• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4719176)   Today's Articles (1031)
For: Johnston AC, Warkentin M, Dennis AR, Siponen M. Speak their Language: Designing Effective Messages to Improve Employees’ Information Security Decision Making. Decision Sciences 2018. [DOI: 10.1111/deci.12328] [Citation(s) in RCA: 23] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
Number Cited by Other Article(s)
1
Jiang R, Zhang J. The impact of work pressure and work completion justification on intentional nonmalicious information security policy violation intention. Comput Secur 2023;130:103253. [PMID: 37091524 PMCID: PMC10079594 DOI: 10.1016/j.cose.2023.103253] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/05/2022] [Revised: 02/23/2023] [Accepted: 04/05/2023] [Indexed: 04/25/2023]
2
Mady A, Gupta S, Warkentin M. The effects of knowledge mechanisms on employees' information security threat construal. INFORMATION SYSTEMS JOURNAL 2023. [DOI: 10.1111/isj.12424] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/11/2023]
3
Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.103038] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/03/2022]
4
Ebert N, Ackermann KA, Bearth A. When information security depends on font size: how the saliency of warnings affects protection behavior. JOURNAL OF RISK RESEARCH 2022;26:233-255. [PMID: 36896244 PMCID: PMC9988306 DOI: 10.1080/13669877.2022.2142952] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/05/2022] [Revised: 10/07/2022] [Accepted: 10/24/2022] [Indexed: 06/18/2023]
5
Wang Q, Zhou F, Zhang W, Tang C. A study of parental decision-making over the vaccination of girls, based on the protection motivation theory and the elaboration likelihood model. Front Public Health 2022;10:1024399. [PMID: 36438257 PMCID: PMC9691002 DOI: 10.3389/fpubh.2022.1024399] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/21/2022] [Accepted: 10/27/2022] [Indexed: 11/12/2022]  Open
6
Seeking Rhetorical Validity in Fear Appeal Research: An Application of Rhetorical Theory. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.103020] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
7
Hassandoust F, Subasinghage M, Johnston AC. A neo-institutional perspective on the establishment of information security knowledge sharing practices. INFORMATION & MANAGEMENT 2022. [DOI: 10.1016/j.im.2021.103574] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
8
Chen Y, Galletta DF, Lowry PB, Luo X(R, Moody GD, Willison R. Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model. INFORMATION SYSTEMS RESEARCH 2021. [DOI: 10.1287/isre.2021.1014] [Citation(s) in RCA: 14] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
9
Vrhovec S, Mihelič A. Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102309] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/02/2023]
10
Can financial incentives help with the struggle for security policy compliance? INFORMATION & MANAGEMENT 2021. [DOI: 10.1016/j.im.2021.103447] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
11
Davis J, Agrawal D, Guo X. Enhancing users’ security engagement through cultivating commitment: the role of psychological needs fulfilment. EUR J INFORM SYST 2021. [DOI: 10.1080/0960085x.2021.1927866] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
12
Haag S, Siponen M, Liu F. Protection Motivation Theory in Information Systems Security Research. DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS 2021. [DOI: 10.1145/3462766.3462770] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
13
Jaeger L, Eckhardt A, Kroenung J. The role of deterrability for the effect of multi-level sanctions on information security policy compliance: Results of a multigroup analysis. INFORMATION & MANAGEMENT 2021. [DOI: 10.1016/j.im.2020.103318] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
14
Tang Z, Miller AS, Zhou Z, Warkentin M. Does government social media promote users' information security behavior towards COVID-19 scams? Cultivation effects and protective motivations. GOVERNMENT INFORMATION QUARTERLY 2021;38:101572. [PMID: 35719729 PMCID: PMC9188430 DOI: 10.1016/j.giq.2021.101572] [Citation(s) in RCA: 31] [Impact Index Per Article: 7.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Received: 07/08/2020] [Revised: 01/14/2021] [Accepted: 01/14/2021] [Indexed: 11/18/2022]
15
Schuetz SW, Benjamin Lowry P, Pienta DA, Bennett Thatcher J. The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security. J MANAGE INFORM SYST 2020. [DOI: 10.1080/07421222.2020.1790187] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
16
Integrating elaboration likelihood model and herd theory in information security message persuasiveness. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.102009] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
17
Orazi DC, Johnston AC. Running field experiments using Facebook split test. JOURNAL OF BUSINESS RESEARCH 2020;118:189-198. [PMID: 32834210 PMCID: PMC7331542 DOI: 10.1016/j.jbusres.2020.06.053] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 06/13/2019] [Revised: 06/21/2020] [Accepted: 06/23/2020] [Indexed: 06/11/2023]
18
Jensen ML, Durcikova A, Wright RT. Using susceptibility claims to motivate behaviour change in IT security. EUR J INFORM SYST 2020. [DOI: 10.1080/0960085x.2020.1793696] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
19
Bian J, Fu H, Jin J. Are We Sensitive to Different Types of Safety Signs? Evidence from ERPs. Psychol Res Behav Manag 2020;13:495-505. [PMID: 32581609 PMCID: PMC7279717 DOI: 10.2147/prbm.s248947] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/13/2020] [Accepted: 05/14/2020] [Indexed: 11/23/2022]  Open
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA