4.5 Article Proceedings Paper

If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

How Endogenous Motivations Influence User Intentions: Beyond the Dichotomy of Extrinsic and Intrinsic User Motivations

Yogesh Malhotra et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2008)

Article Computer Science, Information Systems

The role of external and internal influences on information systems security - a neo-institutional perspective

Qing Hu et al.

JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2007)

Article Computer Science, Information Systems

Delineating the effects of general and system-specific computer self-efficacy beliefs on IS acceptance

Bassam Hasan

INFORMATION & MANAGEMENT (2006)

Article Business, Finance

Carrot or stick? Contract frame and use of decision-influencing information in a principal-agent setting

JR Frederickson et al.

JOURNAL OF ACCOUNTING RESEARCH (2005)

Article Computer Science, Information Systems

A multidimensional commitment model of volitional systems adoption and usage behavior

Y Malhotra et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2005)

Article Computer Science, Information Systems

Mandates and technology acceptance: A tale of two enterprise technologies

B Chae et al.

JOURNAL OF STRATEGIC INFORMATION SYSTEMS (2005)

Article Information Science & Library Science

Deploying common systems globally: The dynamics of control

LJ Kirsch

INFORMATION SYSTEMS RESEARCH (2004)

Review Psychology, Applied

Common method biases in behavioral research: A critical review of the literature and recommended remedies

PM Podsakoff et al.

JOURNAL OF APPLIED PSYCHOLOGY (2003)

Article Information Science & Library Science

Portfolios of control in outsourced software development projects

V Choudhury et al.

INFORMATION SYSTEMS RESEARCH (2003)

Article Information Science & Library Science

Informational influence in organizations: An integrated approach to knowledge adoption

SW Sussman et al.

INFORMATION SYSTEMS RESEARCH (2003)

Article Computer Science, Information Systems

The matrix of control: Combining process and structure approaches to managing software development

SR Nidumolu et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2003)

Article Computer Science, Information Systems

Do I really have to? User acceptance of mandated technology

SA Brown et al.

EUROPEAN JOURNAL OF INFORMATION SYSTEMS (2002)

Article Business

Management's role in information security in a cyber economy

A Dutta et al.

CALIFORNIA MANAGEMENT REVIEW (2002)

Article Business

Financial accountants' perceptions of management's ethical standards

JM D'Aquila

JOURNAL OF BUSINESS ETHICS (2001)

Article Computer Science, Information Systems

Violation of safeguards by trusted personnel and understanding related information security concerns

G Dhillon

COMPUTERS & SECURITY (2001)