Search for: security
- Related search terms
- Security+in+information
- security+of+information
- security+by+design+information
- security of information systems by design
- Security by Design in Enterprise Architecture: A Methodology Proposal
-
Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance
Year: 2019 / Volume: 43 / Issue: 2
$15.00 -
Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments
Year: 2018 / Volume: 42 / Issue: 2
$0.00 -
What Users Do Besides Problem-Focused Coping When Facing IT Security Threats: An Emotion-Focused Coping Perspective
Year: 2019 / Volume: 43 / Issue: 2
$15.00 -
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches
Year: 2017 / Volume: 41 / Issue: 3
$15.00 -
Examining the Neural Basis of Information Security Policy Violations: A Noninvasive Brain Stimulation Approach
Year: 2021 / Volume: 45 / Issue: 4
$15.00 -
What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors
Year: 2015 / Volume: 39 / Issue: 4
$15.00 -
Circuits of Power: A Study of Mandated Compliance to an Information Systems Security De Jure Standard in a Government Organization
Year: 2010 / Volume: 34 / Issue: 3
$15.00 -
*SIM Competition Paper:* Measuring Information Systems Performance: Experience with the Management By Results System at Security Pacific Bank
Year: 1988 / Volume: 12 / Issue: 2
$15.00 -
Do Security Fear Appeals Work When They Interrupt Tasks? A Multi-Method Examination of Password Strength (Open Access)
Year: 2022 / Volume: 46 / Issue: 3
$0.00 -
Are Markets for Vulnerabilities Effective?
Year: 2012 / Volume: 36 / Issue: 1
$15.00