• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4710650)   Today's Articles (5424)
For: Hu Q, Dinev T, Hart P, Cooke D. Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*. Decision Sciences 2012. [DOI: 10.1111/j.1540-5915.2012.00361.x] [Citation(s) in RCA: 260] [Impact Index Per Article: 20.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
Number Cited by Other Article(s)
51
An Assessment of Data Location Vulnerability for Human Factors Using Linear Regression and Collaborative Filtering. INFORMATION 2020. [DOI: 10.3390/info11090449] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
52
Prislan K, Mihelič A, Bernik I. A real-world information security performance assessment using a multidimensional socio-technical approach. PLoS One 2020;15:e0238739. [PMID: 32898183 PMCID: PMC7478844 DOI: 10.1371/journal.pone.0238739] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/22/2020] [Accepted: 08/21/2020] [Indexed: 11/19/2022]  Open
53
Walsh M, Streilein W. Security Measures for Safeguarding the Bioeconomy. Health Secur 2020;18:313-317. [PMID: 32816587 DOI: 10.1089/hs.2020.0029] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/12/2022]  Open
54
Readiness for information security of teachers as a function of their personality traits and their assessment of threats. ASLIB J INFORM MANAG 2020. [DOI: 10.1108/ajim-12-2019-0371] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
55
Karjalainen M, Siponen M, Sarker S. Toward a stage theory of the development of employees’ information security behavior. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.101782] [Citation(s) in RCA: 13] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
56
Menon NM, Siponen MT. Executives' Commitment to Information Security. DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS 2020. [DOI: 10.1145/3400043.3400047] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
57
AlMindeel R, Martins JT. Information security awareness in a developing country context: insights from the government sector in Saudi Arabia. INFORMATION TECHNOLOGY & PEOPLE 2020. [DOI: 10.1108/itp-06-2019-0269] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
58
da Veiga A, Astakhova LV, Botha A, Herselman M. Defining organisational information security culture—Perspectives from academia and industry. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.101713] [Citation(s) in RCA: 39] [Impact Index Per Article: 7.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
59
Diesch R, Pfaff M, Krcmar H. A comprehensive model of information security factors for decision-makers. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.101747] [Citation(s) in RCA: 31] [Impact Index Per Article: 6.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
60
Information system security policy noncompliance: the role of situation-specific ethical orientation. INFORMATION TECHNOLOGY & PEOPLE 2020. [DOI: 10.1108/itp-03-2019-0109] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
61
Guo Y, Wang C. The Impact Mechanisms of Psychological Learning Climate on Employees' Innovative Use of Information Systems. JOURNAL OF GLOBAL INFORMATION MANAGEMENT 2020. [DOI: 10.4018/jgim.2020040103] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
62
Silic M, Lowry PB. Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance. J MANAGE INFORM SYST 2020. [DOI: 10.1080/07421222.2019.1705512] [Citation(s) in RCA: 28] [Impact Index Per Article: 5.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
63
Yazdanmehr A, Wang J, Yang Z. Peers matter: The moderating role of social influence on information security policy compliance. INFORMATION SYSTEMS JOURNAL 2020. [DOI: 10.1111/isj.12271] [Citation(s) in RCA: 24] [Impact Index Per Article: 4.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
64
Stakeholder perceptions of information security policy: Analyzing personal constructs. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2020. [DOI: 10.1016/j.ijinfomgt.2019.04.011] [Citation(s) in RCA: 19] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
65
Jalali MS, Bruckes M, Westmattelmann D, Schewe G. Why Employees (Still) Click on Phishing Links: Investigation in Hospitals. J Med Internet Res 2020;22:e16775. [PMID: 32012071 PMCID: PMC7005690 DOI: 10.2196/16775] [Citation(s) in RCA: 31] [Impact Index Per Article: 6.2] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/23/2019] [Revised: 12/11/2019] [Accepted: 12/16/2019] [Indexed: 12/25/2022]  Open
66
Rostami E, Karlsson F, Kolkowska E. The hunt for computerized support in information security policy management. INFORMATION AND COMPUTER SECURITY 2020. [DOI: 10.1108/ics-07-2019-0079] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
67
Hong Y, Furnell S. Motivating Information Security Policy Compliance: Insights from Perceived Organizational Formalization. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2019. [DOI: 10.1080/08874417.2019.1683781] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
68
Y. Connolly L, Wall DS. The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures. Comput Secur 2019. [DOI: 10.1016/j.cose.2019.101568] [Citation(s) in RCA: 28] [Impact Index Per Article: 4.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
69
Institutional governance and protection motivation: Theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world. Comput Secur 2019. [DOI: 10.1016/j.cose.2019.101594] [Citation(s) in RCA: 32] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
70
Park EH, Kim J, Wiles LL, Park YS. Factors affecting intention to disclose patients’ health information. Comput Secur 2019. [DOI: 10.1016/j.cose.2018.05.003] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
71
Kurowski S. Response biases in policy compliance research. INFORMATION AND COMPUTER SECURITY 2019. [DOI: 10.1108/ics-02-2019-0025] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
72
Xu Z, Guo K. It ain’t my business: a coping perspective on employee effortful security behavior. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT 2019. [DOI: 10.1108/jeim-10-2018-0229] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
73
Nielsen S, Pontoppidan IC. Exploring the inclusion of risk in management accounting and control. MANAGEMENT RESEARCH REVIEW 2019. [DOI: 10.1108/mrr-10-2017-0342] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
74
Chen H, Chau PY, Li W. The effects of moral disengagement and organizational ethical climate on insiders’ information security policy violation behavior. INFORMATION TECHNOLOGY & PEOPLE 2019. [DOI: 10.1108/itp-12-2017-0421] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
75
Hsia TL, Chiang AJ, Wu JH, Teng NN, Rubin AD. What drives E-Health usage? Integrated institutional forces and top management perspectives. COMPUTERS IN HUMAN BEHAVIOR 2019. [DOI: 10.1016/j.chb.2019.01.010] [Citation(s) in RCA: 22] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/20/2022]
76
Topa I, Karyda M. From theory to practice: guidelines for enhancing information security management. INFORMATION AND COMPUTER SECURITY 2019. [DOI: 10.1108/ics-09-2018-0108] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
77
A conceptual model and empirical assessment of HR security risk management. INFORMATION AND COMPUTER SECURITY 2019. [DOI: 10.1108/ics-05-2018-0057] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
78
Lankton NK, Stivason C, Gurung A. Information protection behaviors: morality and organizational criticality. INFORMATION AND COMPUTER SECURITY 2019. [DOI: 10.1108/ics-07-2018-0092] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
79
Ahmad Z, Ong TS, Liew TH, Norhashim M. Security monitoring and information security assurance behaviour among employees. INFORMATION AND COMPUTER SECURITY 2019. [DOI: 10.1108/ics-10-2017-0073] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
80
NOWAK RADOSLAW. RESPONDING TO KEY EXOGENOUS CHANGES: THE JOINT EFFECT OF NETWORK HETEROGENEITY AND CULTURE OF INNOVATION. INTERNATIONAL JOURNAL OF INNOVATION MANAGEMENT 2019. [DOI: 10.1142/s1363919619500300] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
81
Khan HU, AlShare KA. Violators versus non-violators of information security measures in organizations—A study of distinguishing factors. JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE 2019. [DOI: 10.1080/10919392.2019.1552743] [Citation(s) in RCA: 12] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
82
Burns AJ, Johnson ME, Caputo DD. Spear phishing in a barrel: Insights from a targeted phishing campaign. JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE 2019. [DOI: 10.1080/10919392.2019.1552745] [Citation(s) in RCA: 16] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
83
Chen Q, Feng Y, Liu L, Tian X. Understanding consumers’ reactance of online personalized advertising: A new scheme of rational choice from a perspective of negative effects. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2019. [DOI: 10.1016/j.ijinfomgt.2018.09.001] [Citation(s) in RCA: 35] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
84
Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education. Comput Secur 2019. [DOI: 10.1016/j.cose.2018.09.016] [Citation(s) in RCA: 33] [Impact Index Per Article: 5.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
85
Chang KC, Seow YM. Protective Measures and Security Policy Non-Compliance Intention. J ORGAN END USER COM 2019. [DOI: 10.4018/joeuc.2019010101] [Citation(s) in RCA: 20] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
86
Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2018. [DOI: 10.1016/j.ijinfomgt.2018.07.007] [Citation(s) in RCA: 26] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
87
Sommestad T. Work-related groups and information security policy compliance. INFORMATION AND COMPUTER SECURITY 2018. [DOI: 10.1108/ics-08-2017-0054] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
88
Kumah P, Yaokumah W, Buabeng-Andoh C. Identifying HRM Practices for Improving Information Security Performance. INTERNATIONAL JOURNAL OF HUMAN CAPITAL AND INFORMATION TECHNOLOGY PROFESSIONALS 2018. [DOI: 10.4018/ijhcitp.2018100102] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
89
Lu G, Koufteros X, Talluri S, Hult GTM. Deployment of Supply Chain Security Practices: Antecedents and Consequences. DECISION SCIENCES 2018. [DOI: 10.1111/deci.12336] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
90
Verma S, Bhattacharyya SS, Kumar S. An extension of the technology acceptance model in the big data analytics system implementation environment. Inf Process Manag 2018. [DOI: 10.1016/j.ipm.2018.01.004] [Citation(s) in RCA: 75] [Impact Index Per Article: 10.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
91
Johnston AC, Warkentin M, Dennis AR, Siponen M. Speak their Language: Designing Effective Messages to Improve Employees’ Information Security Decision Making. DECISION SCIENCES 2018. [DOI: 10.1111/deci.12328] [Citation(s) in RCA: 23] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
92
Alohali M, Clarke N, Li F, Furnell S. Identifying and predicting the factors affecting end-users’ risk-taking behavior. INFORMATION AND COMPUTER SECURITY 2018. [DOI: 10.1108/ics-03-2018-0037] [Citation(s) in RCA: 18] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
93
Pramod D, Bharathi SV. Developing an Information Security Risk Taxonomy and an Assessment Model using Fuzzy Petri Nets. JOURNAL OF CASES ON INFORMATION TECHNOLOGY 2018. [DOI: 10.4018/jcit.2018070104] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
94
Yan Z, Robertson T, Yan R, Park SY, Bordoff S, Chen Q, Sprissler E. Finding the weakest links in the weakest link: How well do undergraduate students make cybersecurity judgment? COMPUTERS IN HUMAN BEHAVIOR 2018. [DOI: 10.1016/j.chb.2018.02.019] [Citation(s) in RCA: 36] [Impact Index Per Article: 5.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
95
The Looming Cybersecurity Crisis and What It Means for the Practice of Industrial and Organizational Psychology. INDUSTRIAL AND ORGANIZATIONAL PSYCHOLOGY-PERSPECTIVES ON SCIENCE AND PRACTICE 2018. [DOI: 10.1017/iop.2018.3] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
96
Tu CZ, Yuan Y, Archer N, Connelly CE. Strategic value alignment for information security management: a critical success factor analysis. INFORMATION AND COMPUTER SECURITY 2018. [DOI: 10.1108/ics-06-2017-0042] [Citation(s) in RCA: 13] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
97
Guhr N, Lebek B, Breitner MH. The impact of leadership on employees' intended information security behaviour: An examination of the full-range leadership theory. INFORMATION SYSTEMS JOURNAL 2018. [DOI: 10.1111/isj.12202] [Citation(s) in RCA: 35] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
98
Towards a user-centric theory of value-driven information security compliance. INFORMATION TECHNOLOGY & PEOPLE 2018. [DOI: 10.1108/itp-08-2016-0194] [Citation(s) in RCA: 17] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
99
Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda. EUR J INFORM SYST 2018. [DOI: 10.1057/s41303-017-0066-x] [Citation(s) in RCA: 81] [Impact Index Per Article: 11.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
100
Cram WA, Proudfoot JG, D’Arcy J. Organizational information security policies: a review and research framework. EUR J INFORM SYST 2018. [DOI: 10.1057/s41303-017-0059-9] [Citation(s) in RCA: 80] [Impact Index Per Article: 11.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
PrevPage 2 of 3 123Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA