相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。ETGuard: Detecting D2D attacks using wireless Evil Twins
Vineeta Jain et al.
COMPUTERS & SECURITY (2019)
Key elements of an information security culture in organisations
Frans Nel et al.
INFORMATION AND COMPUTER SECURITY (2019)
Speak their Language: Designing Effective Messages to Improve Employees' Information Security Decision Making
Allen C. Johnston et al.
DECISION SCIENCES (2019)
When to use and how to report the results of PLS-SEM
Joseph F. Hair et al.
EUROPEAN BUSINESS REVIEW (2019)
A LONGITUDINAL STUDY OF UNAUTHORIZED ACCESS ATTEMPTS ON INFORMATION SYSTEMS: THE ROLE OF OPPORTUNITY CONTEXTS
Jingguo Wang et al.
MIS QUARTERLY (2019)
WHAT USERS DO BESIDES PROBLEM-FOCUSED COPING WHEN FACING IT SECURITY THREATS: AN EMOTION-FOCUSED COPING PERSPECTIVE
Huigang Liang et al.
MIS QUARTERLY (2019)
Sanction severity and employees' information security policy compliance: Investigating mediating, moderating, and control variables
Xiaofeng Chen et al.
INFORMATION & MANAGEMENT (2018)
TOWARD A UNIFIED MODEL OF INFORMATION SECURITY POLICY COMPLIANCE
Gregory D. Moody et al.
MIS QUARTERLY (2018)
Methods for modelling reflective-formative second order constructs in PLS: An application to online travel shopping
Paulo Duarte et al.
JOURNAL OF HOSPITALITY AND TOURISM TECHNOLOGY (2018)
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
Allen C. Johnston et al.
MIS QUARTERLY (2017)
Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
Paul Benjamin Lowry et al.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2017)
Determinants of early conformance with information security policies
France Belanger et al.
INFORMATION & MANAGEMENT (2017)
User Participation in Information Systems Security Risk Management
Spears et al.
MIS QUARTERLY (2017)
Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations
Siponen et al.
MIS QUARTERLY (2017)
Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study
Puhakainen et al.
MIS QUARTERLY (2017)
Fear Appeals and Information Security Behaviors: An Empirical Study
Johnston et al.
MIS QUARTERLY (2017)
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
Bulgurcu et al.
MIS QUARTERLY (2017)
Editor's Comments: An Update and Extension to SEM Guidelines for Administrative and Social Science Research
Gefen et al.
MIS QUARTERLY (2017)
Construct Measurement and Validation Procedures in MIS and Behavioral Research: Integrating New and Existing Techniques
MacKenzie et al.
MIS QUARTERLY (2017)
The role of the chief information security officer in the management of IT security
Erastus Karanja
INFORMATION AND COMPUTER SECURITY (2017)
Effects of innovation-supportive culture and organizational citizenship behavior on e-government information system security stemming from mimetic isomorphism
Kumju Hwang et al.
GOVERNMENT INFORMATION QUARTERLY (2017)
Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks
Stefan Bauer et al.
COMPUTERS & SECURITY (2017)
Can perceptual differences account for enigmatic information security behaviour in an organisation?
W. D. Kearney et al.
COMPUTERS & SECURITY (2016)
Information system security commitment: A study of external influences on senior management
Kevin A. Barton et al.
COMPUTERS & SECURITY (2016)
Information security policy compliance model in organizations
Nader Sohrabi Safa et al.
COMPUTERS & SECURITY (2016)
Continuance of protective security behavior: A longitudinal study
Merrill Warkentin et al.
DECISION SUPPORT SYSTEMS (2016)
Applying institutional theory to the adoption of electronic health records in the US
Susan A. Sherer et al.
INFORMATION & MANAGEMENT (2016)
The impact of legitimacy-based motives on IS adoption success: An institutional theory perspective
Katharina Krell et al.
INFORMATION & MANAGEMENT (2016)
An information security knowledge sharing model in organizations
Nader Sohrabi Safa et al.
COMPUTERS IN HUMAN BEHAVIOR (2016)
Bootstrapping and PLS-SEM: A step-by-step guide to get more out of your bootstrap results
Sandra Streukens et al.
EUROPEAN MANAGEMENT JOURNAL (2016)
Institutional pressures in security management: Direct and indirect influences on organizational investment in information security control resources
Huseyin Cavusoglu et al.
INFORMATION & MANAGEMENT (2015)
WHAT DO SYSTEMS USERS HAVE TO FEAR? USING FEAR APPEALS TO ENGENDER THREATS AND FEAR THAT MOTIVATE PROTECTIVE SECURITY BEHAVIORS
Scott R. Boss et al.
MIS QUARTERLY (2015)
A new criterion for assessing discriminant validity in variance-based structural equation modeling
Jorg Henseler et al.
JOURNAL OF THE ACADEMY OF MARKETING SCIENCE (2015)
Common Method Bias in PLS-SEM: A Full Collinearity Assessment Approach
Ned Kock
INTERNATIONAL JOURNAL OF E-COLLABORATION (2015)
Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture
Waldo Rocha Flores et al.
COMPUTERS & SECURITY (2014)
Evaluation model for knowledge sharing in information security professional virtual community
Alireza Tamjidyamcholo et al.
COMPUTERS & SECURITY (2014)
PROACTIVE VERSUS REACTIVE SECURITY INVESTMENTS IN THE HEALTHCARE SECTOR
Juhee Kwon et al.
MIS QUARTERLY (2014)
Future directions for behavioral information security research
Robert E. Crossler et al.
COMPUTERS & SECURITY (2013)
INSIDERS' PROTECTION OF ORGANIZATIONAL INFORMATION ASSETS: DEVELOPMENT OF A SYSTEMATICS-BASED TAXONOMY AND THEORY OF DIVERSITY FOR PROTECTION-MOTIVATED BEHAVIORS
Clay Posey et al.
MIS QUARTERLY (2013)
Extending the use of institutional theory in operations and supply chain management research Review and research suggestions
Katri Kauppi
INTERNATIONAL JOURNAL OF OPERATIONS & PRODUCTION MANAGEMENT (2013)
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
Princely Ifinedo
COMPUTERS & SECURITY (2012)
Hierarchical Latent Variable Models in PLS-SEM: Guidelines for Using Reflective-Formative Type Models
Jan-Michael Becker et al.
LONG RANGE PLANNING (2012)
Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture
Qing Hu et al.
DECISION SCIENCES (2012)
Equity-Based Incentives and Supply Chain Buy-Back Contracts
Tinglong Dai et al.
DECISION SCIENCES (2012)
PLS-SEM: INDEED A SILVER BULLET
Joe F. Hair et al.
JOURNAL OF MARKETING THEORY AND PRACTICE (2011)
A framework and assessment instrument for information security culture
A. Da Veiga et al.
COMPUTERS & SECURITY (2010)
Implementing supply chain information integration in China: The role of institutional forces and trust
Shaohan Cai et al.
JOURNAL OF OPERATIONS MANAGEMENT (2010)
Escape from the Iron Cage? Organizational Change and Isomorphic Pressures in the Public Sector
Rachel Ashworth et al.
JOURNAL OF PUBLIC ADMINISTRATION RESEARCH AND THEORY (2009)
Trust and Electronic Government Success: An Empirical Study
Thompson S. H. Teo et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2008)
The adoption of internet banking: An institutional theory perspective
Weihua Shi et al.
JOURNAL OF FINANCIAL SERVICES MARKETING (2008)
Institutional perspective on the adoption of technology for the security enhancement of container transport
Y. H. Venus Lun et al.
TRANSPORT REVIEWS (2008)
The role of external and internal influences on information systems security - a neo-institutional perspective
Qing Hu et al.
JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2007)
Armed, and dangerous (?): Motivating rule adherence among agents of social control
Tom R. Tyler et al.
LAW & SOCIETY REVIEW (2007)
Information Security governance: COBIT or ISO 17799 or both?
B von Solms
COMPUTERS & SECURITY (2005)
Enemy at the gate: Threats to information security
ME Whitman
COMMUNICATIONS OF THE ACM (2003)
Predicting intention to adopt interorganizational linkages: An institutional perspective
HH Teo et al.
MIS QUARTERLY (2003)
Global competition, institutions, and the diffusion of organizational practices:: The international spread of ISO 9000 quality certificates
I Guler et al.
ADMINISTRATIVE SCIENCE QUARTERLY (2002)
Shaping up for e-commerce: Institutional enablers of the organizational assimilation of Web technologies
D Chatterjee et al.
MIS QUARTERLY (2002)
Knowledge management: An organizational capabilities perspective
AH Gold et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2001)
What bandwagons bring: Effects of popular management techniques on corporate performance, reputation, and CEO pay
BM Staw et al.
ADMINISTRATIVE SCIENCE QUARTERLY (2000)