Related references
Note: Only part of the references are listed.Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations
Mikko Siponen et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2014)
Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service
Tejaswini Herath et al.
INFORMATION SYSTEMS JOURNAL (2014)
Future directions for behavioral information security research
Robert E. Crossler et al.
COMPUTERS & SECURITY (2013)
Health-Care Security Strategies for Data Protection and Regulatory Compliance
Juhee Kwon et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2013)
Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements
Xia Zhao et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2013)
Organizations' Information Security Policy Compliance: Stick or Carrot Approach?
Yan Chen et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2012)
Employee Misuse of Information Technology Resources: Testing a Contemporary Deterrence Model
John D'Arcy et al.
DECISION SCIENCES (2012)
Honesty Requires Time (and Lack of Justifications)
Shaul Shalvi et al.
PSYCHOLOGICAL SCIENCE (2012)
Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture
Qing Hu et al.
DECISION SCIENCES (2012)
Equity-Based Incentives and Supply Chain Buy-Back Contracts
Tinglong Dai et al.
DECISION SCIENCES (2012)
A SOCIAL CONTEXT MODEL OF ENVY AND SOCIAL UNDERMINING
Michelle K. Duffy et al.
ACADEMY OF MANAGEMENT JOURNAL (2012)
WHY EMPLOYEES DO BAD THINGS: MORAL DISENGAGEMENT AND UNETHICAL ORGANIZATIONAL BEHAVIOR
Celia Moore et al.
PERSONNEL PSYCHOLOGY (2012)
Does Deterrence Work in Reducing Information Security Policy Abuse by Employees?
Qing Hu et al.
COMMUNICATIONS OF THE ACM (2011)
Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes
Clay Posey et al.
COMPUTERS & SECURITY (2011)
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention
Merrill Warkentin et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2011)
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
Ken H. Guo et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2011)
Dishonest Deed, Clear Conscience: When Cheating Leads to Moral Disengagement and Motivated Forgetting
Lisa L. Shu et al.
PERSONALITY AND SOCIAL PSYCHOLOGY BULLETIN (2011)
Lack of sleep and unethical conduct
Christopher M. Barnes et al.
ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES (2011)
Understanding compliance with internet use policy from the perspective of rational choice theory
Han Li et al.
DECISION SUPPORT SYSTEMS (2010)
Team Size, Dispersion, and Social Loafing in Technology-Supported Teams: A Perspective on the Theory of Moral Disengagement
Omar A. Alnuaimi et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2010)
Impact of Technostress on End-User Satisfaction and Performance
Monideepa Tarafdar et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2010)
Metrics for characterizing the form of security policies
Sanjay Goel et al.
JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2010)
Linking Job Demands and Resources to Employee Engagement and Burnout: A Theoretical Extension and Meta-Analytic Test
Eean R. Crawford et al.
JOURNAL OF APPLIED PSYCHOLOGY (2010)
Bad Apples, Bad Cases, and Bad Barrels: Meta-Analytic Evidence About Sources of Unethical Decisions at Work
Jennifer J. Kish-Gephart et al.
JOURNAL OF APPLIED PSYCHOLOGY (2010)
Protection motivation and deterrence: a framework for security policy compliance in organisations
Tejaswini Herath et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)
Can Good Stressors Spark Bad Behaviors? The Mediating Role of Emotions in Links of Challenge and Hindrance Stressors With Citizenship and Counterproductive Behaviors
Jessica B. Rodell et al.
JOURNAL OF APPLIED PSYCHOLOGY (2009)
Coping with challenge and hindrance stressors in teams: Behavioral, cognitive, and affective outcomes
Matthew J. Pearsall et al.
ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES (2009)
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
John D'Arcy et al.
INFORMATION SYSTEMS RESEARCH (2009)
A meta-analysis of work demand stressors and job performance: Examining main and moderating effects
Simona Gilboa et al.
PERSONNEL PSYCHOLOGY (2008)
Moral disengagement in ethical decision making:: A study of antecedents and outcomes
James R. Detert et al.
JOURNAL OF APPLIED PSYCHOLOGY (2008)
The Consequences of Technostress for End Users in Organizations: Conceptual Development and Empirical Validation
T. S. Ragu-Nathan et al.
INFORMATION SYSTEMS RESEARCH (2008)
Evaluating information security tradeoffs: Restricting access can interfere with user tasks
Gerald V. Post et al.
COMPUTERS & SECURITY (2007)
Differential challenge stressor-hindrance stressor relationships with job attitudes, turnover intentions, turnover, and withdrawal behavior: A meta-analysis
Nathan P. Podsakoff et al.
JOURNAL OF APPLIED PSYCHOLOGY (2007)
Hacking into the minds of hackers
Randall Young et al.
INFORMATION SYSTEMS MANAGEMENT (2007)
Common method biases in behavioral research: A critical review of the literature and recommended remedies
PM Podsakoff et al.
JOURNAL OF APPLIED PSYCHOLOGY (2003)
A critical review of construct indicators and measurement model misspecification in marketing and consumer research
CB Jarvis et al.
JOURNAL OF CONSUMER RESEARCH (2003)
The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice
VKG Lim
JOURNAL OF ORGANIZATIONAL BEHAVIOR (2002)
Why don't moral people act morally? Motivational considerations
CD Batson et al.
CURRENT DIRECTIONS IN PSYCHOLOGICAL SCIENCE (2001)