• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4719281)   Today's Articles (1036)
For: Bauer S, Bernroider EW. From Information Security Awareness to Reasoned Compliant Action. SIGMIS Database 2017. [DOI: 10.1145/3130515.3130519] [Citation(s) in RCA: 22] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
Number Cited by Other Article(s)
1
There's No place like home: Understanding users' intentions toward securing internet-of-things (IoT) smart home networks. COMPUTERS IN HUMAN BEHAVIOR 2023. [DOI: 10.1016/j.chb.2022.107551] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
2
Wu AY, Hanus B, Xue B, Mahto RV. Information Security Ignorance: An Exploration of the Concept and Its Antecedents. INFORMATION & MANAGEMENT 2023. [DOI: 10.1016/j.im.2023.103753] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/13/2023]
3
Akter S, Uddin MR, Sajib S, Lee WJT, Michael K, Hossain MA. Reconceptualizing cybersecurity awareness capability in the data-driven digital economy. ANNALS OF OPERATIONS RESEARCH 2022:1-26. [PMID: 35935743 PMCID: PMC9345286 DOI: 10.1007/s10479-022-04844-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Accepted: 06/16/2022] [Indexed: 05/03/2023]
4
Information systems security research agenda: Exploring the gap between research and practice. JOURNAL OF STRATEGIC INFORMATION SYSTEMS 2021. [DOI: 10.1016/j.jsis.2021.101693] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
5
Walser R, Cram WA, Bernroider EW, Wiener M. Control choices and enactments in IS development projects: Implications for legitimacy perceptions and compliance intentions. INFORMATION & MANAGEMENT 2021. [DOI: 10.1016/j.im.2021.103522] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
6
Hu S, Hsu C, Zhou Z. Security Education, Training, and Awareness Programs: Literature Review. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2021. [DOI: 10.1080/08874417.2021.1913671] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
7
Jaeger L, Eckhardt A. Eyes wide open: The role of situational information security awareness for security‐related behaviour. INFORMATION SYSTEMS JOURNAL 2020. [DOI: 10.1111/isj.12317] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/21/2022]
8
Theory-Based Model and Prediction Analysis of Information Security Compliance Behavior in the Saudi Healthcare Sector. Symmetry (Basel) 2020. [DOI: 10.3390/sym12091544] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
9
Lian JW. Understanding cloud-based BYOD information security protection behaviour in smart business: in perspective of perceived value. ENTERP INF SYST-UK 2020. [DOI: 10.1080/17517575.2020.1791966] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
10
Wiafe I, Koranteng FN, Wiafe A, Obeng EN, Yaokumah W. The role of norms in information security policy compliance. INFORMATION AND COMPUTER SECURITY 2020. [DOI: 10.1108/ics-08-2019-0095] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
11
Stakeholder perceptions of information security policy: Analyzing personal constructs. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2020. [DOI: 10.1016/j.ijinfomgt.2019.04.011] [Citation(s) in RCA: 19] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
12
Rostami E, Karlsson F, Kolkowska E. The hunt for computerized support in information security policy management. INFORMATION AND COMPUTER SECURITY 2020. [DOI: 10.1108/ics-07-2019-0079] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
13
Institutional governance and protection motivation: Theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world. Comput Secur 2019. [DOI: 10.1016/j.cose.2019.101594] [Citation(s) in RCA: 32] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
14
Mutchler LA. Response awareness and instructional self-efficacy: influences on intent. INFORMATION AND COMPUTER SECURITY 2019. [DOI: 10.1108/ics-05-2018-0061] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
15
Vedadi A, Warkentin M. Secure Behavior over Time. DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS 2018. [DOI: 10.1145/3210530.3210534] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/17/2022]
16
Ifinedo P. Roles of Organizational Climate, Social Bonds, and Perceptions of Security Threats on IS Security Policy Compliance Intentions. INFORMATION RESOURCES MANAGEMENT JOURNAL 2018. [DOI: 10.4018/irmj.2018010103] [Citation(s) in RCA: 18] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
17
D'Arcy J, Lowry PB. Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study. INFORMATION SYSTEMS JOURNAL 2017. [DOI: 10.1111/isj.12173] [Citation(s) in RCA: 72] [Impact Index Per Article: 9.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
18
Bauer S, Bernroider EW, Chudzikowski K. Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks. Comput Secur 2017. [DOI: 10.1016/j.cose.2017.04.009] [Citation(s) in RCA: 49] [Impact Index Per Article: 6.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA