An information security knowledge sharing model in organizations

[1]  Richard G. Lomax,et al.  A Beginner's Guide to Structural Equation Modeling , 2022 .

[2]  Satchidananda Dehuri,et al.  Artificial Neural Network , 2020, Encyclopedia of GIS.

[3]  Virgil D. Gligor,et al.  Information Security , 2016, Lecture Notes in Computer Science.

[4]  Nader Sohrabi Safa,et al.  Information security policy compliance model in organizations , 2016, Comput. Secur..

[5]  Steven Furnell,et al.  Information security conscious care behaviour formation in organizations , 2015, Comput. Secur..

[6]  J. Denollet,et al.  Theory of Planned Behavior , 2015 .

[7]  Izak Benbasat,et al.  Institutional pressures in security management: Direct and indirect influences on organizational investment in information security control resources , 2015, Inf. Manag..

[8]  Jordan Shropshire,et al.  Personality, attitudes, and intentions: Predicting initial adoption of information security behavior , 2015, Comput. Secur..

[9]  Justin Hepler A good thing isn’t always a good thing: Dispositional attitudes predict non-normative judgments , 2015 .

[10]  Xiangbin Yan,et al.  Information disclosure on social networking sites: An intrinsic-extrinsic motivation perspective , 2015, Comput. Hum. Behav..

[11]  Roy Gelbard,et al.  Knowledge sharing motivation among IT personnel: Integrated model and implications of employment contracts , 2014, Int. J. Inf. Manag..

[12]  Norjihan Abdul Ghani,et al.  AN ARTIFICIAL NEURAL NETWORK CLASSIFICATION APPROACH FOR IMPROVING ACCURACY OF CUSTOMER IDENTIFICATION IN E-COMMERCE , 2014 .

[13]  David C. Yen,et al.  How to facilitate inter-organizational knowledge sharing: The impact of trust , 2014, Inf. Manag..

[14]  Tsung Teng Chen,et al.  Knowledge sharing in interest online communities: A comparison of posters and lurkers , 2014, Comput. Hum. Behav..

[15]  Vala Ali Rohani,et al.  Evaluation model for knowledge sharing in information security professional virtual community , 2014, Comput. Secur..

[16]  Mathias Ekstedt,et al.  Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture , 2014, Comput. Secur..

[17]  Malcolm Robert Pattinson,et al.  Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q) , 2014, Comput. Secur..

[18]  Woong-Kyu Lee,et al.  The temporal relationships among habit, intention and IS uses , 2014, Comput. Hum. Behav..

[19]  Jemal H. Abawajy,et al.  User preference of cyber security awareness delivery methods , 2014, Behav. Inf. Technol..

[20]  Mo Adam Mahmood,et al.  Employees' adherence to information security policies: An exploratory field study , 2014, Inf. Manag..

[21]  Bin Gu,et al.  An investigation of information sharing and seeking behaviors in online investment communities , 2014, Comput. Hum. Behav..

[22]  Angela Titi Amayah Determinants of knowledge sharing in a public sector organization , 2013, J. Knowl. Manag..

[23]  Ying Li,et al.  Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory , 2013, Comput. Secur..

[24]  Rossouw von Solms,et al.  From information security to cyber security , 2013, Comput. Secur..

[25]  Mohd Sapiyan Bin Baba,et al.  Information security - Professional perceptions of knowledge-sharing intention under self-efficacy, trust, reciprocity, and shared-language , 2013, Comput. Educ..

[26]  Nader Sohrabi Safa,et al.  A customer loyalty formation model in electronic commerce , 2013 .

[27]  Shih-Ming Pi,et al.  A study of Facebook Groups members' knowledge sharing , 2013, Comput. Hum. Behav..

[28]  Stefan Fenz,et al.  Toward web-based information security knowledge sharing , 2013, Inf. Secur. Tech. Rep..

[29]  Heeseok Lee,et al.  The effects of individual motivations and social capital on employees' tacit and explicit knowledge sharing intentions , 2013, Int. J. Inf. Manag..

[30]  James Cox,et al.  Information systems user security: A structured model of the knowing-doing gap , 2012, Comput. Hum. Behav..

[31]  Mikko T. Siponen,et al.  Motivating IS security compliance: Insights from Habit and Protection Motivation Theory , 2012, Inf. Manag..

[32]  Vijay S. Mookerjee,et al.  Knowledge sharing and investment decisions in information security , 2011, Decis. Support Syst..

[33]  Kim-Kwang Raymond Choo The cyber threat landscape: Challenges and future research directions , 2011, Comput. Secur..

[34]  Tiffany A. Whittaker A Beginner's Guide to Structural Equation Modeling (3rd ed.) , 2011 .

[35]  Joon Koh,et al.  Individual, social, and organizational contexts for active knowledge sharing in communities of practice , 2011, Expert Syst. Appl..

[36]  Shin-Yuan Hung,et al.  The influence of intrinsic and extrinsic motivation on individuals' knowledge sharing behavior , 2011, Int. J. Hum. Comput. Stud..

[37]  Joon Koh,et al.  An Integrative Model for Knowledge Sharing in Communities-of-Practice , 2011, J. Knowl. Manag..

[38]  Martin F. Lynch,et al.  Motivation and Autonomy in Counseling, Psychotherapy, and Behavior Change: A Look at Theory and Practice 1ψ7 , 2011 .

[39]  Thiagarajan Ravichandran,et al.  Accessing External Knowledge: Intention of Knowledge Exchange in Virtual Community of Practice , 2011, 2011 44th Hawaii International Conference on System Sciences.

[40]  R. Noe,et al.  Knowledge sharing: A review and directions for future research , 2010 .

[41]  Rathindra Sarathy,et al.  Understanding compliance with internet use policy from the perspective of rational choice theory , 2010, Decis. Support Syst..

[42]  Young U. Ryu,et al.  Self-efficacy in information security: Its influence on end users' information security practice behavior , 2009, Comput. Secur..

[43]  K. Hawkey,et al.  Security practitioners in context: Their activities and interactions with other stakeholders within organizations , 2009, Int. J. Hum. Comput. Stud..

[44]  Shu-Chen Yang,et al.  International Journal of Information Management Social Capital, Behavioural Control, and Tacit Knowledge Sharing—a Multi-informant Design , 2022 .

[45]  Deborah J. Armstrong,et al.  Information Technology Employees in State Government , 2008 .

[46]  William R. King,et al.  Motivating knowledge sharing through a knowledge management system , 2008 .

[47]  Robert Ho,et al.  Handbook of Univariate and Multivariate Data Analysis and Interpretation with SPSS , 2006 .

[48]  Angel Cabrera,et al.  Determinants of individual engagement in knowledge sharing , 2006 .

[49]  Lori N. K. Leonard,et al.  What influences IT ethical behavior intentions - planned behavior, reasoned action, perceived importance, or individual characteristics? , 2004, Inf. Manag..

[50]  Rossouw von Solms,et al.  Towards information security behavioural compliance , 2004, Comput. Secur..

[51]  B. Byrne Structural equation modeling with EQS : basic concepts, applications, and programming , 2000 .

[52]  B. Byrne Book Review: Structural Equation Modeling with EQS and EQS/Windows: Basic Concepts, Applications, and Programming , 1994 .

[53]  I. Ajzen,et al.  Prediction of goal directed behaviour: Attitudes, intentions and perceived behavioural control , 1986 .

[54]  I. Ajzen,et al.  On construct validity: A critique of Miniard and Cohen's paper , 1981 .

[55]  Wei-Tsong Wang,et al.  Motivations of employees' knowledge sharing behaviors: A self-determination perspective , 2015, Inf. Organ..

[56]  Shari Lawrence Pfleeger,et al.  Going Spear Phishing: Exploring Embedded Training and Awareness , 2014, IEEE Security & Privacy.

[57]  Princely Ifinedo,et al.  Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition , 2014, Inf. Manag..

[58]  Jo Bryce,et al.  The role of disclosure of personal information in the evaluation of risk and trust in young peoples' online interactions , 2014, Comput. Hum. Behav..

[59]  Md. Rafiqul Islam,et al.  A multi-tier phishing detection and filtering approach , 2013, J. Netw. Comput. Appl..

[60]  Richard P. Bagozzi,et al.  Specification, evaluation, and interpretation of structural equation models , 2012 .

[61]  Hsin Hsin Chang,et al.  Social capital and individual motivations on knowledge sharing: Participant involvement as a moderator , 2011, Inf. Manag..

[62]  H C Triandis,et al.  Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.

[63]  W. Cooley,et al.  Multivariate Data Analysis. , 1973 .