Identifying Information Security Opinion Leaders in Organizations: Insights from the Theory of Social Power Bases and Social Network Analysis
暂无分享,去创建一个
Karlheinz Kautz | Siddhi Pittayachawan | Duy Dang-Pham | Ai-Phuong Hoang | S. Pittayachawan | Duy Dang-Pham | K. Kautz | A. Hoang
[1] Simon Parkin,et al. Learning from "Shadow Security": Why understanding non-compliant behaviors provides the basis for effective security , 2014 .
[2] Moneer Alshaikh,et al. Developing cybersecurity culture to influence employee behavior: A practice perspective , 2020, Comput. Secur..
[3] P. Bonacich. Power and Centrality: A Family of Measures , 1987, American Journal of Sociology.
[4] Steven Furnell,et al. From security policy to practice: Sending the right messages , 2010 .
[5] Roseanne J. Foti,et al. A test of leadership categorization theory: Internal structure, information processing, and leadership perceptions , 1984 .
[6] Scott D. Brown,et al. A simple introduction to Markov Chain Monte–Carlo sampling , 2016, Psychonomic bulletin & review.
[7] Dorothy R. Carter,et al. Incorporating social networks into leadership development: A conceptual model and evaluation of research and practice , 2017 .
[8] Irene M. Y. Woon,et al. Perceptions of Information Security at the Workplace : Linking Information Security Climate to Compliant Behavior , 2006 .
[9] Andrea Back,et al. Shadow it – A View from Behind the Curtain , 2014, Comput. Secur..
[10] Yong Lu,et al. Social Network Analysis of a Criminal Hacker Community , 2010, J. Comput. Inf. Syst..
[11] Qing Hu,et al. Future directions for behavioral information security research , 2013, Comput. Secur..
[12] Dazhong Wu,et al. Sanction severity and employees' information security policy compliance: Investigating mediating, moderating, and control variables , 2018, Inf. Manag..
[13] H. Kelman. PROCESSES OF OPINION CHANGE , 1961 .
[14] Mathias Ekstedt,et al. Shaping intention to resist social engineering through transformational leadership, information security culture and awareness , 2016, Comput. Secur..
[15] Merrill Warkentin,et al. Behavioral Information Security Management , 2014, Computing Handbook, 3rd ed..
[16] Edward T. Palazzolo,et al. Exponential Random Graph (p*) Models as a Method for Social Network Analysis in Communication Research , 2010 .
[17] Detmar W. Straub,et al. Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures , 2020, Inf. Manag..
[18] S. Furnell,et al. Understanding the influences on information security behaviour , 2012 .
[19] Simon Parkin,et al. Finding Security Champions in Blends of Organisational Culture , 2017 .
[20] Garry Robins,et al. An introduction to exponential random graph (p*) models for social networks , 2007, Soc. Networks.
[21] Jonathan Anderson,et al. Building an awareness-centered information security policy compliance model , 2019, Ind. Manag. Data Syst..
[22] Jessica E. Dinh,et al. Developments in implicit leadership theory and cognitive science: Applications to improving measurement and understanding alternatives to hierarchical leadership , 2010 .
[23] Jordan Shropshire,et al. The influence of the informal social learning environment on information privacy policy compliance efficacy and intention , 2011, Eur. J. Inf. Syst..
[24] M. Breitner,et al. Information security awareness and behavior: a theory-based literature review , 2014 .
[25] William H. Bommer,et al. Relationships between leader reward and punishment behavior and subordinate attitudes, perceptions, and behaviors: A meta-analytic review of existing and new research , 2006 .
[26] Heshan Sun,et al. A Longitudinal Study of Herd Behavior in the Adoption and Continued Use of Technology , 2013, MIS Q..
[27] Gurpreet Dhillon,et al. The Mediating Role of Psychological Empowerment in Information Security Compliance Intentions , 2020, J. Assoc. Inf. Syst..
[28] Michael A. Hogg,et al. A Social Identity Theory of Leadership , 2001 .
[29] D. Hunter,et al. Goodness of Fit of Social Network Models , 2008 .
[30] Richard A. Guzzo,et al. Types of Rewards, Cognitions, And Work Motivation , 1979 .
[31] Charles J. Geyer,et al. Practical Markov Chain Monte Carlo , 1992 .
[32] Paul Benjamin Lowry,et al. The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness , 2015, Inf. Syst. Res..
[33] B. Raven,et al. The Bases of Power and the Power/Interaction Model of Interpersonal Influence , 2008 .
[34] Steven Furnell,et al. Selecting security champions , 2011 .
[35] Noah J. Goldstein,et al. Social influence: compliance and conformity. , 2004, Annual review of psychology.
[36] In-Sue Oh,et al. Transformational Leadership and Performance Across Criteria and Levels: A Meta-Analytic Review of 25 Years of Research , 2011 .
[37] Rossouw von Solms,et al. An information security knowledge sharing model in organizations , 2016, Comput. Hum. Behav..
[38] Martina Morris,et al. A statnet Tutorial. , 2008, Journal of statistical software.
[39] Mary Kovach. Leader Influence: A Research Review of French & Raven’s (1959) Power Dynamics , 2020 .
[40] Dan Jong Kim,et al. A Path to Successful Management of Employee Security Compliance: An Empirical Study of Information Security Climate , 2014, IEEE Transactions on Professional Communication.
[41] Mo Adam Mahmood,et al. Employees' adherence to information security policies: An exploratory field study , 2014, Inf. Manag..
[42] J. R. French,et al. The bases of social power. , 1959 .
[43] Prasad Balkundi,et al. When managers become leaders: The role of manager network centralities, social power, and followers' perception of leadership , 2017 .
[44] M. McPherson,et al. Birds of a Feather: Homophily in Social Networks , 2001 .
[45] Stephen P. Borgatti,et al. Network Theory , 2013 .
[46] Steven M. Elias,et al. Social power and leadership in cross-cultural context , 2016 .
[47] Steven M. Goodreau,et al. Advances in exponential random graph (p*) models applied to a large social network , 2007, Soc. Networks.
[48] Stephen P. Borgatti,et al. Centrality and network flow , 2005, Soc. Networks.
[49] Teodor Sommestad,et al. Variables influencing information security policy compliance: A systematic review of quantitative studies , 2014, Inf. Manag. Comput. Secur..
[50] Steven Furnell,et al. Developing a cyber security culture: Current practices and future needs , 2021, Comput. Secur..
[51] F. Medina,et al. Power, Authority, and Leadership , 2004 .
[52] Merrill Warkentin,et al. Can Secure Behaviors Be Contagious? A Two-Stage Investigation of the Influence of Herd Behavior on Security Decisions , 2020, J. Assoc. Inf. Syst..
[53] Mathias Ekstedt,et al. Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture , 2014, Comput. Secur..
[54] Vimala Balakrishnan,et al. Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness , 2015 .
[55] Keshnee Padayachee,et al. Taxonomy of compliant information security behavior , 2012, Comput. Secur..
[56] HanByeol Stella Choi,et al. Leader power and employees’ information security policy compliance , 2019, Security Journal.
[57] Yajiong Xue,et al. Ensuring Employees' IT Compliance: Carrot or Stick? , 2013, Inf. Syst. Res..
[58] J. Håvold,et al. Power, trust and motivation in hospitals. , 2019, Leadership in health services.
[59] T. Judge,et al. Intelligence and leadership: a quantitative review and test of theoretical propositions. , 2004, The Journal of applied psychology.
[60] Sean B. Maynard,et al. Applying social marketing to evaluate current security education training and awareness programs in organisations , 2021, Comput. Secur..
[61] Moneer Alshaikh,et al. From awareness to influence: toward a model for improving employees’ security behaviour , 2021, Personal and Ubiquitous Computing.
[62] Vince Bruno,et al. Applications of social network analysis in behavioural information security research: Concepts and empirical analysis , 2017, Comput. Secur..
[63] M. Angela Sasse,et al. "Comply or Die" Is Dead: Long Live Security-Aware Principal Agents , 2013, Financial Cryptography Workshops.
[64] T. Snijders. Models for longitudinal network datain , 2005 .
[65] Nadine Guhr,et al. Transformational Leadership and Employees' Information Security Performance: The Mediating Role of Motivation and Climate , 2014, ICIS.
[66] Martina Morris,et al. ergm: A Package to Fit, Simulate and Diagnose Exponential-Family Models for Networks. , 2008, Journal of statistical software.
[67] Nico Martins,et al. Improving the information security culture through monitoring and implementation actions illustrated through a case study , 2015, Comput. Secur..
[68] Burak Oc,et al. Followership, leadership and social influence , 2013 .
[69] Lara Khansa,et al. Whither information security? Examining the complementarities and substitutive effects among IT and information security firms , 2012, Int. J. Inf. Manag..
[70] I. Ajzen. The theory of planned behavior , 1991 .
[71] R. E. Burnkrant,et al. Informational and Normative Social Influence in Buyer Behavior , 1975 .
[72] Vince Bruno,et al. Explaining the Development of Information Security Climate and an Information Security Support Network: A Longitudinal Social Network Analysis , 2019, Australas. J. Inf. Syst..
[73] Ping Wang,et al. Popular Concepts beyond Organizations : Exploring New Dimensions of Information Technology Innovations , 2009 .
[74] John W. Fleenor,et al. Advances in leader and leadership development: A review of 25years of research and theory , 2014 .
[75] Martina Morris,et al. statnet: Software Tools for the Representation, Visualization, Analysis and Simulation of Network Data. , 2008, Journal of statistical software.
[76] H. Ibarra. Homophily and differential returns: Sex differences in network structure and access in an advertising firm. , 1992 .
[77] Martina Morris,et al. Specification of Exponential-Family Random Graph Models: Terms and Computational Aspects. , 2008, Journal of statistical software.
[78] S. Matz,et al. An integrative model of leadership behavior , 2017 .