Related references
Note: Only part of the references are listed.Defending against phishing attacks: taxonomy of methods, current issues and future directions
B. B. Gupta et al.
TELECOMMUNICATION SYSTEMS (2018)
Sanction severity and employees' information security policy compliance: Investigating mediating, moderating, and control variables
Xiaofeng Chen et al.
INFORMATION & MANAGEMENT (2018)
Self-control, organizational context, and rational choice in Internet abuses at work
Han Li et al.
INFORMATION & MANAGEMENT (2018)
TOWARD A UNIFIED MODEL OF INFORMATION SECURITY POLICY COMPLIANCE
Gregory D. Moody et al.
MIS QUARTERLY (2018)
Organizational information security policies: a review and research framework
W. Alec Cram et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2017)
Training to Mitigate Phishing Attacks Using Mindfulness Techniques
Matthew L. Jensen et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2017)
A Deterrence Approach to Regulate Nurses' Compliance with Electronic Medical Records Privacy Policy
Kuang-Ming Kuo et al.
JOURNAL OF MEDICAL SYSTEMS (2017)
Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study
Puhakainen et al.
MIS QUARTERLY (2017)
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
Bulgurcu et al.
MIS QUARTERLY (2017)
Spear phishing in organisations explained
Jan-Willem Bullee et al.
INFORMATION AND COMPUTER SECURITY (2017)
Uncovering curvilinearity in the organizational tenure-job performance relationship A moderated mediation model of continuance commitment and motivational job characteristics
Nishant Uppal
PERSONNEL REVIEW (2017)
An integrative model of information security policy compliance with psychological contract: Examining a bilateral perspective
JinYoung Han et al.
COMPUTERS & SECURITY (2017)
The State of Transfer of Training Research: Moving Toward More Consumer-Centric Inquiry
Timothy T. Baldwin et al.
HUMAN RESOURCE DEVELOPMENT QUARTERLY (2017)
Dispositional and situational factors: influences on information security policy violations
Allen C. Johnston et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2016)
Why phishing still works: User strategies for combating phishing attacks
Mohamed Alsharnouby et al.
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2015)
Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies
Paul Benjamin Lowry et al.
INFORMATION SYSTEMS JOURNAL (2015)
The human factor in learning design, research, policy, and practice
Piers MacLean et al.
INTERNATIONAL JOURNAL OF INFORMATION AND LEARNING TECHNOLOGY (2015)
Employees' adherence to information security policies: An exploratory field study
Mikko Siponen et al.
INFORMATION & MANAGEMENT (2014)
Information security awareness and behavior: a theory-based literature review
Benedikt Lebek et al.
MANAGEMENT RESEARCH REVIEW (2014)
Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance
Ryan T. Wright et al.
INFORMATION SYSTEMS RESEARCH (2014)
Phishing for phishing awareness
K. Jansson et al.
BEHAVIOUR & INFORMATION TECHNOLOGY (2013)
The Chi-square test of independence
Mary L. McHugh
BIOCHEMIA MEDICA (2013)
The State of Phishing Attacks
Jason Hong
COMMUNICATIONS OF THE ACM (2012)
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the US and South Korea
Anat Hovav et al.
INFORMATION & MANAGEMENT (2012)
Organizations' Information Security Policy Compliance: Stick or Carrot Approach?
Yan Chen et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2012)
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
Arun Vishwanath et al.
DECISION SUPPORT SYSTEMS (2011)
Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies
Jai-Yeol Son
INFORMATION & MANAGEMENT (2011)
Age as moderator of the relationship of proactive personality with training motivation, perceived career development from training, and training behavioral intentions
Marilena Bertolino et al.
JOURNAL OF ORGANIZATIONAL BEHAVIOR (2011)
Teaching Johnny Not to Fall for Phish
Ponnurangam Kumaraguru et al.
ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2010)
Compliance with Information Security Policies: An Empirical Investigation
Mikko Siponen et al.
COMPUTER (2010)
The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived
Ryan T. Wright et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2010)
Transfer of Training: A Meta-Analytic Review
Brian D. Blume et al.
JOURNAL OF MANAGEMENT (2010)
The amplification effects of procedural justice on a threat control model of information systems security behaviours
Michael Workman et al.
BEHAVIOUR & INFORMATION TECHNOLOGY (2009)
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
Tejaswini Herath et al.
DECISION SUPPORT SYSTEMS (2009)
Behavioral and policy issues in information systems security: the insider threat
Merrill Warkentin et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)
Rational Choice, Agency and Thoughtfully Reflective Decision Making: The Short and Long-Term Consequences of Making Good Choices
Ray Paternoster et al.
JOURNAL OF QUANTITATIVE CRIMINOLOGY (2009)
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
John D'Arcy et al.
INFORMATION SYSTEMS RESEARCH (2009)
Transfer of training: A review and new insights
Eddie W. L. Cheng et al.
INTERNATIONAL JOURNAL OF MANAGEMENT REVIEWS (2008)
Security lapses and the omission of information security measures: A threat control model and empirical test
Michael Workman et al.
COMPUTERS IN HUMAN BEHAVIOR (2008)
The relationship of age to ten dimensions of job performance
Thomas W. H. Ng et al.
JOURNAL OF APPLIED PSYCHOLOGY (2008)
Culture rules: The foundations of the rule of law and other norms of governance
Amir N. Licht et al.
JOURNAL OF COMPARATIVE ECONOMICS (2007)
Phishing for user security awareness
Ronald C. Dodge et al.
COMPUTERS & SECURITY (2007)
Punishment and ethics deterrents: A study of insider security contravention
Michael Workman et al.
JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY (2007)
The insider threat to information systems and the effectiveness of ISO17799
M Theoharidou et al.
COMPUTERS & SECURITY (2005)
A dynamic, multi-level model of culture: From the micro level of the individual to the macro level of a global culture
M Erez et al.
APPLIED PSYCHOLOGY-AN INTERNATIONAL REVIEW-PSYCHOLOGIE APPLIQUEE-REVUE INTERNATIONALE (2004)
Common method biases in behavioral research: A critical review of the literature and recommended remedies
PM Podsakoff et al.
JOURNAL OF APPLIED PSYCHOLOGY (2003)
A model of involvement in work-related learning and development activity: The effects of individual, situational, motivational, and age variables
TJ Maurer et al.
JOURNAL OF APPLIED PSYCHOLOGY (2003)
An introduction to logistic regression analysis and reporting
CYJ Peng et al.
JOURNAL OF EDUCATIONAL RESEARCH (2002)
Affective, continuance, and normative commitment to the organization: A meta-analysis of antecedents, correlates, and consequences
JP Meyer et al.
JOURNAL OF VOCATIONAL BEHAVIOR (2002)
A review of transfer of training studies in the past decade
EWL Cheng et al.
PERSONNEL REVIEW (2001)
Toward an integrative theory of training motivation: A meta-analytic path analysis of 20 years of research
JA Colquitt et al.
JOURNAL OF APPLIED PSYCHOLOGY (2000)