4.6 Article

Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Information Science & Library Science

Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study

John D'Arcy et al.

INFORMATION SYSTEMS JOURNAL (2019)

Article Computer Science, Information Systems

Factors That Influence Employees' Security Policy Compliance: An Awareness-Motivation-Capability Perspective

Xiaofeng Chen et al.

JOURNAL OF COMPUTER INFORMATION SYSTEMS (2018)

Article Computer Science, Information Systems

Taking “Fun and Games” Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM)

Paul Lowry et al.

Journal of the Association for Information Systems (2018)

Article Computer Science, Information Systems

A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research

Robert Willison et al.

JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2018)

Article Computer Science, Information Systems

An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric

Allen C. Johnston et al.

MIS QUARTERLY (2017)

Editorial Material Computer Science, Information Systems

Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda

Paul Benjamin Lowry et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2017)

Article Computer Science, Information Systems

Using IT Design to Prevent Cyberbullying

Paul Benjamin Lowry et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2017)

Article Computer Science, Information Systems

Training to Mitigate Phishing Attacks Using Mindfulness Techniques

Matthew L. Jensen et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2017)

Article Computer Science, Information Systems

A Video-Based Screening System for Automated Risk Assessment Using Nuanced Facial Features

Steven J. Pentland et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2017)

Article Computer Science, Information Systems

CREATING HIGH-VALUE REAL-WORLD IMPACT THROUGH SYSTEMATIC PROGRAMS OF RESEARCH

Jay F. Nunamaker et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Toward Meaningful Engagement: A Framework for Design and Research of Gamified Information Systems

De Liu et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Detecting Fake Websites: The Contribution of Statistical Learning Theory

Abbasi et al.

MIS QUARTERLY (2017)

Article Computer Science, Information Systems

Beyond Deterrence: An Expanded View of Employee Computer Abuse

Robert Willison et al.

MIS QUARTERLY (2017)

Article Information Science & Library Science

Coping Responses in Phishing Detection: An Investigation of Antecedents and Consequences

Jingguo Wang et al.

INFORMATION SYSTEMS RESEARCH (2017)

Article Computer Science, Information Systems

The inner and the outer model in explanatory design theory: the case of designing electronic feedback systems

Bjoern Niehaves et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2016)

Article Psychology, Biological

Close games versus blowouts: Optimal challenge reinforces one's intrinsic motivation to win

Liang Meng et al.

INTERNATIONAL JOURNAL OF PSYCHOPHYSIOLOGY (2016)

Article Computer Science, Information Systems

Overconfidence in Phishing Email Detection

Jingguo Wang et al.

JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2016)

Article Business, Finance

Applying Basic Gamification Techniques to IT Compliance Training: Evidence from the Lab and Field

Ryan J. E. W. Baxter et al.

JOURNAL OF INFORMATION SYSTEMS (2016)

Article Business

THINKING ABOUT U: THEORIZING AND TESTING U- AND INVERTED U-SHAPED RELATIONSHIPS IN STRATEGY RESEARCH

Richard F. J. Haans et al.

STRATEGIC MANAGEMENT JOURNAL (2016)

Article Education & Educational Research

Student engagement as a function of environmental complexity in high school classrooms

David J. Shernoff et al.

LEARNING AND INSTRUCTION (2016)

Article Computer Science, Information Systems

The Last Research Mile: Achieving Both Rigor and Relevance in Information Systems Research

Jay F. Nunamaker et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2015)

Article Computer Science, Information Systems

The Impact of Organizational Commitment on Insiders' Motivation to Protect Organizational Information Assets

Clay Posey et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2015)

Article Computer Science, Information Systems

Proposing the Multimotive Information Systems Continuance Model (MISC) to Better Explain End-User System Evaluations and Continuance Intentions

Paul Benjamin Lowry et al.

JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS (2015)

Article Information Science & Library Science

The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness

Jack Shih-Chieh Hsu et al.

INFORMATION SYSTEMS RESEARCH (2015)

Article Computer Science, Information Systems

Shadow IT - A view from behind the curtain

Mario Silic et al.

COMPUTERS & SECURITY (2014)

Article Computer Science, Information Systems

Enhancing User-Game Engagement Through Software Gaming Elements

Mengxiang Li et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2014)

Article Computer Science, Information Systems

Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals

Nathan W. Twyman et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2014)

Article Information Science & Library Science

A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research

Weiyin Hong et al.

INFORMATION SYSTEMS RESEARCH (2014)

Article Computer Science, Interdisciplinary Applications

Gamifying learning experiences: Practical implications and outcomes

Adrian Dominguez et al.

COMPUTERS & EDUCATION (2013)

Article Computer Science, Information Systems

Future directions for behavioral information security research

Robert E. Crossler et al.

COMPUTERS & SECURITY (2013)

Article Computer Science, Information Systems

Using Accountability to Reduce Access Policy Violations in Information Systems

Anthony Vance et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2013)

Article Computer Science, Information Systems

POSITIONING AND PRESENTING DESIGN SCIENCE RESEARCH FOR MAXIMUM IMPACT

Shirley Gregor et al.

MIS QUARTERLY (2013)

Article Computer Science, Interdisciplinary Applications

VirSchool: The effect of background music and immersive display systems on memory for facts learned in an educational virtual environment

Eric Fassbender et al.

COMPUTERS & EDUCATION (2012)

Article Computer Science, Interdisciplinary Applications

An online game approach for improving students' learning performance in web-based problem-solving activities

Gwo-Jen Hwang et al.

COMPUTERS & EDUCATION (2012)

Article Computer Science, Information Systems

Organizations' Information Security Policy Compliance: Stick or Carrot Approach?

Yan Chen et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2012)

Article Management

Equity-Based Incentives and Supply Chain Buy-Back Contracts

Tinglong Dai et al.

DECISION SCIENCES (2012)

Review Computer Science, Information Systems

A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings

John D'Arcy et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2011)

Article Computer Science, Information Systems

Teaching Johnny Not to Fall for Phish

Ponnurangam Kumaraguru et al.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2010)

Article Computer Science, Information Systems

Predicting Collaboration Technology Use: Integrating Technology Adoption and Collaboration Research

Susan A. Brown et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2010)

Article Computer Science, Artificial Intelligence

Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness

Tejaswini Herath et al.

DECISION SUPPORT SYSTEMS (2009)

Article Computer Science, Cybernetics

Perceived interactivity leading to e-loyalty: Development of a model for cognitive-affective user responses

Dianne Cyr et al.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2009)

Review Information Science & Library Science

User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach

John D'Arcy et al.

INFORMATION SYSTEMS RESEARCH (2009)

Article Computer Science, Cybernetics

Measuring and defining the experience of immersion in games

Charlene Jennett et al.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2008)

Article Computer Science, Information Systems

Determinants of the Choice of Open Source Software License

Ravi Sen et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2008)

Article Psychology, Experimental

The effects of video game playing on attention, memory, and executive control

Walter R. Boot et al.

ACTA PSYCHOLOGICA (2008)

Article Computer Science, Information Systems

A design science research methodology for Information Systems Research

Ken Peffers et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2007)

Article Psychology, Applied

A meta-analytic examination of the goal orientation nomological net

Stephanie C. Payne et al.

JOURNAL OF APPLIED PSYCHOLOGY (2007)

Review Business

The essential impact of context on organizational behavior

G Johns

ACADEMY OF MANAGEMENT REVIEW (2006)

Article Computer Science, Information Systems

Mobile computing: a user study on hedonic/utilitarian mobile device usage

Robin L. Wakefield et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2006)

Review Computer Science, Information Systems

Design science in Information Systems research

AR Hevner et al.

MIS QUARTERLY (2004)

Article Computer Science, Information Systems

User acceptance of information technology: Toward a unified view

V Venkatesh et al.

MIS QUARTERLY (2003)

Article Information Science & Library Science

Research report: The role of behavioral modeling in computer skills acquisition - Toward refinement of the model

RD Johnson et al.

INFORMATION SYSTEMS RESEARCH (2000)

Article Computer Science, Information Systems

Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage

R Agarwal et al.

MIS QUARTERLY (2000)

Article Psychology, Social

A meta-analysis of research on protection motivation theory

DL Floyd et al.

JOURNAL OF APPLIED SOCIAL PSYCHOLOGY (2000)

Review Management

Motivation, knowledge transfer, and organizational forms

M Osterloh et al.

ORGANIZATION SCIENCE (2000)