Volume 34, Number 3 — September 2010
Special Issue: Information Systems Security
Special Issue Articles
Detecting Fake Websites: The Contribution of Statistical Learning Theory
Ahmed Abbasi, Zhu Zhang, David Zimbra, Hsinchun Chen, Jay F. Nunamaker Jr.
(pp. 435-461)
Circuits of Power: A Study of Mandated Compliance to an Information Systems Security De Jure Standard in a Government Organization
Stephen Smith, Donald Winchester, Deborah Bunker, Rodger Jaimeson
(pp. 463-486)
Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations
Mikko Siponen and Anthony Vance
(pp. 487-502)
User Participation in Information Systems Security Risk Management
Janine L. Spears and Henri Barki
(pp. 503-522)
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
Burcu Bulgurcu, Hasan Cavusoglu, Izak Benbasat
(pp. 523-548)
Fear Appeals and Information Security Behaviors: An Empirical Study
Allen C. Johnston and Merrill Warkentin
(pp. 549-566)
Market Value of Voluntary Disclosures Concerning Information Security
Lawrence A. Gordon, Martin P. Loeb, and Tashfeen Sohail
(pp. 567-594)
The Impact of Malicious Agents on the Enterprise Software Industry
Michael R. Galbreth and Mikhael Shor
(pp. 595-612)
Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions
Catherine L. Anderson and Ritu Agarwal
(pp. 613-643)