4.5 Article

Deterrent effects of punishment and training on insider security threats: a field experiment on phishing attacks

Related references

Note: Only part of the references are listed.
Article Telecommunications

Defending against phishing attacks: taxonomy of methods, current issues and future directions

B. B. Gupta et al.

TELECOMMUNICATION SYSTEMS (2018)

Article Computer Science, Information Systems

Sanction severity and employees' information security policy compliance: Investigating mediating, moderating, and control variables

Xiaofeng Chen et al.

INFORMATION & MANAGEMENT (2018)

Article Computer Science, Information Systems

Self-control, organizational context, and rational choice in Internet abuses at work

Han Li et al.

INFORMATION & MANAGEMENT (2018)

Article Computer Science, Information Systems

TOWARD A UNIFIED MODEL OF INFORMATION SECURITY POLICY COMPLIANCE

Gregory D. Moody et al.

MIS QUARTERLY (2018)

Review Computer Science, Information Systems

Organizational information security policies: a review and research framework

W. Alec Cram et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2017)

Article Computer Science, Information Systems

Training to Mitigate Phishing Attacks Using Mindfulness Techniques

Matthew L. Jensen et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2017)

Article Health Care Sciences & Services

A Deterrence Approach to Regulate Nurses' Compliance with Electronic Medical Records Privacy Policy

Kuang-Ming Kuo et al.

JOURNAL OF MEDICAL SYSTEMS (2017)

Article Computer Science, Information Systems

Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study

Puhakainen et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Spear phishing in organisations explained

Jan-Willem Bullee et al.

INFORMATION AND COMPUTER SECURITY (2017)

Article Industrial Relations & Labor

The State of Transfer of Training Research: Moving Toward More Consumer-Centric Inquiry

Timothy T. Baldwin et al.

HUMAN RESOURCE DEVELOPMENT QUARTERLY (2017)

Article Computer Science, Information Systems

Dispositional and situational factors: influences on information security policy violations

Allen C. Johnston et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2016)

Article Computer Science, Cybernetics

Why phishing still works: User strategies for combating phishing attacks

Mohamed Alsharnouby et al.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2015)

Article Computer Science, Interdisciplinary Applications

The human factor in learning design, research, policy, and practice

Piers MacLean et al.

INTERNATIONAL JOURNAL OF INFORMATION AND LEARNING TECHNOLOGY (2015)

Article Computer Science, Information Systems

Employees' adherence to information security policies: An exploratory field study

Mikko Siponen et al.

INFORMATION & MANAGEMENT (2014)

Review Management

Information security awareness and behavior: a theory-based literature review

Benedikt Lebek et al.

MANAGEMENT RESEARCH REVIEW (2014)

Article Information Science & Library Science

Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance

Ryan T. Wright et al.

INFORMATION SYSTEMS RESEARCH (2014)

Article Computer Science, Cybernetics

Phishing for phishing awareness

K. Jansson et al.

BEHAVIOUR & INFORMATION TECHNOLOGY (2013)

Article Medical Laboratory Technology

The Chi-square test of independence

Mary L. McHugh

BIOCHEMIA MEDICA (2013)

Article Computer Science, Hardware & Architecture

The State of Phishing Attacks

Jason Hong

COMMUNICATIONS OF THE ACM (2012)

Article Computer Science, Information Systems

Organizations' Information Security Policy Compliance: Stick or Carrot Approach?

Yan Chen et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2012)

Article Computer Science, Artificial Intelligence

Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model

Arun Vishwanath et al.

DECISION SUPPORT SYSTEMS (2011)

Article Computer Science, Information Systems

Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies

Jai-Yeol Son

INFORMATION & MANAGEMENT (2011)

Article Computer Science, Information Systems

Teaching Johnny Not to Fall for Phish

Ponnurangam Kumaraguru et al.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2010)

Article Computer Science, Hardware & Architecture

Compliance with Information Security Policies: An Empirical Investigation

Mikko Siponen et al.

COMPUTER (2010)

Article Computer Science, Information Systems

The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived

Ryan T. Wright et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2010)

Article Business

Transfer of Training: A Meta-Analytic Review

Brian D. Blume et al.

JOURNAL OF MANAGEMENT (2010)

Article Computer Science, Cybernetics

The amplification effects of procedural justice on a threat control model of information systems security behaviours

Michael Workman et al.

BEHAVIOUR & INFORMATION TECHNOLOGY (2009)

Article Computer Science, Artificial Intelligence

Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness

Tejaswini Herath et al.

DECISION SUPPORT SYSTEMS (2009)

Editorial Material Computer Science, Information Systems

Behavioral and policy issues in information systems security: the insider threat

Merrill Warkentin et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)

Article Criminology & Penology

Rational Choice, Agency and Thoughtfully Reflective Decision Making: The Short and Long-Term Consequences of Making Good Choices

Ray Paternoster et al.

JOURNAL OF QUANTITATIVE CRIMINOLOGY (2009)

Review Information Science & Library Science

User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach

John D'Arcy et al.

INFORMATION SYSTEMS RESEARCH (2009)

Review Business

Transfer of training: A review and new insights

Eddie W. L. Cheng et al.

INTERNATIONAL JOURNAL OF MANAGEMENT REVIEWS (2008)

Article Psychology, Multidisciplinary

Security lapses and the omission of information security measures: A threat control model and empirical test

Michael Workman et al.

COMPUTERS IN HUMAN BEHAVIOR (2008)

Review Psychology, Applied

The relationship of age to ten dimensions of job performance

Thomas W. H. Ng et al.

JOURNAL OF APPLIED PSYCHOLOGY (2008)

Review Economics

Culture rules: The foundations of the rule of law and other norms of governance

Amir N. Licht et al.

JOURNAL OF COMPARATIVE ECONOMICS (2007)

Article Computer Science, Information Systems

Phishing for user security awareness

Ronald C. Dodge et al.

COMPUTERS & SECURITY (2007)

Article Computer Science, Information Systems

Punishment and ethics deterrents: A study of insider security contravention

Michael Workman et al.

JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY (2007)

Article Computer Science, Information Systems

The insider threat to information systems and the effectiveness of ISO17799

M Theoharidou et al.

COMPUTERS & SECURITY (2005)

Article Psychology, Applied

A dynamic, multi-level model of culture: From the micro level of the individual to the macro level of a global culture

M Erez et al.

APPLIED PSYCHOLOGY-AN INTERNATIONAL REVIEW-PSYCHOLOGIE APPLIQUEE-REVUE INTERNATIONALE (2004)

Review Psychology, Applied

Common method biases in behavioral research: A critical review of the literature and recommended remedies

PM Podsakoff et al.

JOURNAL OF APPLIED PSYCHOLOGY (2003)

Article Education & Educational Research

An introduction to logistic regression analysis and reporting

CYJ Peng et al.

JOURNAL OF EDUCATIONAL RESEARCH (2002)

Article Industrial Relations & Labor

A review of transfer of training studies in the past decade

EWL Cheng et al.

PERSONNEL REVIEW (2001)

Review Psychology, Applied

Toward an integrative theory of training motivation: A meta-analytic path analysis of 20 years of research

JA Colquitt et al.

JOURNAL OF APPLIED PSYCHOLOGY (2000)