4.5 Article

An exploratory examination of organizational insiders' descriptive and normative perceptions of cyber-relevant rights and responsibilities

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Information Science & Library Science

Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study

John D'Arcy et al.

INFORMATION SYSTEMS JOURNAL (2019)

Article Information Science & Library Science

Organizational cloud security and control: a proactive approach

Konstantina Spanaki et al.

INFORMATION TECHNOLOGY & PEOPLE (2019)

Article Computer Science, Information Systems

SEEING THE FOREST AND THE TREES: A META-ANALYSIS OF THE ANTECEDENTS TO INFORMATION SECURITY POLICY COMPLIANCE

W. Alec Cram et al.

MIS QUARTERLY (2019)

Article Information Science & Library Science

Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives

Robert Willison et al.

INFORMATION SYSTEMS JOURNAL (2018)

Review Computer Science, Information Systems

Organizational information security policies: a review and research framework

W. Alec Cram et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2017)

Article Computer Science, Information Systems

Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations

Siponen et al.

MIS QUARTERLY (2017)

Article Computer Science, Hardware & Architecture

Millennials' Attitudes Toward IT Consumerization in the Workplace

Heiko Gewald et al.

COMMUNICATIONS OF THE ACM (2017)

Article Computer Science, Information Systems

Practice-based discourse analysis of information security policies

Fredrik Karlsson et al.

COMPUTERS & SECURITY (2017)

Article Psychology, Multidisciplinary

Individual differences and Information Security Awareness

Agata McCormac et al.

COMPUTERS IN HUMAN BEHAVIOR (2017)

Article Information Science & Library Science

Mandatory Standards and Organizational Information Security

Chul Ho Lee et al.

INFORMATION SYSTEMS RESEARCH (2016)

Article Computer Science, Information Systems

The Impact of Organizational Commitment on Insiders' Motivation to Protect Organizational Information Assets

Clay Posey et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2015)

Article Computer Science, Software Engineering

A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour

Teodor Sommestad et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY (2015)

Article Information Science & Library Science

The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness

Jack Shih-Chieh Hsu et al.

INFORMATION SYSTEMS RESEARCH (2015)

Article Computer Science, Information Systems

DATA COLLECTION IN THE DIGITAL AGE: INNOVATIVE ALTERNATIVES TO STUDENT SAMPLES

Zachary R. Steelman et al.

MIS QUARTERLY (2014)

Article Information Science & Library Science

Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance

Han Li et al.

INFORMATION SYSTEMS JOURNAL (2014)

Article Computer Science, Information Systems

Don't make excuses! Discouraging neutralization to reduce IT policy violation

Jordan B. Barlow et al.

COMPUTERS & SECURITY (2013)

Article Computer Science, Information Systems

Future directions for behavioral information security research

Robert E. Crossler et al.

COMPUTERS & SECURITY (2013)

Article Computer Science, Information Systems

Motivating IS security compliance: Insights from Habit and Protection Motivation Theory

Anthony Vance et al.

INFORMATION & MANAGEMENT (2012)

Article Computer Science, Information Systems

IS Security Policy Violations: A Rational Choice Perspective

Anthony Vance et al.

JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING (2012)

Article Computer Science, Hardware & Architecture

Does Deterrence Work in Reducing Information Security Policy Abuse by Employees?

Qing Hu et al.

COMMUNICATIONS OF THE ACM (2011)

Review Computer Science, Information Systems

A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings

John D'Arcy et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2011)

Article Psychology, Social

Bodies Obliged and Unbound: Differentiated Response Tendencies for Injunctive and Descriptive Social Norms

Ryan P. Jacobson et al.

JOURNAL OF PERSONALITY AND SOCIAL PSYCHOLOGY (2011)

Article Computer Science, Information Systems

What levels of moral reasoning and values explain adherence to information security rules? An empirical study

Liisa Myyry et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)

Article Computer Science, Information Systems

Protection motivation and deterrence: a framework for security policy compliance in organisations

Tejaswini Herath et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2009)

Article Computer Science, Information Systems

Threats and countermeasures for information system security: A cross-industry study

Quey-Jen Yeh et al.

INFORMATION & MANAGEMENT (2007)

Article Computer Science, Information Systems

The role of external and internal influences on information systems security - a neo-institutional perspective

Qing Hu et al.

JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2007)