Guest editorial
暂无分享,去创建一个
[1] Göran Goldkuhl,et al. Practice-based discourse analysis of information security policies , 2017, Comput. Secur..
[2] P. Larsman,et al. Coping With Paradoxical Demands Through an Organizational Climate of Perceived Organizational Support , 2017 .
[3] Jai-Yeol Son,et al. Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies , 2011, Inf. Manag..
[4] S. Parker,et al. A multiple climates approach to understanding business unit effectiveness , 2010 .
[5] Barry W. Johnson. Reflections A Perspective on Paradox and Its Application to Modern Management , 2014 .
[6] Tero Vartiainen,et al. What levels of moral reasoning and values explain adherence to information security rules? An empirical study , 2009, Eur. J. Inf. Syst..
[7] Emmanuelle Vaast,et al. Danger is in the eye of the beholders: Social representations of Information Systems security in healthcare , 2007, J. Strateg. Inf. Syst..
[8] Budi Arief,et al. Computer security impaired by legitimate users , 2004, Comput. Secur..
[9] Fredrik Karlsson,et al. Measuring employees' compliance - the importance of value pluralism , 2017, Inf. Comput. Secur..
[10] Karin Hedström,et al. Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method , 2017, J. Strateg. Inf. Syst..
[11] Jonathan P. Allen,et al. Value conflicts for information security management , 2011, J. Strateg. Inf. Syst..
[12] Eirik Albrechtsen,et al. A qualitative study of users' view on information security , 2007, Comput. Secur..
[13] Wendy K. Smith,et al. Paradox as a Metatheoretical Perspective , 2014 .
[14] M. Angela Sasse,et al. "Comply or Die" Is Dead: Long Live Security-Aware Principal Agents , 2013, Financial Cryptography Workshops.
[15] Gurpreet Dhillon,et al. Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..
[16] John Rohrbaugh,et al. A Spatial Model of Effectiveness Criteria: Towards a Competing Values Approach to Organizational Analysis , 1983 .
[17] Karin Hedström,et al. Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale , 2013, Inf. Manag. Comput. Secur..
[18] Eirik Albrechtsen,et al. The information security digital divide between information security managers and users , 2009, Comput. Secur..