• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4710650)   Today's Articles (5424)
For: Hu Q, Dinev T, Hart P, Cooke D. Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*. Decision Sciences 2012. [DOI: 10.1111/j.1540-5915.2012.00361.x] [Citation(s) in RCA: 260] [Impact Index Per Article: 20.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
Number Cited by Other Article(s)
101
Bi R, Davison R, Smyrnios K. The Role of Top Management Participation and IT Capability in Developing SMEs’ Competitive Process Capabilities. JOURNAL OF SMALL BUSINESS MANAGEMENT 2018. [DOI: 10.1111/jsbm.12380] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/01/2022]
102
Ifinedo P. Roles of Organizational Climate, Social Bonds, and Perceptions of Security Threats on IS Security Policy Compliance Intentions. INFORMATION RESOURCES MANAGEMENT JOURNAL 2018. [DOI: 10.4018/irmj.2018010103] [Citation(s) in RCA: 18] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
103
Managing the introduction of information security awareness programmes in organisations. EUR J INFORM SYST 2017. [DOI: 10.1057/ejis.2013.27] [Citation(s) in RCA: 47] [Impact Index Per Article: 5.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
104
Turel O, Xu Z, Guo K. Organizational Citizenship Behavior Regarding Security: Leadership Approach Perspective. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2017. [DOI: 10.1080/08874417.2017.1400928] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
105
Burns AJ, Roberts TL, Posey C, Bennett RJ, Courtney JF. Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders’ Awareness of Organizational SETA Efforts. DECISION SCIENCES 2017. [DOI: 10.1111/deci.12304] [Citation(s) in RCA: 24] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
106
A new perspective on neutralization and deterrence: Predicting shadow IT usage. INFORMATION & MANAGEMENT 2017. [DOI: 10.1016/j.im.2017.02.007] [Citation(s) in RCA: 39] [Impact Index Per Article: 4.9] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
107
D'Arcy J, Lowry PB. Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study. INFORMATION SYSTEMS JOURNAL 2017. [DOI: 10.1111/isj.12173] [Citation(s) in RCA: 72] [Impact Index Per Article: 9.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
108
Yang SO, Hsu C, Sarker S, Lee AS. Enabling Effective Operational Risk Management in a Financial Institution: An Action Research Study. J MANAGE INFORM SYST 2017. [DOI: 10.1080/07421222.2017.1373006] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
109
A Deterrence Approach to Regulate Nurses’ Compliance with Electronic Medical Records Privacy Policy. J Med Syst 2017;41:198. [DOI: 10.1007/s10916-017-0833-1] [Citation(s) in RCA: 12] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/09/2017] [Accepted: 10/03/2017] [Indexed: 11/24/2022]
110
Shao Z, Feng Y, Hu Q. Impact of top management leadership styles on ERP assimilation and the role of organizational learning. INFORMATION & MANAGEMENT 2017. [DOI: 10.1016/j.im.2017.01.005] [Citation(s) in RCA: 33] [Impact Index Per Article: 4.1] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
111
Sommestad T, Karlzén H, Hallberg J. The Theory of Planned Behavior and Information Security Policy Compliance. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2017. [DOI: 10.1080/08874417.2017.1368421] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
112
da Veiga A, Martins N. Defining and identifying dominant information security cultures and subcultures. Comput Secur 2017. [DOI: 10.1016/j.cose.2017.05.002] [Citation(s) in RCA: 17] [Impact Index Per Article: 2.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
113
Balozian P, Leidner D. Review of IS Security Policy Compliance. DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS 2017. [DOI: 10.1145/3130515.3130518] [Citation(s) in RCA: 12] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
114
Bauer S, Bernroider EW. From Information Security Awareness to Reasoned Compliant Action. DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS 2017. [DOI: 10.1145/3130515.3130519] [Citation(s) in RCA: 22] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
115
Karlsson F, Karlsson M, Åström J. Measuring employees’ compliance – the importance of value pluralism. INFORMATION AND COMPUTER SECURITY 2017. [DOI: 10.1108/ics-11-2016-0084] [Citation(s) in RCA: 15] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
116
Sher ML, Talley PC, Yang CW, Kuo KM. Compliance With Electronic Medical Records Privacy Policy: An Empirical Investigation of Hospital Information Technology Staff. INQUIRY: The Journal of Health Care Organization, Provision, and Financing 2017. [PMCID: PMC5798674 DOI: 10.1177/0046958017711759] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
117
Yuryna Connolly L, Lang M, Gathegi J, Tygar DJ. Organisational culture, procedural countermeasures, and employee security behaviour. INFORMATION AND COMPUTER SECURITY 2017. [DOI: 10.1108/ics-03-2017-0013] [Citation(s) in RCA: 30] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
118
Productivity vs security: mitigating conflicting goals in organizations. INFORMATION AND COMPUTER SECURITY 2017. [DOI: 10.1108/ics-03-2017-0014] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
119
Yoo DK. Impacts of a Knowledge Sharing Climate and Interdisciplinary Knowledge Integration on Innovation. JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT 2017. [DOI: 10.1142/s0219649217500101] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
120
An integrative model of information security policy compliance with psychological contract: Examining a bilateral perspective. Comput Secur 2017. [DOI: 10.1016/j.cose.2016.12.016] [Citation(s) in RCA: 52] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
121
Humaidi N, Balakrishnan V. Indirect effect of management support on users' compliance behaviour towards information security policies. Health Inf Manag 2017;47:17-27. [PMID: 28537207 DOI: 10.1177/1833358317700255] [Citation(s) in RCA: 13] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
122
Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method. JOURNAL OF STRATEGIC INFORMATION SYSTEMS 2017. [DOI: 10.1016/j.jsis.2016.08.005] [Citation(s) in RCA: 46] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
123
Worker outcomes of LGBT-supportive policies: a cross-level model. EQUALITY, DIVERSITY AND INCLUSION: AN INTERNATIONAL JOURNAL 2017. [DOI: 10.1108/edi-07-2016-0058] [Citation(s) in RCA: 25] [Impact Index Per Article: 3.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
124
Silic M. Explaining Organizational Employee Computer Abuse Through an Extended Health Belief Model. SSRN ELECTRONIC JOURNAL 2017. [DOI: 10.2139/ssrn.3070823] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/02/2023]
125
Rohn E, Sabari G, Leshem G. Explaining small business InfoSec posture using social theories. INFORMATION AND COMPUTER SECURITY 2016. [DOI: 10.1108/ics-09-2015-0041] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
126
Bernik I, Prislan K. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation. PLoS One 2016;11:e0163050. [PMID: 27655001 PMCID: PMC5031431 DOI: 10.1371/journal.pone.0163050] [Citation(s) in RCA: 20] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/24/2016] [Accepted: 09/01/2016] [Indexed: 11/18/2022]  Open
127
Leadership of Information Security Manager on the Effectiveness of Information Systems Security for Secure Sustainable Computing. SUSTAINABILITY 2016. [DOI: 10.3390/su8070638] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
128
Rocha Flores W, Ekstedt M. Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. Comput Secur 2016. [DOI: 10.1016/j.cose.2016.01.004] [Citation(s) in RCA: 46] [Impact Index Per Article: 5.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
129
Tsai HYS, Jiang M, Alhabash S, LaRose R, Rifon NJ, Cotten SR. Understanding online safety behaviors: A protection motivation theory perspective. Comput Secur 2016. [DOI: 10.1016/j.cose.2016.02.009] [Citation(s) in RCA: 140] [Impact Index Per Article: 15.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
130
Posey C, Roberts TL, Lowry PB. The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets. J MANAGE INFORM SYST 2016. [DOI: 10.1080/07421222.2015.1138374] [Citation(s) in RCA: 97] [Impact Index Per Article: 10.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
131
Information security management needs more holistic approach: A literature review. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2016. [DOI: 10.1016/j.ijinfomgt.2015.11.009] [Citation(s) in RCA: 208] [Impact Index Per Article: 23.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
132
Al-Janabi S, Al-Shourbaji I. A Study of Cyber Security Awareness in Educational Environment in the Middle East. JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT 2016. [DOI: 10.1142/s0219649216500076] [Citation(s) in RCA: 41] [Impact Index Per Article: 4.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
133
“Want to” Versus “Have to”: Intrinsic and Extrinsic Motivators as Predictors of Compliance Behavior Intention. HUMAN RESOURCE MANAGEMENT 2015. [DOI: 10.1002/hrm.21774] [Citation(s) in RCA: 27] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/07/2022]
134
Dysfunctional information system behaviors are not all created the same: Challenges to the generalizability of security-based research. INFORMATION & MANAGEMENT 2015. [DOI: 10.1016/j.im.2015.07.008] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
135
Kroenung J, Eckhardt A. The attitude cube—A three-dimensional model of situational factors in IS adoption and their impact on the attitude–behavior relationship. INFORMATION & MANAGEMENT 2015. [DOI: 10.1016/j.im.2015.05.002] [Citation(s) in RCA: 26] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
136
Cantor DE, Morrow PC, Blackhurst J. An Examination of How Supervisors Influence Their Subordinates to Engage in Environmental Behaviors. DECISION SCIENCES 2015. [DOI: 10.1111/deci.12149] [Citation(s) in RCA: 19] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
137
AlHogail A. Design and validation of information security culture framework. COMPUTERS IN HUMAN BEHAVIOR 2015. [DOI: 10.1016/j.chb.2015.03.054] [Citation(s) in RCA: 71] [Impact Index Per Article: 7.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
138
Karlsson F, Åström J, Karlsson M. Information security culture – state-of-the-art review between 2000 and 2013. INFORMATION AND COMPUTER SECURITY 2015. [DOI: 10.1108/ics-05-2014-0033] [Citation(s) in RCA: 43] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
139
Hu Q, West R, Smarandescu L. The Role of Self-Control in Information Security Violations: Insights from a Cognitive Neuroscience Perspective. J MANAGE INFORM SYST 2015. [DOI: 10.1080/07421222.2014.1001255] [Citation(s) in RCA: 29] [Impact Index Per Article: 2.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
140
D'Arcy J, Herath T, Shoss MK. Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective. J MANAGE INFORM SYST 2014. [DOI: 10.2753/mis0742-1222310210] [Citation(s) in RCA: 216] [Impact Index Per Article: 19.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
141
Information security awareness and behavior: a theory-based literature review. MANAGEMENT RESEARCH REVIEW 2014. [DOI: 10.1108/mrr-04-2013-0085] [Citation(s) in RCA: 100] [Impact Index Per Article: 9.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
142
D'Arcy J, Greene G. Security culture and the employment relationship as drivers of employees’ security compliance. ACTA ACUST UNITED AC 2014. [DOI: 10.1108/imcs-08-2013-0057] [Citation(s) in RCA: 70] [Impact Index Per Article: 6.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
143
The effects of organizational culture and environmental pressures on IT project performance: A moderation perspective. INTERNATIONAL JOURNAL OF PROJECT MANAGEMENT 2014. [DOI: 10.1016/j.ijproman.2013.12.003] [Citation(s) in RCA: 38] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
144
Narain Singh A, Gupta M, Ojha A. Identifying factors of “organizational information security management”. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT 2014. [DOI: 10.1108/jeim-07-2013-0052] [Citation(s) in RCA: 33] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
145
Rocha Flores W, Antonsen E, Ekstedt M. Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture. Comput Secur 2014. [DOI: 10.1016/j.cose.2014.03.004] [Citation(s) in RCA: 40] [Impact Index Per Article: 3.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
146
Kajzer M, D'Arcy J, Crowell CR, Striegel A, Van Bruggen D. An exploratory investigation of message-person congruence in information security awareness campaigns. Comput Secur 2014. [DOI: 10.1016/j.cose.2014.03.003] [Citation(s) in RCA: 26] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
147
Singh AN, Picot A, Kranz J, Gupta MP, Ojha A. Information Security Management (ISM) Practices: Lessons from Select Cases from India and Germany. ACTA ACUST UNITED AC 2013. [DOI: 10.1007/s40171-013-0047-4] [Citation(s) in RCA: 26] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
148
Crossler RE, Johnston AC, Lowry PB, Hu Q, Warkentin M, Baskerville R. Future directions for behavioral information security research. Comput Secur 2013. [DOI: 10.1016/j.cose.2012.09.010] [Citation(s) in RCA: 340] [Impact Index Per Article: 28.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
149
Sommestad T, Hallberg J. A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance. SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS 2013. [DOI: 10.1007/978-3-642-39218-4_20] [Citation(s) in RCA: 11] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/12/2022]
PrevPage 3 of 3 123Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA