• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4719596)   Today's Articles (1045)
For:  [Subscribe] [Scholar Register]
Number Cited by Other Article(s)
1
Li Y, Greer A, Wu HC. Applying the extended parallel process model to understand households' responses to tornado and earthquake risks in Oklahoma. RISK ANALYSIS : AN OFFICIAL PUBLICATION OF THE SOCIETY FOR RISK ANALYSIS 2024;44:408-424. [PMID: 37296491 DOI: 10.1111/risa.14176] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/13/2022] [Revised: 04/07/2023] [Accepted: 05/25/2023] [Indexed: 06/12/2023]
2
What are the trend and core knowledge of information security? A citation and co-citation analysis. INFORMATION & MANAGEMENT 2023. [DOI: 10.1016/j.im.2023.103774] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/17/2023]
3
Sarfraz M, Khawaja KF, Um-e-Farwah. Is the internet a double-edged sword for organizations? An empirical study on cyberloafing. INFORMATION TECHNOLOGY & MANAGEMENT 2023. [DOI: 10.1007/s10799-022-00385-5] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/05/2023]
4
Wu AY, Hanus B, Xue B, Mahto RV. Information Security Ignorance: An Exploration of the Concept and Its Antecedents. INFORMATION & MANAGEMENT 2023. [DOI: 10.1016/j.im.2023.103753] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/13/2023]
5
Tejay GP, Mohammed ZA. Cultivating Security Culture for Information Security Success: A Mixed-Methods Study Based on Anthropological Perspective. INFORMATION & MANAGEMENT 2022. [DOI: 10.1016/j.im.2022.103751] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/31/2022]
6
The influence of inputs in the information security policy development: an institutional perspective. TRANSFORMING GOVERNMENT- PEOPLE PROCESS AND POLICY 2022. [DOI: 10.1108/tg-03-2022-0030] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
7
Antecedents and consequences of data breaches: A systematic review. INFORMATION & MANAGEMENT 2022. [DOI: 10.1016/j.im.2022.103638] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
8
Chen H, Liu M, Lyu T. Understanding employees’ information security–related stress and policy compliance intention: the roles of information security fatigue and psychological capital. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-03-2022-0047] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
9
Nord J, Sargent CS, Koohang A, Marotta A. Predictors of Success in Information Security Policy Compliance. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2022. [DOI: 10.1080/08874417.2022.2067795] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
10
Ali RF, Dominic PDD. Investigation of information security policy violations among oil and gas employees: A security-related stress and avoidance coping perspective. J Inf Sci 2022. [DOI: 10.1177/01655515221087680] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
11
Discovering the interplay between defensive avoidance and continued use intention of anti-malware software among experienced home users: A moderated mediation model. INFORMATION & MANAGEMENT 2022. [DOI: 10.1016/j.im.2021.103586] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
12
Chen Y, Luo X(R, Li H. Beyond adaptive security coping behaviors: Theory and empirical evidence. INFORMATION & MANAGEMENT 2022. [DOI: 10.1016/j.im.2021.103575] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
13
Xue B, Warkentin M, Mutchler LA, Balozian P. Self-efficacy in Information Security: A Replication Study. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2021. [DOI: 10.1080/08874417.2021.2015725] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA