Related references
Note: Only part of the references are listed.Organizational science and cybersecurity: abundant opportunities for research at the interface
Reeshad S. Dalal et al.
JOURNAL OF BUSINESS AND PSYCHOLOGY (2022)
Technostress and its influence on employee information security policy compliance
Forough Nasirpouri Shadbad et al.
INFORMATION TECHNOLOGY & PEOPLE (2022)
Examining the role of stress and information security policy design in information security compliance behaviour: An experimental study of in-task behaviour
Simon Trang et al.
COMPUTERS & SECURITY (2021)
The role of self-efficacy on the adoption of information systems security innovations: a meta-analysis assessment
Mumtaz Abdul Hameed et al.
Personal and Ubiquitous Computing (2021)
A meta-analysis of the deterrence theory in security-compliant and security-risk behaviors
Kuang-Ming Kuo et al.
COMPUTERS & SECURITY (2020)
Keeping secure to the end: a long-term perspective to understand employees' consequence-delayed information security violation
Ying Li et al.
BEHAVIOUR & INFORMATION TECHNOLOGY (2019)
Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study
John D'Arcy et al.
INFORMATION SYSTEMS JOURNAL (2019)
Correlating human traits and cyber security behavior intentions
Margaret Gratian et al.
COMPUTERS & SECURITY (2018)
Enhancing security behaviour by supporting the user
Steven Furnell et al.
COMPUTERS & SECURITY (2018)
TOWARD A UNIFIED MODEL OF INFORMATION SECURITY POLICY COMPLIANCE
Gregory D. Moody et al.
MIS QUARTERLY (2018)
The effect of resilience and job stress on information security awareness
Agata McCormac et al.
INFORMATION AND COMPUTER SECURITY (2018)
Examining technostress creators and role stress as potential threats to employees' information security compliance
Inho Hwang et al.
COMPUTERS IN HUMAN BEHAVIOR (2018)
Organizational information security as a complex adaptive system: insights from three agent-based models
A. J. Burns et al.
INFORMATION SYSTEMS FRONTIERS (2017)
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
Allen C. Johnston et al.
MIS QUARTERLY (2017)
Anxiety about electronic data hacking Predictors and relations with digital privacy protection behavior
Jon D. Elhai et al.
INTERNET RESEARCH (2017)
Towards analysing the rationale of information security noncompliance: Devising a Value-Based Compliance analysis method
Ella Kolkowska et al.
JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2017)
Introduction, comparison, and validation of Meta-Essentials: A free and simple tool for meta-analysis
Robert Suurmond et al.
RESEARCH SYNTHESIS METHODS (2017)
Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions
Anderson et al.
MIS QUARTERLY (2017)
Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study
Puhakainen et al.
MIS QUARTERLY (2017)
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
Bulgurcu et al.
MIS QUARTERLY (2017)
Technostress: Technological Antecedents and Implications
Ayyagari et al.
MIS QUARTERLY (2017)
Beyond Deterrence: An Expanded View of Employee Computer Abuse
Robert Willison et al.
MIS QUARTERLY (2017)
Understanding information security stress: Focusing on the type of information security compliance activity
Chunghun Lee et al.
COMPUTERS & SECURITY (2016)
Anxiety about internet hacking: Results from a community sample
Jon D. Elhai et al.
COMPUTERS IN HUMAN BEHAVIOR (2016)
An information security knowledge sharing model in organizations
Nader Sohrabi Safa et al.
COMPUTERS IN HUMAN BEHAVIOR (2016)
Impact of Job Burnout on Satisfaction and Turnover Intention: Do Generational Differences Matter?
Allan Cheng Chieh Lu et al.
JOURNAL OF HOSPITALITY & TOURISM RESEARCH (2016)
Cyberloafing and job burnout: An investigation in the knowledge-intensive sector
Asal Aghaz et al.
COMPUTERS IN HUMAN BEHAVIOR (2016)
Information security conscious care behaviour formation in organizations
Nader Sohrabi Safa et al.
COMPUTERS & SECURITY (2015)
Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies
Paul Benjamin Lowry et al.
INFORMATION SYSTEMS JOURNAL (2015)
Workplace Dignity: Communicating Inherent, Earned, and Remediated Dignity
Kristen Lucas
JOURNAL OF MANAGEMENT STUDIES (2015)
Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations
Mikko Siponen et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2014)
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders
Clay Posey et al.
INFORMATION & MANAGEMENT (2014)
Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective
John D'Arcy et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2014)
Future directions for behavioral information security research
Robert E. Crossler et al.
COMPUTERS & SECURITY (2013)
Motivating IS security compliance: Insights from Habit and Protection Motivation Theory
Anthony Vance et al.
INFORMATION & MANAGEMENT (2012)
Organizations' Information Security Policy Compliance: Stick or Carrot Approach?
Yan Chen et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2012)
Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email
Jingguo Wang et al.
IEEE TRANSACTIONS ON PROFESSIONAL COMMUNICATION (2012)
Does Deterrence Work in Reducing Information Security Policy Abuse by Employees?
Qing Hu et al.
COMMUNICATIONS OF THE ACM (2011)
Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes
Clay Posey et al.
COMPUTERS & SECURITY (2011)
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention
Merrill Warkentin et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2011)
Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies
Jai-Yeol Son
INFORMATION & MANAGEMENT (2011)
Impact of Technostress on End-User Satisfaction and Performance
Monideepa Tarafdar et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2010)
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
Tejaswini Herath et al.
DECISION SUPPORT SYSTEMS (2009)
If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security
Scott R. Boss et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)
The Consequences of Technostress for End Users in Organizations: Conceptual Development and Empirical Validation
T. S. Ragu-Nathan et al.
INFORMATION SYSTEMS RESEARCH (2008)
The impact of technostress on role stress and productivity
Monideepa Tarafdar et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2007)
Analysis of end user security behaviors
JM Stanton et al.
COMPUTERS & SECURITY (2005)
Coping with threat and memory for ambiguous information: Testing the repressive discontinuity hypothesis
M Hock et al.
EMOTION (2004)
The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice
VKG Lim
JOURNAL OF ORGANIZATIONAL BEHAVIOR (2002)