Search for: Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security..
- Related search terms
- INFORMATION TECHNOLOGY INVESTMENTS AND FIRM RISK ACROSS INDUSTRIES: EVIDENCE FROM THE BOND MARKET
- INFORMATION TECHNOLOGY IDENTITY: A KEY DETERMINANT OF IT FEATURE AND EXPLORATORY USAGE.
What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors
Year: 2015 / Volume: 39 / Issue: 4$15.00
Implementing Security and Integrity in Micro-Mainframe Networks
Year: 1989 / Volume: 13 / Issue: 2$15.00
Beyond Deterrence: An Expanded View of Employee Computer Abuse
Year: 2013 / Volume: 37 / Issue: 1$15.00
Quality Competition and Market Segmentation in the Security Software Market
Year: 2014 / Volume: 38 / Issue: 2$15.00
The Merchant of Prato -- Revisited: Toward a Third Rationality of Information Systems
Year: 1998 / Volume: 22 / Issue: 2$15.00
Are Markets for Vulnerabilities Effective?
Year: 2012 / Volume: 36 / Issue: 1$15.00
Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors
Year: 2013 / Volume: 37 / Issue: 4$15.00
Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations
Year: 2015 / Volume: 39 / Issue: 2$15.00
Time Flies When You're Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage
Year: 2000 / Volume: 24 / Issue: 4$15.00
Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs
Year: 1999 / Volume: 23 / Issue: 2$15.00