Response biases in policy compliance research
暂无分享,去创建一个
[1] Tamara Dinev,et al. Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture , 2012, Decis. Sci..
[2] Catherine E. Connelly,et al. Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model , 2011, J. Manag. Inf. Syst..
[3] Eirik Albrechtsen,et al. The information security digital divide between information security managers and users , 2009, Comput. Secur..
[4] Ilse De Bourdeaudhuij,et al. Addressing overreporting on the International Physical Activity Questionnaire (IPAQ) telephone survey with a population sample , 2003, Public Health Nutrition.
[5] Brian J. Taylor,et al. Factorial Surveys: Using Vignettes to Study Professional Judgement , 2005 .
[6] D. R. Chase,et al. The accuracy of self-reported participation rates. , 1983 .
[7] Princely Ifinedo,et al. Critical Times for Organizations: What Should Be Done to Curb Workers’ Noncompliance With IS Security Policy Guidelines? , 2016, Inf. Syst. Manag..
[8] Princely Ifinedo,et al. Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition , 2014, Inf. Manag..
[9] Peter B. Smith. Acquiescent Response Bias as an Aspect of Cultural Communication Style , 2004 .
[10] Rathindra Sarathy,et al. Exploring the effects of organizational justice, personal ethics and sanction on internet use policy compliance , 2014, Inf. Syst. J..
[11] Mikko T. Siponen,et al. Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..
[12] Tom L. Roberts,et al. The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets , 2015, J. Manag. Inf. Syst..
[13] S. Stryker,et al. The Causal Ordering of Prominence and Salience in Identity Theory , 2014, Social psychology quarterly.
[14] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[15] Mikko T. Siponen,et al. IS Security Policy Violations: A Rational Choice Perspective , 2012, J. Organ. End User Comput..
[16] Teodor Sommestad,et al. Variables influencing information security policy compliance: A systematic review of quantitative studies , 2014, Inf. Manag. Comput. Secur..
[17] Anne-Wil Harzing. Response Styles in Cross-national Survey Research , 2006 .
[18] Princely Ifinedo,et al. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory , 2012, Comput. Secur..
[19] D. Marlowe,et al. A new scale of social desirability independent of psychopathology. , 1960, Journal of consulting psychology.
[20] Wenli Li,et al. Understanding personal use of the Internet at work: An integrated model of neutralization techniques and general deterrence theory , 2014, Comput. Hum. Behav..
[21] Tejaswini Herath,et al. Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective , 2014, J. Manag. Inf. Syst..
[22] Ying Li,et al. Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory , 2013, Comput. Secur..
[23] Teodor Sommestad,et al. The sufficiency of the theory of planned behavior for explaining information security policy compliance , 2015, Inf. Comput. Secur..
[24] R Ballard,et al. Short Forms of the Marlowe-Crowne Social Desirability Scale , 1992, Psychological reports.
[25] Jai-Yeol Son,et al. Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies , 2011, Inf. Manag..
[26] Patrick Y. K. Chau,et al. Explaining the Misuse of Information Systems Resources in the Workplace: A Dual-Process Approach , 2014, Journal of Business Ethics.
[27] J. Delamater,et al. Measurement Directiveness as a Cause of Response Bias , 2016 .
[28] J. Delamater,et al. Lies, Damned Lies, and Survey Self-Reports? Identity as a Cause of Measurement Bias , 2016, Social psychology quarterly.
[29] Mo Adam Mahmood,et al. Employees' adherence to information security policies: An exploratory field study , 2014, Inf. Manag..
[30] V. Grover,et al. An assessment of survey research in POM: from constructs to theory , 1998 .
[31] Chaim Noy,et al. Sampling Knowledge: The Hermeneutics of Snowball Sampling in Qualitative Research , 2008 .
[32] P. Cronin,et al. Undertaking a literature review: a step-by-step approach. , 2008, British journal of nursing.
[33] Steven Furnell,et al. Information security conscious care behaviour formation in organizations , 2015, Comput. Secur..
[34] Bonnie Brinton Anderson,et al. Using Measures of Risk Perception to Predict Information Security Behavior: Insights from Electroencephalography (EEG) , 2014, J. Assoc. Inf. Syst..
[35] Lemuria Carter,et al. Dispositional and situational factors: influences on information security policy violations , 2016, Eur. J. Inf. Syst..
[36] P. Biernacki,et al. Snowball Sampling: Problems and Techniques of Chain Referral Sampling , 1981 .
[37] Dan Jong Kim,et al. A Path to Successful Management of Employee Security Compliance: An Empirical Study of Information Security Climate , 2014, IEEE Transactions on Professional Communication.
[38] Roberto J. Mejias,et al. Nontechnical Deterrence Effects of Mild and Severe Internet Use Policy Reminders in Reducing Employee Internet Abuse , 2016, Int. J. Hum. Comput. Interact..