相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study
John D'Arcy et al.
INFORMATION SYSTEMS JOURNAL (2019)
Organizational cloud security and control: a proactive approach
Konstantina Spanaki et al.
INFORMATION TECHNOLOGY & PEOPLE (2019)
SEEING THE FOREST AND THE TREES: A META-ANALYSIS OF THE ANTECEDENTS TO INFORMATION SECURITY POLICY COMPLIANCE
W. Alec Cram et al.
MIS QUARTERLY (2019)
Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders' Awareness of Organizational SETA Efforts
A. J. Burns et al.
DECISION SCIENCES (2018)
Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives
Robert Willison et al.
INFORMATION SYSTEMS JOURNAL (2018)
Organizational information security policies: a review and research framework
W. Alec Cram et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2017)
Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations
Siponen et al.
MIS QUARTERLY (2017)
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
Bulgurcu et al.
MIS QUARTERLY (2017)
Millennials' Attitudes Toward IT Consumerization in the Workplace
Heiko Gewald et al.
COMMUNICATIONS OF THE ACM (2017)
Practice-based discourse analysis of information security policies
Fredrik Karlsson et al.
COMPUTERS & SECURITY (2017)
Individual differences and Information Security Awareness
Agata McCormac et al.
COMPUTERS IN HUMAN BEHAVIOR (2017)
Mandatory Standards and Organizational Information Security
Chul Ho Lee et al.
INFORMATION SYSTEMS RESEARCH (2016)
The Impact of Organizational Commitment on Insiders' Motivation to Protect Organizational Information Assets
Clay Posey et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2015)
A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour
Teodor Sommestad et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY (2015)
Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies
Paul Benjamin Lowry et al.
INFORMATION SYSTEMS JOURNAL (2015)
The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness
Jack Shih-Chieh Hsu et al.
INFORMATION SYSTEMS RESEARCH (2015)
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust
Paul Benjamin Lowry et al.
INFORMATION SYSTEMS JOURNAL (2015)
DATA COLLECTION IN THE DIGITAL AGE: INNOVATIVE ALTERNATIVES TO STUDENT SAMPLES
Zachary R. Steelman et al.
MIS QUARTERLY (2014)
Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance
Han Li et al.
INFORMATION SYSTEMS JOURNAL (2014)
Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse
Paul Benjamin Lowry et al.
JOURNAL OF BUSINESS ETHICS (2014)
Don't make excuses! Discouraging neutralization to reduce IT policy violation
Jordan B. Barlow et al.
COMPUTERS & SECURITY (2013)
Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory
Lijiao Cheng et al.
COMPUTERS & SECURITY (2013)
Future directions for behavioral information security research
Robert E. Crossler et al.
COMPUTERS & SECURITY (2013)
INSIDERS' PROTECTION OF ORGANIZATIONAL INFORMATION ASSETS: DEVELOPMENT OF A SYSTEMATICS-BASED TAXONOMY AND THEORY OF DIVERSITY FOR PROTECTION-MOTIVATED BEHAVIORS
Clay Posey et al.
MIS QUARTERLY (2013)
Separate but equal? A comparison of participants and data gathered via Amazon's MTurk, social media, and face-to-face behavioral testing
Krista Casler et al.
COMPUTERS IN HUMAN BEHAVIOR (2013)
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
Princely Ifinedo
COMPUTERS & SECURITY (2012)
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the US and South Korea
Anat Hovav et al.
INFORMATION & MANAGEMENT (2012)
Motivating IS security compliance: Insights from Habit and Protection Motivation Theory
Anthony Vance et al.
INFORMATION & MANAGEMENT (2012)
IS Security Policy Violations: A Rational Choice Perspective
Anthony Vance et al.
JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING (2012)
Employee Misuse of Information Technology Resources: Testing a Contemporary Deterrence Model
John D'Arcy et al.
DECISION SCIENCES (2012)
Does Deterrence Work in Reducing Information Security Policy Abuse by Employees?
Qing Hu et al.
COMMUNICATIONS OF THE ACM (2011)
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings
John D'Arcy et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2011)
Bodies Obliged and Unbound: Differentiated Response Tendencies for Injunctive and Descriptive Social Norms
Ryan P. Jacobson et al.
JOURNAL OF PERSONALITY AND SOCIAL PSYCHOLOGY (2011)
What levels of moral reasoning and values explain adherence to information security rules? An empirical study
Liisa Myyry et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)
Protection motivation and deterrence: a framework for security policy compliance in organisations
Tejaswini Herath et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)
Threats and countermeasures for information system security: A cross-industry study
Quey-Jen Yeh et al.
INFORMATION & MANAGEMENT (2007)
The role of external and internal influences on information systems security - a neo-institutional perspective
Qing Hu et al.
JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2007)