Search for: Security+in+information
-
Do Security Fear Appeals Work When They Interrupt Tasks? A Multi-Method Examination of Password Strength (Open Access)
Year: 2022 / Volume: 46 / Issue: 3
$0.00 -
Phishing Susceptibility in Context: A Multi-level Information Processing Perspective on Deception Detection
Year: 0 / Volume: Forthcoming / Issue: Forthcoming
$15.00Out of stock -
Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors
Year: 2013 / Volume: 37 / Issue: 4
$15.00 -
Discovering and Disciplining Computer Abuse in Organizations: A Field Study
Year: 1990 / Volume: 14 / Issue: 1
$15.00 -
Drawing a Line in the Sand: Commitment Problem in Ending Software Support
Year: 2017 / Volume: 41 / Issue: 4
$15.00 -
Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective
Year: 2007 / Volume: 31 / Issue: 1
$15.00 -
Are Markets for Vulnerabilities Effective?
Year: 2012 / Volume: 36 / Issue: 1
$15.00 -
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
Year: 2015 / Volume: 39 / Issue: 1
$15.00 -
Differential Effects of Prior Experience on the Malware Resolution Process
Year: 2014 / Volume: 38 / Issue: 3
$15.00 -
The Information Center Concept: A Normative Model and a Study of Six Installations
Year: 1987 / Volume: 11 / Issue: 4
$15.00