4.6 Article

A neo-institutional perspective on the establishment of information security knowledge sharing practices

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

ETGuard: Detecting D2D attacks using wireless Evil Twins

Vineeta Jain et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Information Systems

Key elements of an information security culture in organisations

Frans Nel et al.

INFORMATION AND COMPUTER SECURITY (2019)

Review Business

When to use and how to report the results of PLS-SEM

Joseph F. Hair et al.

EUROPEAN BUSINESS REVIEW (2019)

Article Computer Science, Information Systems

A LONGITUDINAL STUDY OF UNAUTHORIZED ACCESS ATTEMPTS ON INFORMATION SYSTEMS: THE ROLE OF OPPORTUNITY CONTEXTS

Jingguo Wang et al.

MIS QUARTERLY (2019)

Article Computer Science, Information Systems

Sanction severity and employees' information security policy compliance: Investigating mediating, moderating, and control variables

Xiaofeng Chen et al.

INFORMATION & MANAGEMENT (2018)

Article Computer Science, Information Systems

TOWARD A UNIFIED MODEL OF INFORMATION SECURITY POLICY COMPLIANCE

Gregory D. Moody et al.

MIS QUARTERLY (2018)

Article Hospitality, Leisure, Sport & Tourism

Methods for modelling reflective-formative second order constructs in PLS: An application to online travel shopping

Paulo Duarte et al.

JOURNAL OF HOSPITALITY AND TOURISM TECHNOLOGY (2018)

Article Computer Science, Information Systems

An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric

Allen C. Johnston et al.

MIS QUARTERLY (2017)

Editorial Material Computer Science, Information Systems

Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda

Paul Benjamin Lowry et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2017)

Article Computer Science, Information Systems

Determinants of early conformance with information security policies

France Belanger et al.

INFORMATION & MANAGEMENT (2017)

Article Computer Science, Information Systems

User Participation in Information Systems Security Risk Management

Spears et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations

Siponen et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study

Puhakainen et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Fear Appeals and Information Security Behaviors: An Empirical Study

Johnston et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

The role of the chief information security officer in the management of IT security

Erastus Karanja

INFORMATION AND COMPUTER SECURITY (2017)

Article Computer Science, Information Systems

Can perceptual differences account for enigmatic information security behaviour in an organisation?

W. D. Kearney et al.

COMPUTERS & SECURITY (2016)

Article Computer Science, Information Systems

Information system security commitment: A study of external influences on senior management

Kevin A. Barton et al.

COMPUTERS & SECURITY (2016)

Article Computer Science, Information Systems

Information security policy compliance model in organizations

Nader Sohrabi Safa et al.

COMPUTERS & SECURITY (2016)

Article Computer Science, Artificial Intelligence

Continuance of protective security behavior: A longitudinal study

Merrill Warkentin et al.

DECISION SUPPORT SYSTEMS (2016)

Article Computer Science, Information Systems

Applying institutional theory to the adoption of electronic health records in the US

Susan A. Sherer et al.

INFORMATION & MANAGEMENT (2016)

Article Computer Science, Information Systems

The impact of legitimacy-based motives on IS adoption success: An institutional theory perspective

Katharina Krell et al.

INFORMATION & MANAGEMENT (2016)

Article Psychology, Multidisciplinary

An information security knowledge sharing model in organizations

Nader Sohrabi Safa et al.

COMPUTERS IN HUMAN BEHAVIOR (2016)

Article Business

Bootstrapping and PLS-SEM: A step-by-step guide to get more out of your bootstrap results

Sandra Streukens et al.

EUROPEAN MANAGEMENT JOURNAL (2016)

Article Business

A new criterion for assessing discriminant validity in variance-based structural equation modeling

Jorg Henseler et al.

JOURNAL OF THE ACADEMY OF MARKETING SCIENCE (2015)

Article Computer Science, Information Systems

Common Method Bias in PLS-SEM: A Full Collinearity Assessment Approach

Ned Kock

INTERNATIONAL JOURNAL OF E-COLLABORATION (2015)

Article Computer Science, Information Systems

Evaluation model for knowledge sharing in information security professional virtual community

Alireza Tamjidyamcholo et al.

COMPUTERS & SECURITY (2014)

Article Computer Science, Information Systems

PROACTIVE VERSUS REACTIVE SECURITY INVESTMENTS IN THE HEALTHCARE SECTOR

Juhee Kwon et al.

MIS QUARTERLY (2014)

Article Computer Science, Information Systems

Future directions for behavioral information security research

Robert E. Crossler et al.

COMPUTERS & SECURITY (2013)

Review Management

Extending the use of institutional theory in operations and supply chain management research Review and research suggestions

Katri Kauppi

INTERNATIONAL JOURNAL OF OPERATIONS & PRODUCTION MANAGEMENT (2013)

Article Management

Equity-Based Incentives and Supply Chain Buy-Back Contracts

Tinglong Dai et al.

DECISION SCIENCES (2012)

Article Business

PLS-SEM: INDEED A SILVER BULLET

Joe F. Hair et al.

JOURNAL OF MARKETING THEORY AND PRACTICE (2011)

Article Computer Science, Information Systems

A framework and assessment instrument for information security culture

A. Da Veiga et al.

COMPUTERS & SECURITY (2010)

Article Political Science

Escape from the Iron Cage? Organizational Change and Isomorphic Pressures in the Public Sector

Rachel Ashworth et al.

JOURNAL OF PUBLIC ADMINISTRATION RESEARCH AND THEORY (2009)

Article Computer Science, Information Systems

Trust and Electronic Government Success: An Empirical Study

Thompson S. H. Teo et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2008)

Article Business

The adoption of internet banking: An institutional theory perspective

Weihua Shi et al.

JOURNAL OF FINANCIAL SERVICES MARKETING (2008)

Article Computer Science, Information Systems

The role of external and internal influences on information systems security - a neo-institutional perspective

Qing Hu et al.

JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2007)

Article Computer Science, Information Systems

Information Security governance: COBIT or ISO 17799 or both?

B von Solms

COMPUTERS & SECURITY (2005)

Article Computer Science, Hardware & Architecture

Enemy at the gate: Threats to information security

ME Whitman

COMMUNICATIONS OF THE ACM (2003)

Article Computer Science, Information Systems

Predicting intention to adopt interorganizational linkages: An institutional perspective

HH Teo et al.

MIS QUARTERLY (2003)

Article Computer Science, Information Systems

Shaping up for e-commerce: Institutional enablers of the organizational assimilation of Web technologies

D Chatterjee et al.

MIS QUARTERLY (2002)

Review Computer Science, Information Systems

Knowledge management: An organizational capabilities perspective

AH Gold et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2001)