• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4770042)   Today's Articles (2422)
For: Charbaji A, Jannoun SE. Individuality, willingness to take risk, and use of a personal e‐card. Journal of Managerial Psych 2005. [DOI: 10.1108/02683940510571649] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Number Cited by Other Article(s)
1
Kotlyar I, Karakowsky L, Jo Ducharme M, A. Boekhorst J. Do “rising stars” avoid risk?: status-based labels and decision making. LEADERSHIP & ORGANIZATION DEVELOPMENT JOURNAL 2014. [DOI: 10.1108/lodj-04-2012-0046] [Citation(s) in RCA: 10] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
2
Workman M. How perceptions of justice affect security attitudes: suggestions for practitioners and researchers. ACTA ACUST UNITED AC 2009. [DOI: 10.1108/09685220910993999] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
3
A field study of corporate employee monitoring: Attitudes, absenteeism, and the moderating influences of procedural justice perceptions. INFORMATION AND ORGANIZATION 2009. [DOI: 10.1016/j.infoandorg.2009.06.001] [Citation(s) in RCA: 18] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
4
Workman M. A test of interventions for security threats from social engineering. ACTA ACUST UNITED AC 2008. [DOI: 10.1108/09685220810920549] [Citation(s) in RCA: 38] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
5
Chen CC, Dawn Medlin B, Shaw R. A cross‐cultural investigation of situational information security awareness programs. ACTA ACUST UNITED AC 2008. [DOI: 10.1108/09685220810908787] [Citation(s) in RCA: 39] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
6
Workman M. Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security. ACTA ACUST UNITED AC 2008. [DOI: 10.1002/asi.20779] [Citation(s) in RCA: 112] [Impact Index Per Article: 6.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
7
Workman M. Gaining Access with Social Engineering: An Empirical Study of the Threat. ACTA ACUST UNITED AC 2007. [DOI: 10.1080/10658980701788165] [Citation(s) in RCA: 45] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA