4.6 Article

Organizations' Information Security Policy Compliance: Stick or Carrot Approach?

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

What levels of moral reasoning and values explain adherence to information security rules? An empirical study

Liisa Myyry et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)

Article Computer Science, Information Systems

If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security

Scott R. Boss et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)

Article Computer Science, Information Systems

Protection motivation and deterrence: a framework for security policy compliance in organisations

Tejaswini Herath et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)

Review Information Science & Library Science

User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach

John D'Arcy et al.

INFORMATION SYSTEMS RESEARCH (2009)

Article Psychology, Social

Asymmetrical Effects of Reward and Punishment on Attributions of Morality

Tobias Greitemeyer et al.

JOURNAL OF SOCIAL PSYCHOLOGY (2008)

Article Economics

Adding a stick to the carrot? The interaction of bonuses and fines

Ernst Fehr et al.

AMERICAN ECONOMIC REVIEW (2007)

Article Computer Science, Information Systems

Situational influences on ethical decision-making in an IT context

Russell Haines et al.

INFORMATION & MANAGEMENT (2007)

Article Computer Science, Information Systems

A comparison of transaction cost, agency, and knowledge-based predictors of IT outsourcing decisions: A US-Japan cross-cultural field study

Amrit Tiwana et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2007)

Article Social Sciences, Mathematical Methods

Factorial survey methods for studying beliefs and judgments

Guillermina Jasso

SOCIOLOGICAL METHODS & RESEARCH (2006)

Article Economics

The carrot or the stick: Rewards, punishments, and cooperation

J Andreoni et al.

AMERICAN ECONOMIC REVIEW (2003)

Review Information Science & Library Science

Developing and validating trust measures for e-commerce: An integrative typology

DH McKnight et al.

INFORMATION SYSTEMS RESEARCH (2002)

Article Computer Science, Information Systems

Keeping mum as the project goes under: Toward an explanatory model

HJ Smith et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2001)

Article Computer Science, Information Systems

Validation in information systems research: A state-of-the-art assessment

MC Boudreau et al.

MIS QUARTERLY (2001)

Article Computer Science, Information Systems

Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage

R Agarwal et al.

MIS QUARTERLY (2000)

Article Computer Science, Information Systems

A cross-cultural study on escalation of commitment behavior in software projects

M Keil et al.

MIS QUARTERLY (2000)