4.5 Article

Factors influencing the information security behaviour of IT employees

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

TOWARD A UNIFIED MODEL OF INFORMATION SECURITY POLICY COMPLIANCE

Gregory D. Moody et al.

MIS QUARTERLY (2018)

Article Computer Science, Information Systems

An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric

Allen C. Johnston et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations

Siponen et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Fear Appeals and Information Security Behaviors: An Empirical Study

Johnston et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Beyond Deterrence: An Expanded View of Employee Computer Abuse

Robert Willison et al.

MIS QUARTERLY (2017)

Article Information Science & Library Science

The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness

Jack Shih-Chieh Hsu et al.

INFORMATION SYSTEMS RESEARCH (2015)

Article Computer Science, Information Systems

Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition

Princely Ifinedo

INFORMATION & MANAGEMENT (2014)

Article Computer Science, Information Systems

Employees' adherence to information security policies: An exploratory field study

Mikko Siponen et al.

INFORMATION & MANAGEMENT (2014)

Article Computer Science, Information Systems

New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs

Mikko Siponen et al.

INFORMATION & MANAGEMENT (2012)

Article Computer Science, Information Systems

Motivating IS security compliance: Insights from Habit and Protection Motivation Theory

Anthony Vance et al.

INFORMATION & MANAGEMENT (2012)

Article Computer Science, Information Systems

IS Security Policy Violations: A Rational Choice Perspective

Anthony Vance et al.

JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING (2012)

Article Computer Science, Information Systems

Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies

Jai-Yeol Son

INFORMATION & MANAGEMENT (2011)

Article Computer Science, Artificial Intelligence

Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness

Tejaswini Herath et al.

DECISION SUPPORT SYSTEMS (2009)

Article Computer Science, Artificial Intelligence

Studying users' computer security behavior: A health belief perspective

Boon-Yuen Ng et al.

DECISION SUPPORT SYSTEMS (2009)

Article Computer Science, Information Systems

Threat or coping appraisal: determinants of SMB executives' decision to adopt anti-malware software

Younghwa Lee et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)

Article Computer Science, Information Systems

Protection motivation and deterrence: a framework for security policy compliance in organisations

Tejaswini Herath et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)

Review Information Science & Library Science

User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach

John D'Arcy et al.

INFORMATION SYSTEMS RESEARCH (2009)

Article Psychology, Multidisciplinary

Security lapses and the omission of information security measures: A threat control model and empirical test

Michael Workman et al.

COMPUTERS IN HUMAN BEHAVIOR (2008)

Article Computer Science, Information Systems

Opportunities for computer crime: considering systems risk from a criminological perspective

Robert Willison et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2006)

Review Psychology, Applied

Common method biases in behavioral research: A critical review of the literature and recommended remedies

PM Podsakoff et al.

JOURNAL OF APPLIED PSYCHOLOGY (2003)

Article Information Science & Library Science

An integrative study of information systems security effectiveness

A Kankanhalli et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2003)

Article Public, Environmental & Occupational Health

Protection motivation and risk communication

K Neuwirth et al.

RISK ANALYSIS (2000)

Article Psychology, Social

Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory

S Milne et al.

JOURNAL OF APPLIED SOCIAL PSYCHOLOGY (2000)