An information security knowledge sharing model in organizations
暂无分享,去创建一个
[1] Richard G. Lomax,et al. A Beginner's Guide to Structural Equation Modeling , 2022 .
[2] Satchidananda Dehuri,et al. Artificial Neural Network , 2020, Encyclopedia of GIS.
[3] Virgil D. Gligor,et al. Information Security , 2016, Lecture Notes in Computer Science.
[4] Nader Sohrabi Safa,et al. Information security policy compliance model in organizations , 2016, Comput. Secur..
[5] Steven Furnell,et al. Information security conscious care behaviour formation in organizations , 2015, Comput. Secur..
[6] J. Denollet,et al. Theory of Planned Behavior , 2015 .
[7] Izak Benbasat,et al. Institutional pressures in security management: Direct and indirect influences on organizational investment in information security control resources , 2015, Inf. Manag..
[8] Jordan Shropshire,et al. Personality, attitudes, and intentions: Predicting initial adoption of information security behavior , 2015, Comput. Secur..
[9] Justin Hepler. A good thing isn’t always a good thing: Dispositional attitudes predict non-normative judgments , 2015 .
[10] Xiangbin Yan,et al. Information disclosure on social networking sites: An intrinsic-extrinsic motivation perspective , 2015, Comput. Hum. Behav..
[11] Roy Gelbard,et al. Knowledge sharing motivation among IT personnel: Integrated model and implications of employment contracts , 2014, Int. J. Inf. Manag..
[12] Norjihan Abdul Ghani,et al. AN ARTIFICIAL NEURAL NETWORK CLASSIFICATION APPROACH FOR IMPROVING ACCURACY OF CUSTOMER IDENTIFICATION IN E-COMMERCE , 2014 .
[13] David C. Yen,et al. How to facilitate inter-organizational knowledge sharing: The impact of trust , 2014, Inf. Manag..
[14] Tsung Teng Chen,et al. Knowledge sharing in interest online communities: A comparison of posters and lurkers , 2014, Comput. Hum. Behav..
[15] Vala Ali Rohani,et al. Evaluation model for knowledge sharing in information security professional virtual community , 2014, Comput. Secur..
[16] Mathias Ekstedt,et al. Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture , 2014, Comput. Secur..
[17] Malcolm Robert Pattinson,et al. Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q) , 2014, Comput. Secur..
[18] Woong-Kyu Lee,et al. The temporal relationships among habit, intention and IS uses , 2014, Comput. Hum. Behav..
[19] Jemal H. Abawajy,et al. User preference of cyber security awareness delivery methods , 2014, Behav. Inf. Technol..
[20] Mo Adam Mahmood,et al. Employees' adherence to information security policies: An exploratory field study , 2014, Inf. Manag..
[21] Bin Gu,et al. An investigation of information sharing and seeking behaviors in online investment communities , 2014, Comput. Hum. Behav..
[22] Angela Titi Amayah. Determinants of knowledge sharing in a public sector organization , 2013, J. Knowl. Manag..
[23] Ying Li,et al. Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory , 2013, Comput. Secur..
[24] Rossouw von Solms,et al. From information security to cyber security , 2013, Comput. Secur..
[25] Mohd Sapiyan Bin Baba,et al. Information security - Professional perceptions of knowledge-sharing intention under self-efficacy, trust, reciprocity, and shared-language , 2013, Comput. Educ..
[26] Nader Sohrabi Safa,et al. A customer loyalty formation model in electronic commerce , 2013 .
[27] Shih-Ming Pi,et al. A study of Facebook Groups members' knowledge sharing , 2013, Comput. Hum. Behav..
[28] Stefan Fenz,et al. Toward web-based information security knowledge sharing , 2013, Inf. Secur. Tech. Rep..
[29] Heeseok Lee,et al. The effects of individual motivations and social capital on employees' tacit and explicit knowledge sharing intentions , 2013, Int. J. Inf. Manag..
[30] James Cox,et al. Information systems user security: A structured model of the knowing-doing gap , 2012, Comput. Hum. Behav..
[31] Mikko T. Siponen,et al. Motivating IS security compliance: Insights from Habit and Protection Motivation Theory , 2012, Inf. Manag..
[32] Vijay S. Mookerjee,et al. Knowledge sharing and investment decisions in information security , 2011, Decis. Support Syst..
[33] Kim-Kwang Raymond Choo. The cyber threat landscape: Challenges and future research directions , 2011, Comput. Secur..
[34] Tiffany A. Whittaker. A Beginner's Guide to Structural Equation Modeling (3rd ed.) , 2011 .
[35] Joon Koh,et al. Individual, social, and organizational contexts for active knowledge sharing in communities of practice , 2011, Expert Syst. Appl..
[36] Shin-Yuan Hung,et al. The influence of intrinsic and extrinsic motivation on individuals' knowledge sharing behavior , 2011, Int. J. Hum. Comput. Stud..
[37] Joon Koh,et al. An Integrative Model for Knowledge Sharing in Communities-of-Practice , 2011, J. Knowl. Manag..
[38] Martin F. Lynch,et al. Motivation and Autonomy in Counseling, Psychotherapy, and Behavior Change: A Look at Theory and Practice 1ψ7 , 2011 .
[39] Thiagarajan Ravichandran,et al. Accessing External Knowledge: Intention of Knowledge Exchange in Virtual Community of Practice , 2011, 2011 44th Hawaii International Conference on System Sciences.
[40] R. Noe,et al. Knowledge sharing: A review and directions for future research , 2010 .
[41] Rathindra Sarathy,et al. Understanding compliance with internet use policy from the perspective of rational choice theory , 2010, Decis. Support Syst..
[42] Young U. Ryu,et al. Self-efficacy in information security: Its influence on end users' information security practice behavior , 2009, Comput. Secur..
[43] K. Hawkey,et al. Security practitioners in context: Their activities and interactions with other stakeholders within organizations , 2009, Int. J. Hum. Comput. Stud..
[44] Shu-Chen Yang,et al. International Journal of Information Management Social Capital, Behavioural Control, and Tacit Knowledge Sharing—a Multi-informant Design , 2022 .
[45] Deborah J. Armstrong,et al. Information Technology Employees in State Government , 2008 .
[46] William R. King,et al. Motivating knowledge sharing through a knowledge management system , 2008 .
[47] Robert Ho,et al. Handbook of Univariate and Multivariate Data Analysis and Interpretation with SPSS , 2006 .
[48] Angel Cabrera,et al. Determinants of individual engagement in knowledge sharing , 2006 .
[49] Lori N. K. Leonard,et al. What influences IT ethical behavior intentions - planned behavior, reasoned action, perceived importance, or individual characteristics? , 2004, Inf. Manag..
[50] Rossouw von Solms,et al. Towards information security behavioural compliance , 2004, Comput. Secur..
[51] B. Byrne. Structural equation modeling with EQS : basic concepts, applications, and programming , 2000 .
[52] B. Byrne. Book Review: Structural Equation Modeling with EQS and EQS/Windows: Basic Concepts, Applications, and Programming , 1994 .
[53] I. Ajzen,et al. Prediction of goal directed behaviour: Attitudes, intentions and perceived behavioural control , 1986 .
[54] I. Ajzen,et al. On construct validity: A critique of Miniard and Cohen's paper , 1981 .
[55] Wei-Tsong Wang,et al. Motivations of employees' knowledge sharing behaviors: A self-determination perspective , 2015, Inf. Organ..
[56] Shari Lawrence Pfleeger,et al. Going Spear Phishing: Exploring Embedded Training and Awareness , 2014, IEEE Security & Privacy.
[57] Princely Ifinedo,et al. Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition , 2014, Inf. Manag..
[58] Jo Bryce,et al. The role of disclosure of personal information in the evaluation of risk and trust in young peoples' online interactions , 2014, Comput. Hum. Behav..
[59] Md. Rafiqul Islam,et al. A multi-tier phishing detection and filtering approach , 2013, J. Netw. Comput. Appl..
[60] Richard P. Bagozzi,et al. Specification, evaluation, and interpretation of structural equation models , 2012 .
[61] Hsin Hsin Chang,et al. Social capital and individual motivations on knowledge sharing: Participant involvement as a moderator , 2011, Inf. Manag..
[62] H C Triandis,et al. Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.
[63] W. Cooley,et al. Multivariate Data Analysis. , 1973 .