4.6 Article

Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations

Mikko Siponen et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2014)

Article Information Science & Library Science

Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service

Tejaswini Herath et al.

INFORMATION SYSTEMS JOURNAL (2014)

Article Computer Science, Information Systems

Future directions for behavioral information security research

Robert E. Crossler et al.

COMPUTERS & SECURITY (2013)

Article Computer Science, Information Systems

Health-Care Security Strategies for Data Protection and Regulatory Compliance

Juhee Kwon et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2013)

Article Computer Science, Information Systems

Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements

Xia Zhao et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2013)

Article Computer Science, Information Systems

Organizations' Information Security Policy Compliance: Stick or Carrot Approach?

Yan Chen et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2012)

Article Psychology, Multidisciplinary

Honesty Requires Time (and Lack of Justifications)

Shaul Shalvi et al.

PSYCHOLOGICAL SCIENCE (2012)

Article Management

Equity-Based Incentives and Supply Chain Buy-Back Contracts

Tinglong Dai et al.

DECISION SCIENCES (2012)

Article Business

A SOCIAL CONTEXT MODEL OF ENVY AND SOCIAL UNDERMINING

Michelle K. Duffy et al.

ACADEMY OF MANAGEMENT JOURNAL (2012)

Review Psychology, Applied

WHY EMPLOYEES DO BAD THINGS: MORAL DISENGAGEMENT AND UNETHICAL ORGANIZATIONAL BEHAVIOR

Celia Moore et al.

PERSONNEL PSYCHOLOGY (2012)

Article Computer Science, Hardware & Architecture

Does Deterrence Work in Reducing Information Security Policy Abuse by Employees?

Qing Hu et al.

COMMUNICATIONS OF THE ACM (2011)

Article Computer Science, Information Systems

The influence of the informal social learning environment on information privacy policy compliance efficacy and intention

Merrill Warkentin et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2011)

Article Computer Science, Information Systems

Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model

Ken H. Guo et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2011)

Article Psychology, Experimental

Time and moral judgment

Renata S. Suter et al.

COGNITION (2011)

Article Psychology, Social

Dishonest Deed, Clear Conscience: When Cheating Leads to Moral Disengagement and Motivated Forgetting

Lisa L. Shu et al.

PERSONALITY AND SOCIAL PSYCHOLOGY BULLETIN (2011)

Article Psychology, Applied

Lack of sleep and unethical conduct

Christopher M. Barnes et al.

ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES (2011)

Article Computer Science, Artificial Intelligence

Understanding compliance with internet use policy from the perspective of rational choice theory

Han Li et al.

DECISION SUPPORT SYSTEMS (2010)

Article Computer Science, Information Systems

Team Size, Dispersion, and Social Loafing in Technology-Supported Teams: A Perspective on the Theory of Moral Disengagement

Omar A. Alnuaimi et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2010)

Article Computer Science, Information Systems

Impact of Technostress on End-User Satisfaction and Performance

Monideepa Tarafdar et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2010)

Article Computer Science, Information Systems

Metrics for characterizing the form of security policies

Sanjay Goel et al.

JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2010)

Article Psychology, Applied

Linking Job Demands and Resources to Employee Engagement and Burnout: A Theoretical Extension and Meta-Analytic Test

Eean R. Crawford et al.

JOURNAL OF APPLIED PSYCHOLOGY (2010)

Review Psychology, Applied

Bad Apples, Bad Cases, and Bad Barrels: Meta-Analytic Evidence About Sources of Unethical Decisions at Work

Jennifer J. Kish-Gephart et al.

JOURNAL OF APPLIED PSYCHOLOGY (2010)

Article Computer Science, Information Systems

Protection motivation and deterrence: a framework for security policy compliance in organisations

Tejaswini Herath et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)

Article Psychology, Applied

Coping with challenge and hindrance stressors in teams: Behavioral, cognitive, and affective outcomes

Matthew J. Pearsall et al.

ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES (2009)

Review Information Science & Library Science

User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach

John D'Arcy et al.

INFORMATION SYSTEMS RESEARCH (2009)

Article Psychology, Applied

Moral disengagement in ethical decision making:: A study of antecedents and outcomes

James R. Detert et al.

JOURNAL OF APPLIED PSYCHOLOGY (2008)

Review Information Science & Library Science

The Consequences of Technostress for End Users in Organizations: Conceptual Development and Empirical Validation

T. S. Ragu-Nathan et al.

INFORMATION SYSTEMS RESEARCH (2008)

Article Computer Science, Information Systems

Evaluating information security tradeoffs: Restricting access can interfere with user tasks

Gerald V. Post et al.

COMPUTERS & SECURITY (2007)

Article Computer Science, Information Systems

Hacking into the minds of hackers

Randall Young et al.

INFORMATION SYSTEMS MANAGEMENT (2007)

Review Psychology, Applied

Common method biases in behavioral research: A critical review of the literature and recommended remedies

PM Podsakoff et al.

JOURNAL OF APPLIED PSYCHOLOGY (2003)

Article Psychology, Multidisciplinary

Why don't moral people act morally? Motivational considerations

CD Batson et al.

CURRENT DIRECTIONS IN PSYCHOLOGICAL SCIENCE (2001)