M. (1980), “The empirical exploration of intrinsic motivational processes”, in Berkowitz, L (Ed.), Advances in Experimental Social Psychology, Academic Press, Vol. 13, pp. 39-80
-
(1980)
Advances in Experimental Social Psychology
, vol.13
, pp. 39-80
-
-
Deci, E.L.1
Ryan, R.M.2
-
19
-
-
0003631043
-
-
Plenum Press, New York, NY
-
Deci, E.L. and Ryan, R.M. (1985), Intrinsic Motivation and Self-determination in Human Behaviour, Plenum Press, New York, NY
-
(1985)
Intrinsic Motivation and Self-determination in Human Behaviour
-
-
Deci, E.L.1
Ryan, R.M.2
-
20
-
-
8744307609
-
Integrating OB MOD with cognitive approaches to motivation
-
Fedor, D.B. and Ferris, G.R. (1981), “Integrating OB MOD with cognitive approaches to motivation”, Academy of Management Review, Vol. 6 No. 1, pp. 115-25
-
(1981)
Academy of Management Review
, vol.6
, Issue.1
, pp. 115-125
-
-
Fedor, D.B.1
Ferris, G.R.2
-
21
-
-
0003551671
-
-
Addison-Wesley, Reading, MA
-
Fishbein, M. and Ajzen, I. (1975), Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Addison-Wesley, Reading, MA
-
(1975)
Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research
-
-
Fishbein, M.1
Ajzen, I.2
-
22
-
-
84986713580
-
Asymmetrical effects of rewards and punishment: the case of social loafing
-
George, J.M. (1995), “Asymmetrical effects of rewards and punishment: the case of social loafing”, Journal of Occupational & Organizational Psychology, Vol. 68 No. 4, pp. 327-440
-
(1995)
Journal of Occupational & Organizational Psychology
, vol.68
, Issue.4
, pp. 327-440
-
-
George, J.M.1
-
23
-
-
0018485868
-
Job stress and employee behaviours
-
Gupta, N. and Beehr, T.A. (1979), “Job stress and employee behaviours”, Organizational Behaviour & Human Performance, Vol. 23 No. 3, pp. 373-87
-
(1979)
Organizational Behaviour & Human Performance
, vol.23
, Issue.3
, pp. 373-387
-
-
Gupta, N.1
Beehr, T.A.2
-
24
-
-
0000917858
-
The effect of codes of ethics and personal denial of responsibility on computer abuse judgements and intentions
-
September
-
Harrington, S.J. (1996), “The effect of codes of ethics and personal denial of responsibility on computer abuse judgements and intentions”, MIS Quarterly, Vol. 20 No. 3, September
-
(1996)
MIS Quarterly
, vol.20
, Issue.3
-
-
Harrington, S.J.1
-
25
-
-
0001214077
-
A paradigmatic analysis of contemporary schools of IS development
-
Iivari, J. (1991), “A paradigmatic analysis of contemporary schools of IS development”, European Journal of Information Systems, Vol. 1 No. 4, pp. 249-72
-
(1991)
European Journal of Information Systems
, vol.1
, Issue.4
, pp. 249-272
-
-
Iivari, J.1
-
26
-
-
0030286609
-
Analyzing information systems development: a comparison and analysis of eight IS development approaches
-
Iivari, J. and Hirschheim, R. (1996), “Analyzing information systems development: a comparison and analysis of eight IS development approaches”, Information Systems, Vol. 21 No. 7, pp. 551-75
-
(1996)
Information Systems
, vol.21
, Issue.7
, pp. 551-575
-
-
Iivari, J.1
Hirschheim, R.2
-
27
-
-
0002165187
-
A sociocybernetic framework for the feature analysis of information systems design methodologies
-
in, Olle, T.W., Sol, H.G.,. and, Tully, C.J.,. (Eds), North-Holland, Amsterdam
-
Iivari, J. and Kerola, P. (1983), “A sociocybernetic framework for the feature analysis of information systems design methodologies”, in Olle, T.W., Sol, H.G. and Tully, C.J. (Eds), Information Systems Design Methodologies: A Feature Analysis, North-Holland, Amsterdam, pp. 87-139
-
(1983)
Information Systems Design Methodologies: A Feature Analysis
, pp. 87-139
-
-
Iivari, J.1
Kerola, P.2
-
28
-
-
0032334755
-
A paradigmatic analysis of contrasting information systems development approaches and methodologies
-
Iivari, J, Hirschheim, R and Klein, H.K., (1998), “A paradigmatic analysis of contrasting information systems development approaches and methodologies”, Information Systems Research, Vol. 9 No. 2, pp. 164-93
-
(1998)
Information Systems Research
, vol.9
, Issue.2
, pp. 164-193
-
-
Iivari, J.1
Hirschheim, R.2
Klein, H.K.3
-
29
-
-
0011648740
-
The new classification of research approaches
-
Zemanek, H (Ed.), IFIP, Laxenburg
-
Järvinen, P. (1997), “The new classification of research approaches”, in Zemanek, H (Ed.), The IFIP Pink Summary – 36 Years of IFIP, IFIP, Laxenburg
-
(1997)
The IFIP Pink Summary – 36 Years of IFIP
-
-
Järvinen, P.1
-
33
-
-
0003517608
-
-
Stanford University Press, Stanford, CA
-
Kukathas, C. and Pettit, P. (1990), Rawls – A Theory of Justice and its Critics, Stanford University Press, Stanford, CA
-
(1990)
Rawls – A Theory of Justice and its Critics
-
-
Kukathas, C.1
Pettit, P.2
-
35
-
-
33748735913
-
A group-enhanced ISSI model for secure interconnection of information systems
-
Vienna, and Budapest
-
Leiwo, J. and Heikkuri, S. (1998b), “A group-enhanced ISSI model for secure interconnection of information systems”, Proceedings of the IFIP TC11, 14th International Conference on Information Systems Security (IFIP/Sec'98), Vienna, and Budapest
-
(1998)
Proceedings of the IFIP TC11, 14th International Conference on Information Systems Security (IFIP/Sec'98)
-
-
Leiwo, J.1
Heikkuri, S.2
-
37
-
-
6744260746
-
Information security awareness – selling the cause
-
Singapore, 27-29 May
-
McLean, K. (1992), “Information security awareness – selling the cause”, Proceedings of the IFIP TC11 /Sec'92, Singapore, 27-29 May
-
(1992)
Proceedings of the IFIP TC11 /Sec'92
-
-
McLean, K.1
-
39
-
-
73549114871
-
Predicting user intentions: comparing the technology acceptance model with the theory of planned behaviour
-
Mathieson, K. (1991), “Predicting user intentions: comparing the technology acceptance model with the theory of planned behaviour”, Information Systems Research, Vol. 3 No. 2, pp. 173-91
-
(1991)
Information Systems Research
, vol.3
, Issue.2
, pp. 173-191
-
-
Mathieson, K.1
-
40
-
-
0018543411
-
Password security: a case history
-
Morris, R. and Thompson, K. (1979), “Password security: a case history”, Communication of the ACM, Vol. 22 No. 11, pp. 594-7
-
(1979)
Communication of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
42
-
-
85001840137
-
Inside risks: risks of insiders
-
Issue
-
Neumann, P.G. (1999), “Inside risks: risks of insiders”, Communication of the ACM, Vol. 42 Issue 12, p. 160
-
(1999)
Communication of the ACM
, vol.42
, Issue.12
, pp. 160
-
-
Neumann, P.G.1
-
43
-
-
8744247022
-
Science and epistemic values
-
Niiniluoto, I. (1990), “Science and epistemic values”, Science Studies, Vol. 3 No. 1, pp. 21-5
-
(1990)
Science Studies
, vol.3
, Issue.1
, pp. 21-25
-
-
Niiniluoto, I.1
-
45
-
-
0038562418
-
-
The NIST Handbook, 1995, NIST special publications, October
-
NIST (1995), The NIST Handbook, (1995), An Introduction to Computer Security, NIST special publications, October
-
(1995)
An Introduction to Computer Security
-
-
-
50
-
-
0020391832
-
Effects of leader contingent and noncontingent rewards and punishment behaviours on subordinate performance and satisfaction
-
Podsakoff, P.M., Todor, W.D. and Skov, R. (1982), “Effects of leader contingent and noncontingent rewards and punishment behaviours on subordinate performance and satisfaction”, Academy of Management Journal, Vol. 25 No. 4, pp. 810-21
-
(1982)
Academy of Management Journal
, vol.25
, Issue.4
, pp. 810-821
-
-
Podsakoff, P.M.1
Todor, W.D.2
Skov, R.3
-
55
-
-
0016555241
-
The protection of information in computer systems
-
September
-
Saltzer, J.H. and Schroeder, M.D. (1975), “The protection of information in computer systems”, Proceedings of the IEEE, Vol. 63 No. 1, September
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.1
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
56
-
-
33748733372
-
Integrity mechanism in database management systems
-
in, Abrams, M.D., Jajodia, S and Podell, H.J.,. (Eds), IEEE Computer Society Press, Los Alamitos, CA
-
Sandhu, R. and Jajodia, S. (1995), “Integrity mechanism in database management systems”, in Abrams, M.D., Jajodia, S and Podell, H.J. (Eds), Information Security – An Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, CA
-
(1995)
Information Security – An Integrated Collection of Essays
-
-
Sandhu, R.1
Jajodia, S.2
-
58
-
-
0000486706
-
Further thoughts on punishment in organizations
-
Sims, H.P. (1980), “Further thoughts on punishment in organizations”, Academy of Management Review, Vol. 5 No. 1, pp. 133-8
-
(1980)
Academy of Management Review
, vol.5
, Issue.1
, pp. 133-138
-
-
Sims, H.P.1
-
60
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Issue
-
Siponen, M.T. (2000a), “A conceptual foundation for organizational information security awareness”, Information Management & Computer Security, Vol. 8 Issue 1
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
-
-
Siponen, M.T.1
-
61
-
-
84986153153
-
-
“On the role of human morality in information system security: the problems of descriptivism and non-descriptive foundations”, Beijing
-
Siponen, M.T. (2000b), “On the role of human morality in information system security: the problems of descriptivism and non-descriptive foundations”, 15th International Information Security Conference (IFIP TC11/SEC2000), Beijing
-
(2000)
15th International Information Security Conference (IFIP TC11/SEC2000)
-
-
Siponen, M.T.1
-
62
-
-
0011644488
-
An analysis of the recent IS security development approaches: descriptive and prescriptive implications
-
Dhillon, G. (Ed.), Idea Group
-
Siponen, M.T. (2000c), “An analysis of the recent IS security development approaches: descriptive and prescriptive implications”, in Dhillon, G. (Ed.), Information Security Management – Global Challenges in the Next Millennium, Idea Group
-
(2000)
Information Security Management – Global Challenges in the Next Millennium
-
-
Siponen, M.T.1
-
64
-
-
8744260415
-
Competing against human failing
-
The Global Information Society on the Way to the Next Millennium, SEC, TC11, Vienna
-
Spruit, M.E.M. (1998), “Competing against human failing”, 15th IFIP World Computer Congress, “The Global Information Society on the Way to the Next Millennium”, SEC, TC11, Vienna
-
(1998)
15th IFIP World Computer Congress
-
-
Spruit, M.E.M.1
-
65
-
-
0242453511
-
Promoting security awareness and commitment
-
Spurling, P. (1995), “Promoting security awareness and commitment”, Information Management and Computer Security, Vol. 3 No. 2, pp. 20-6
-
(1995)
Information Management and Computer Security
, vol.3
, Issue.2
, pp. 20-26
-
-
Spurling, P.1
-
66
-
-
8744241162
-
Deterring highly motivated computer abuses: a field experiment in computer security
-
in, Gable, G.G.,. and, Caelli, W.J.,. (Eds), North Holland, Amsterdam
-
Straub, D., Carson, P. and Jones, E. (1992), “Deterring highly motivated computer abuses: a field experiment in computer security”, in Gable, G.G. and Caelli, W.J. (Eds), IT Security: The Need for International Cooperation, North Holland, Amsterdam, pp. 309-24
-
(1992)
IT Security: The Need for International Cooperation
, pp. 309-324
-
-
Straub, D.1
Carson, P.2
Jones, E.3
-
67
-
-
0000280419
-
Effective IS security: an empirical study
-
June
-
Straub, D.W. (1990), “Effective IS security: an empirical study”, Information System Research, Vol. 1 No. 2, June, p. 255-77
-
(1990)
Information System Research
, vol.1
, Issue.2
, pp. 255-277
-
-
Straub, D.W.1
-
68
-
-
0001133137
-
Coping with systems risk: security planning models for management decision making
-
Straub, D.W. and Welke, R.J. (1998), “Coping with systems risk: security planning models for management decision making”, MIS Quarterly, Vol. 22 No. 4, p. 441-64
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-464
-
-
Straub, D.W.1
Welke, R.J.2
-
69
-
-
1242331240
-
Deviancy by bits and bytes
-
in, Finch, J.H.,. and, Dougall, E.G (Eds), Elsevier Science Publisher, Barking
-
Straub, D.W. and Widom, C.P. (1984), Deviancy by bits and bytes”, in Finch, J.H. and Dougall, E.G (Eds), Computer Security: A Global Challenge, Elsevier Science Publisher, Barking
-
(1984)
Computer Security: A Global Challenge
-
-
Straub, D.W.1
Widom, C.P.2
-
71
-
-
0242517401
-
Information security awareness: educating our users effectively
-
Thomson, M.E. and von Solms, R., (1998), “Information security awareness: educating our users effectively”, Information Management & Computer Security, Vol. 6 No. 4, pp. 167-73
-
(1998)
Information Management & Computer Security
, vol.6
, Issue.4
, pp. 167-173
-
-
Thomson, M.E.1
von Solms, R.2
-
72
-
-
0003785118
-
-
2nd ed, T.J. Press, Padstow, Cornwall
-
Warburton, N. (1996), Philosophy: the Basics, 2nd ed., T.J. Press, Padstow, Cornwall
-
(1996)
Philosophy: the Basics
-
-
Warburton, N.1
-
74
-
-
0030554013
-
Misbehavior in organizations: a motivational framework
-
March-April
-
Vardi, Y. and Wiener, Y. (1996), “Misbehavior in organizations: a motivational framework”, Organization Science, Vol. 7 No. 2, March-April, pp. 151-65
-
(1996)
Organization Science
, vol.7
, Issue.2
, pp. 151-165
-
-
Vardi, Y.1
Wiener, Y.2
-
75
-
-
0003555704
-
-
John Wiley & Sons, New York, NY
-
Vroom, V.H. (1964), Work and Motivation, John Wiley & Sons, New York, NY
-
(1964)
Work and Motivation
-
-
Vroom, V.H.1
-
76
-
-
84926001904
-
User-Centered Security
-
ACM New Security, 17-20 September, Lake Arrowhead, CA
-
Zurko, M.E. and Simon, R.T. (1996), “User-Centered Security’, ACM New Security Paradigms Workshop, 17-20 September, Lake Arrowhead, CA
-
(1996)
Paradigms Workshop
-
-
Zurko, M.E.1
Simon, R.T.2
|