Information System Security Goals
暂无分享,去创建一个
[1] Edwin A. Locke,et al. Cognitive and motivational effects of participation: A mediator study , 1994 .
[2] A. Bandura. Self-Efficacy: The Exercise of Control , 1997, Journal of Cognitive Psychotherapy.
[3] James Backhouse,et al. Structures of responsibility and security of information systems , 1996 .
[4] Wanda J. Orlikowski,et al. Technological frames: making sense of information technology in organizations , 1994, TOIS.
[5] Juergen Wegge,et al. Participation in Group Goal Setting: Some Novel Findings and a Comprehensive Model as a New Ending to an Old Story , 2000 .
[6] Geoff Walsham,et al. Interpretive case studies in IS research: nature and method , 1995 .
[7] Eirik Albrechtsen,et al. A qualitative study of users' view on information security , 2007, Comput. Secur..
[8] Hervé Debar,et al. Security information management as an outsourced service , 2006, Inf. Manag. Comput. Secur..
[9] Gurpreet Dhillon,et al. Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..
[10] Mikko T. Siponen,et al. Which Factors Explain Employees' Adherence to Information Security Policies? An Empirical Study , 2007, PACIS.
[11] D. Gefen,et al. Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services , 2004 .
[12] Edwin A. Locke,et al. The Relationship of Team Goals, Incentives, and Efficacy to Strategic Risk, Tactical Implementation, and Performance , 2001 .
[13] Henry L. Tosi. A Theory of Goal Setting and Task Performance , 1991 .
[14] Gerard H. Seijts,et al. The Construct of Goal Commitment: Measurement And Relationships with Task Performance , 2000 .
[15] John E. Hunter,et al. The Discard of Study Evidence by Literature Reviewers , 1994 .
[16] Michael Workman,et al. Gaining Access with Social Engineering: An Empirical Study of the Threat , 2007, Inf. Secur. J. A Glob. Perspect..
[17] Izak Benbasat,et al. The Case Research Strategy in Studies of Information Systems , 1987, MIS Q..
[18] A. K. Majumder,et al. International Journal of Advanced Science and Technology , 2013 .
[19] Helen L. James,et al. Managing information systems security: a soft approach , 1996, Proceedings of 1996 Information Systems Conference of New Zealand.
[20] Patrick Finnegan,et al. Challenging the hierarchical perspective on information systems: implications from external information analysis , 1999, J. Inf. Technol..
[21] Joseph S. Valacich,et al. Virtual Team Trust: Instrument Development and Validation in an IS Educational Environment , 2003, Inf. Resour. Manag. J..
[22] Matthew B. Miles,et al. Qualitative Data Analysis: An Expanded Sourcebook , 1994 .
[23] Marie Wilson,et al. Shared cognition : mapping commonality and individuality , 1999 .
[24] Dwight D. Frink,et al. A Review of the Influence of Group Goals on Group Performance , 1994 .
[25] L. Weingart. Impact of group goals, task component complexity, effort, and planning on group performance , 1992 .
[26] Kalle Lyytinen,et al. Information systems development and data modelling: conceptual and philosophical foundations , 1995 .
[27] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[28] Jeffrey Katz. Winning Through Innovation , 1997 .
[29] Vj. Janesick. The choreography of qualitative research design , 2000 .
[30] E. A. Locke,et al. NEGATIVE SELF-EFFICACY AND GOAL REVISITED , 2003 .
[31] K. Eisenhardt. Building theories from case study research , 1989, STUDI ORGANIZZATIVI.
[32] Karen A. Forcht,et al. Doing business on the Internet: marketing and security aspects , 1996, Inf. Manag. Comput. Secur..
[33] A. Elliot. A Conceptual History of the Achievement Goal Construct. , 2005 .
[34] W. Firestone,et al. Multisite Qualitative Policy Research: Optimizing Description and Generalizability , 1983 .
[35] David Gefen,et al. Some antecedents and effects of trust in virtual communities , 2002, J. Strateg. Inf. Syst..
[36] John B. Miner,et al. The Rated Importance, Scientific Validity, and Practical Usefulness of Organizational Behavior Theories: A Quantitative Review , 2003 .
[37] Rossouw von Solms,et al. Information Security Governance: A model based on the Direct-Control Cycle , 2006, Comput. Secur..
[38] K. V. Andersen. EDI and Data Networking in the Public Sector , 1998 .
[39] John Leach,et al. Improving user security behaviour , 2003, Comput. Secur..
[40] Wanda J. Orlikowski,et al. Studying Information Technology in Organizations: Research Approaches and Assumptions , 1991, Inf. Syst. Res..
[41] Angèle L. M. Cavaye,et al. Case study research: a multi‐faceted research approach for IS , 1996, Inf. Syst. J..
[42] Douglas N. Jackson,et al. Problems and solutions in human assessment : honoring Douglas N. Jackson at seventy , 2000 .
[43] Robert D. Pritchard,et al. Productivity Measurement and Improvement: Organizational Case Studies , 1995 .
[44] Mikko T. Siponen,et al. An Analysis of the Recent IS Security Development Approaches: Descriptive and Prescriptive Implications , 2001 .
[45] R. Keeney,et al. The Value of Internet Commerce to the Customer , 1999 .
[46] Joseph G. Rosse,et al. Yours, Mine, and Ours: Facilitating Group Productivity through the Integration of Individual and Group Goals , 1995 .
[47] Charles J. Kacmar,et al. Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..
[48] W. L. Cron,et al. The role of goal orientation following performance feedback. , 2001, The Journal of applied psychology.
[49] E. A. Locke,et al. Building a practically useful theory of goal setting and task motivation. A 35-year odyssey. , 2002, The American psychologist.
[50] Abhinav Rastogi,et al. Secure Coding: Building Security into the Software Development Life Cycle , 2004, Inf. Secur. J. A Glob. Perspect..
[51] Robert Willison,et al. A Critical assesment if IS Security Research Between , 2007 .