Guest editorial

[1]  Göran Goldkuhl,et al.  Practice-based discourse analysis of information security policies , 2017, Comput. Secur..

[2]  P. Larsman,et al.  Coping With Paradoxical Demands Through an Organizational Climate of Perceived Organizational Support , 2017 .

[3]  Jai-Yeol Son,et al.  Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies , 2011, Inf. Manag..

[4]  S. Parker,et al.  A multiple climates approach to understanding business unit effectiveness , 2010 .

[5]  Barry W. Johnson Reflections A Perspective on Paradox and Its Application to Modern Management , 2014 .

[6]  Tero Vartiainen,et al.  What levels of moral reasoning and values explain adherence to information security rules? An empirical study , 2009, Eur. J. Inf. Syst..

[7]  Emmanuelle Vaast,et al.  Danger is in the eye of the beholders: Social representations of Information Systems security in healthcare , 2007, J. Strateg. Inf. Syst..

[8]  Budi Arief,et al.  Computer security impaired by legitimate users , 2004, Comput. Secur..

[9]  Fredrik Karlsson,et al.  Measuring employees' compliance - the importance of value pluralism , 2017, Inf. Comput. Secur..

[10]  Karin Hedström,et al.  Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method , 2017, J. Strateg. Inf. Syst..

[11]  Jonathan P. Allen,et al.  Value conflicts for information security management , 2011, J. Strateg. Inf. Syst..

[12]  Eirik Albrechtsen,et al.  A qualitative study of users' view on information security , 2007, Comput. Secur..

[13]  Wendy K. Smith,et al.  Paradox as a Metatheoretical Perspective , 2014 .

[14]  M. Angela Sasse,et al.  "Comply or Die" Is Dead: Long Live Security-Aware Principal Agents , 2013, Financial Cryptography Workshops.

[15]  Gurpreet Dhillon,et al.  Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..

[16]  John Rohrbaugh,et al.  A Spatial Model of Effectiveness Criteria: Towards a Competing Values Approach to Organizational Analysis , 1983 .

[17]  Karin Hedström,et al.  Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale , 2013, Inf. Manag. Comput. Secur..

[18]  Eirik Albrechtsen,et al.  The information security digital divide between information security managers and users , 2009, Comput. Secur..