Identifying Information Security Opinion Leaders in Organizations: Insights from the Theory of Social Power Bases and Social Network Analysis

[1]  Simon Parkin,et al.  Learning from "Shadow Security": Why understanding non-compliant behaviors provides the basis for effective security , 2014 .

[2]  Moneer Alshaikh,et al.  Developing cybersecurity culture to influence employee behavior: A practice perspective , 2020, Comput. Secur..

[3]  P. Bonacich Power and Centrality: A Family of Measures , 1987, American Journal of Sociology.

[4]  Steven Furnell,et al.  From security policy to practice: Sending the right messages , 2010 .

[5]  Roseanne J. Foti,et al.  A test of leadership categorization theory: Internal structure, information processing, and leadership perceptions , 1984 .

[6]  Scott D. Brown,et al.  A simple introduction to Markov Chain Monte–Carlo sampling , 2016, Psychonomic bulletin & review.

[7]  Dorothy R. Carter,et al.  Incorporating social networks into leadership development: A conceptual model and evaluation of research and practice , 2017 .

[8]  Irene M. Y. Woon,et al.  Perceptions of Information Security at the Workplace : Linking Information Security Climate to Compliant Behavior , 2006 .

[9]  Andrea Back,et al.  Shadow it – A View from Behind the Curtain , 2014, Comput. Secur..

[10]  Yong Lu,et al.  Social Network Analysis of a Criminal Hacker Community , 2010, J. Comput. Inf. Syst..

[11]  Qing Hu,et al.  Future directions for behavioral information security research , 2013, Comput. Secur..

[12]  Dazhong Wu,et al.  Sanction severity and employees' information security policy compliance: Investigating mediating, moderating, and control variables , 2018, Inf. Manag..

[13]  H. Kelman PROCESSES OF OPINION CHANGE , 1961 .

[14]  Mathias Ekstedt,et al.  Shaping intention to resist social engineering through transformational leadership, information security culture and awareness , 2016, Comput. Secur..

[15]  Merrill Warkentin,et al.  Behavioral Information Security Management , 2014, Computing Handbook, 3rd ed..

[16]  Edward T. Palazzolo,et al.  Exponential Random Graph (p*) Models as a Method for Social Network Analysis in Communication Research , 2010 .

[17]  Detmar W. Straub,et al.  Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures , 2020, Inf. Manag..

[18]  S. Furnell,et al.  Understanding the influences on information security behaviour , 2012 .

[19]  Simon Parkin,et al.  Finding Security Champions in Blends of Organisational Culture , 2017 .

[20]  Garry Robins,et al.  An introduction to exponential random graph (p*) models for social networks , 2007, Soc. Networks.

[21]  Jonathan Anderson,et al.  Building an awareness-centered information security policy compliance model , 2019, Ind. Manag. Data Syst..

[22]  Jessica E. Dinh,et al.  Developments in implicit leadership theory and cognitive science: Applications to improving measurement and understanding alternatives to hierarchical leadership , 2010 .

[23]  Jordan Shropshire,et al.  The influence of the informal social learning environment on information privacy policy compliance efficacy and intention , 2011, Eur. J. Inf. Syst..

[24]  M. Breitner,et al.  Information security awareness and behavior: a theory-based literature review , 2014 .

[25]  William H. Bommer,et al.  Relationships between leader reward and punishment behavior and subordinate attitudes, perceptions, and behaviors: A meta-analytic review of existing and new research , 2006 .

[26]  Heshan Sun,et al.  A Longitudinal Study of Herd Behavior in the Adoption and Continued Use of Technology , 2013, MIS Q..

[27]  Gurpreet Dhillon,et al.  The Mediating Role of Psychological Empowerment in Information Security Compliance Intentions , 2020, J. Assoc. Inf. Syst..

[28]  Michael A. Hogg,et al.  A Social Identity Theory of Leadership , 2001 .

[29]  D. Hunter,et al.  Goodness of Fit of Social Network Models , 2008 .

[30]  Richard A. Guzzo,et al.  Types of Rewards, Cognitions, And Work Motivation , 1979 .

[31]  Charles J. Geyer,et al.  Practical Markov Chain Monte Carlo , 1992 .

[32]  Paul Benjamin Lowry,et al.  The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness , 2015, Inf. Syst. Res..

[33]  B. Raven,et al.  The Bases of Power and the Power/Interaction Model of Interpersonal Influence , 2008 .

[34]  Steven Furnell,et al.  Selecting security champions , 2011 .

[35]  Noah J. Goldstein,et al.  Social influence: compliance and conformity. , 2004, Annual review of psychology.

[36]  In-Sue Oh,et al.  Transformational Leadership and Performance Across Criteria and Levels: A Meta-Analytic Review of 25 Years of Research , 2011 .

[37]  Rossouw von Solms,et al.  An information security knowledge sharing model in organizations , 2016, Comput. Hum. Behav..

[38]  Martina Morris,et al.  A statnet Tutorial. , 2008, Journal of statistical software.

[39]  Mary Kovach Leader Influence: A Research Review of French & Raven’s (1959) Power Dynamics , 2020 .

[40]  Dan Jong Kim,et al.  A Path to Successful Management of Employee Security Compliance: An Empirical Study of Information Security Climate , 2014, IEEE Transactions on Professional Communication.

[41]  Mo Adam Mahmood,et al.  Employees' adherence to information security policies: An exploratory field study , 2014, Inf. Manag..

[42]  J. R. French,et al.  The bases of social power. , 1959 .

[43]  Prasad Balkundi,et al.  When managers become leaders: The role of manager network centralities, social power, and followers' perception of leadership , 2017 .

[44]  M. McPherson,et al.  Birds of a Feather: Homophily in Social Networks , 2001 .

[45]  Stephen P. Borgatti,et al.  Network Theory , 2013 .

[46]  Steven M. Elias,et al.  Social power and leadership in cross-cultural context , 2016 .

[47]  Steven M. Goodreau,et al.  Advances in exponential random graph (p*) models applied to a large social network , 2007, Soc. Networks.

[48]  Stephen P. Borgatti,et al.  Centrality and network flow , 2005, Soc. Networks.

[49]  Teodor Sommestad,et al.  Variables influencing information security policy compliance: A systematic review of quantitative studies , 2014, Inf. Manag. Comput. Secur..

[50]  Steven Furnell,et al.  Developing a cyber security culture: Current practices and future needs , 2021, Comput. Secur..

[51]  F. Medina,et al.  Power, Authority, and Leadership , 2004 .

[52]  Merrill Warkentin,et al.  Can Secure Behaviors Be Contagious? A Two-Stage Investigation of the Influence of Herd Behavior on Security Decisions , 2020, J. Assoc. Inf. Syst..

[53]  Mathias Ekstedt,et al.  Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture , 2014, Comput. Secur..

[54]  Vimala Balakrishnan,et al.  Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness , 2015 .

[55]  Keshnee Padayachee,et al.  Taxonomy of compliant information security behavior , 2012, Comput. Secur..

[56]  HanByeol Stella Choi,et al.  Leader power and employees’ information security policy compliance , 2019, Security Journal.

[57]  Yajiong Xue,et al.  Ensuring Employees' IT Compliance: Carrot or Stick? , 2013, Inf. Syst. Res..

[58]  J. Håvold,et al.  Power, trust and motivation in hospitals. , 2019, Leadership in health services.

[59]  T. Judge,et al.  Intelligence and leadership: a quantitative review and test of theoretical propositions. , 2004, The Journal of applied psychology.

[60]  Sean B. Maynard,et al.  Applying social marketing to evaluate current security education training and awareness programs in organisations , 2021, Comput. Secur..

[61]  Moneer Alshaikh,et al.  From awareness to influence: toward a model for improving employees’ security behaviour , 2021, Personal and Ubiquitous Computing.

[62]  Vince Bruno,et al.  Applications of social network analysis in behavioural information security research: Concepts and empirical analysis , 2017, Comput. Secur..

[63]  M. Angela Sasse,et al.  "Comply or Die" Is Dead: Long Live Security-Aware Principal Agents , 2013, Financial Cryptography Workshops.

[64]  T. Snijders Models for longitudinal network datain , 2005 .

[65]  Nadine Guhr,et al.  Transformational Leadership and Employees' Information Security Performance: The Mediating Role of Motivation and Climate , 2014, ICIS.

[66]  Martina Morris,et al.  ergm: A Package to Fit, Simulate and Diagnose Exponential-Family Models for Networks. , 2008, Journal of statistical software.

[67]  Nico Martins,et al.  Improving the information security culture through monitoring and implementation actions illustrated through a case study , 2015, Comput. Secur..

[68]  Burak Oc,et al.  Followership, leadership and social influence , 2013 .

[69]  Lara Khansa,et al.  Whither information security? Examining the complementarities and substitutive effects among IT and information security firms , 2012, Int. J. Inf. Manag..

[70]  I. Ajzen The theory of planned behavior , 1991 .

[71]  R. E. Burnkrant,et al.  Informational and Normative Social Influence in Buyer Behavior , 1975 .

[72]  Vince Bruno,et al.  Explaining the Development of Information Security Climate and an Information Security Support Network: A Longitudinal Social Network Analysis , 2019, Australas. J. Inf. Syst..

[73]  Ping Wang,et al.  Popular Concepts beyond Organizations : Exploring New Dimensions of Information Technology Innovations , 2009 .

[74]  John W. Fleenor,et al.  Advances in leader and leadership development: A review of 25years of research and theory , 2014 .

[75]  Martina Morris,et al.  statnet: Software Tools for the Representation, Visualization, Analysis and Simulation of Network Data. , 2008, Journal of statistical software.

[76]  H. Ibarra Homophily and differential returns: Sex differences in network structure and access in an advertising firm. , 1992 .

[77]  Martina Morris,et al.  Specification of Exponential-Family Random Graph Models: Terms and Computational Aspects. , 2008, Journal of statistical software.

[78]  S. Matz,et al.  An integrative model of leadership behavior , 2017 .