Related references
Note: Only part of the references are listed.Defining organisational information security culture-Perspectives from academia and industry
Adele da Veiga et al.
COMPUTERS & SECURITY (2020)
It ain't my business: a coping perspective on employee effortful security behavior
Zhengchuan Xu et al.
JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT (2019)
Investigating identity fraud management practices in e-tail sector: a systematic review
Zahoor Ahmed Soomro et al.
JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT (2019)
Organizational information security policies: a review and research framework
W. Alec Cram et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2017)
Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations
Siponen et al.
MIS QUARTERLY (2017)
Construct Measurement and Validation Procedures in MIS and Behavioral Research: Integrating New and Existing Techniques
MacKenzie et al.
MIS QUARTERLY (2017)
Defining and identifying dominant information security cultures and subcultures
Adele da Veiga et al.
COMPUTERS & SECURITY (2017)
Shaping intention to resist social engineering through transformational leadership, information security culture and awareness
Waldo Rocha Flores et al.
COMPUTERS & SECURITY (2016)
The impacts of organizational culture on information security culture: a case study
Mincong Tang et al.
INFORMATION TECHNOLOGY & MANAGEMENT (2016)
Improving the information security culture through monitoring and implementation actions illustrated through a case study
Adele da Veiga et al.
COMPUTERS & SECURITY (2015)
The sufficiency of the theory of planned behavior for explaining information security policy compliance
Teodor Sommestad et al.
INFORMATION AND COMPUTER SECURITY (2015)
Information security culture - state-of-the-art review between 2000 and 2013
Fredrik Karlsson et al.
INFORMATION AND COMPUTER SECURITY (2015)
An Inconvenient Truth: Arbitrary Distinctions Between Organizational, Mechanical Turk, and Other Convenience Samples
Richard N. Landers et al.
INDUSTRIAL AND ORGANIZATIONAL PSYCHOLOGY-PERSPECTIVES ON SCIENCE AND PRACTICE (2015)
Design and validation of information security culture framework
Areej AlHogail
COMPUTERS IN HUMAN BEHAVIOR (2015)
Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)
Kathryn Parsons et al.
COMPUTERS & SECURITY (2014)
Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition
Princely Ifinedo
INFORMATION & MANAGEMENT (2014)
Identifying factors of organizational information security management
Abhishek Narain Singh et al.
JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT (2014)
Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It
Paul Benjamin Lowry et al.
IEEE TRANSACTIONS ON PROFESSIONAL COMMUNICATION (2014)
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the US and South Korea
Anat Hovav et al.
INFORMATION & MANAGEMENT (2012)
Hierarchical Latent Variable Models in PLS-SEM: Guidelines for Using Reflective-Formative Type Models
Jan-Michael Becker et al.
LONG RANGE PLANNING (2012)
Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture
Qing Hu et al.
DECISION SCIENCES (2012)
Equity-Based Incentives and Supply Chain Buy-Back Contracts
Tinglong Dai et al.
DECISION SCIENCES (2012)
Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures
Paul Benjamin Lowry et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2011)
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
Ken H. Guo et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2011)
PLS-SEM: INDEED A SILVER BULLET
Joe F. Hair et al.
JOURNAL OF MARKETING THEORY AND PRACTICE (2011)
Information security culture: A management perspective
J. F. Van Niekerk et al.
COMPUTERS & SECURITY (2010)
A framework and assessment instrument for information security culture
A. Da Veiga et al.
COMPUTERS & SECURITY (2010)
Exploring the relationship between organizational culture and software process improvement deployment
Chiao-Ching Shih et al.
INFORMATION & MANAGEMENT (2010)
Organisational security culture: Extending the end-user perspective
A. B. Ruighaver et al.
COMPUTERS & SECURITY (2007)
Exploring organizational culture for information security management
Shuchih Ernest Chang et al.
INDUSTRIAL MANAGEMENT & DATA SYSTEMS (2007)
Information security obedience: a definition
KL Thomson et al.
COMPUTERS & SECURITY (2005)
The role of communication in organisational change
Wim Elving
CORPORATE COMMUNICATIONS (2005)
A framework for the governance of information security
S Posthumus et al.
COMPUTERS & SECURITY (2004)
The 10 deadly sins of information security management
B von Solms et al.
COMPUTERS & SECURITY (2004)
Towards information security behavioural compliance
C Vroom et al.
COMPUTERS & SECURITY (2004)
Common method biases in behavioral research: A critical review of the literature and recommended remedies
PM Podsakoff et al.
JOURNAL OF APPLIED PSYCHOLOGY (2003)
Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model
V Venkatesh
INFORMATION SYSTEMS RESEARCH (2000)