Found: 21
Select item for more details and to access through your institution.
Engaging Remote Employees: The Moderating Role of "Remote" Status in Determining Employee Information Security Policy Awareness.
- Published in:
- Journal of Organizational & End User Computing, 2013, v. 25, n. 1, p. 1, doi. 10.4018/joeuc.2013010101
- By:
- Publication type:
- Article
The Influence of Perceived Source Credibility on End User Attitudes and Intentions to Comply with Recommended IT Actions.
- Published in:
- Journal of Organizational & End User Computing, 2010, v. 22, n. 3, p. 1, doi. 10.4018/joeuc.2010070101
- By:
- Publication type:
- Article
A Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness.
- Published in:
- Journal of Global Information Management, 2008, v. 16, n. 2, p. 91, doi. 10.4018/jgim.2008040106
- By:
- Publication type:
- Article
It Takes a Village: Understanding the Collective Security Efficacy of Employee Groups.
- Published in:
- Journal of the Association for Information Systems, 2019, v. 20, n. 3, p. 186, doi. 10.17705/1jais.00533
- By:
- Publication type:
- Article
Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination.
- Published in:
- Journal of the Association for Information Systems, 2016, v. 17, n. 3, p. 194
- By:
- Publication type:
- Article
Aggression and Bullying in the Workplace: It's the Position of the Perpetrator that Influences Employees' Reactions and Sanctioning Ratings.
- Published in:
- Employee Responsibilities & Rights Journal, 2016, v. 28, n. 2, p. 79, doi. 10.1007/s10672-015-9271-8
- By:
- Publication type:
- Article
Individuals' privacy concerns and adoption of contact tracing mobile applications in a pandemic: A situational privacy calculus perspective.
- Published in:
- 2021
- By:
- Publication type:
- journal article
What could possibly go wrong? A multi-panel Delphi study of organizational social media risk.
- Published in:
- Information Systems Frontiers, 2018, v. 20, n. 5, p. 1097, doi. 10.1007/s10796-016-9714-2
- By:
- Publication type:
- Article
Open Data: A Replication Study of User Motivation in Protecting Information Security using Protection Motivation Theory and Self-Determination Theory.
- Published in:
- AIS Transactions on Replication Research, 2020, v. 6, p. 1, doi. 10.17705/1atrr.00055
- By:
- Publication type:
- Article
A Replication Study of User Motivation in Protecting Information Security using Protection Motivation Theory and Self-Determination Theory.
- Published in:
- AIS Transactions on Replication Research, 2020, v. 6, p. 1, doi. 10.17705/1atrr.00053
- By:
- Publication type:
- Article
Contextualizing Self-disclosure to the Online Environment: An Assessment of the Literature.
- Published in:
- Communications of the Association for Information Systems, 2022, v. 50, p. 754, doi. 10.17705/1CAIS.05035
- By:
- Publication type:
- Article
Providing Theoretical Foundations: Developing an Integrated Set of Guidelines for Theory Adaptation.
- Published in:
- Communications of the Association for Information Systems, 2018, v. 43, p. 566, doi. 10.17705/1CAIS.04331
- By:
- Publication type:
- Article
A Broader View of Perceived Risk during Internet Transactions.
- Published in:
- Communications of the Association for Information Systems, 2016, v. 38, n. 1, p. 171
- By:
- Publication type:
- Article
Speak their Language: Designing Effective Messages to Improve Employees' Information Security Decision Making.
- Published in:
- Decision Sciences, 2019, v. 50, n. 2, p. 245, doi. 10.1111/deci.12328
- By:
- Publication type:
- Article
Peering through the lens of high‐reliability theory: A competencies driven security culture model of high‐reliability organisations.
- Published in:
- Information Systems Journal, 2023, v. 33, n. 5, p. 1212, doi. 10.1111/isj.12441
- By:
- Publication type:
- Article
Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives.
- Published in:
- Information Systems Journal, 2018, v. 28, n. 2, p. 266, doi. 10.1111/isj.12129
- By:
- Publication type:
- Article
Protecting a whale in a sea of phish.
- Published in:
- Journal of Information Technology (Sage Publications Inc.), 2020, v. 35, n. 3, p. 214, doi. 10.1177/0268396220918594
- By:
- Publication type:
- Article
Rootkits and What We Know: Assessing US and Korean Knowledge and Perceptions.
- Published in:
- International Journal of Information Security & Privacy, 2007, v. 1, n. 4, p. 75, doi. 10.4018/jisp.2007100105
- By:
- Publication type:
- Article
AN ENHANCED FEAR APPEAL RHETORICAL FRAMEWORK: LEVERAGING THREATS TO THE HUMAN ASSET THROUGH SANCTIONING RHETORIC.
- Published in:
- MIS Quarterly, 2015, v. 39, n. 1, p. 113
- By:
- Publication type:
- Article
FEAR APPEALS AND INFORMATION SECURITY BEHAVIORS: AN EMPIRICAL STUDY.
- Published in:
- MIS Quarterly, 2010, v. 34, n. 3, p. 549, doi. 10.2307/25750691
- By:
- Publication type:
- Article
An Empirical Assessment of Technology Adoption as a Choice between Alternatives.
- Published in:
- Information Resources Management Journal, 2009, v. 22, n. 4, p. 23, doi. 10.4018/irmj.2009061902
- By:
- Publication type:
- Article