Effects of Individual and Organization Based Beliefs and the Moderating Role of Work Experience on Insiders' Good Security Behaviors
暂无分享,去创建一个
[1] James Backhouse,et al. Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..
[2] Mikko T. Siponen,et al. A Critical Assessment of IS Security Research between 1990-2004 , 2007, ECIS.
[3] Mo Adam Mahmood,et al. Employees' Behavior towards IS Security Policy Compliance , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[4] E. Rogers,et al. Diffusion of innovations , 1964, Encyclopedia of Sport Management.
[5] Fred A. Mael,et al. Social identity theory and the organization , 1989 .
[6] H. Tajfel. Social identity and intergroup behaviour , 1974 .
[7] H. Tajfel,et al. An integrative theory of intergroup conflict. , 1979 .
[8] Robert Willison,et al. Understanding the perpetration of employee computer crime in the organisational context , 2006, Inf. Organ..
[9] Laurie J. Kirsch,et al. The Last Line of Defense: Motivating Employees to Follow Corporate Security Guidelines , 2007, ICIS.
[10] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[11] Mikko T. Siponen,et al. An analysis of the traditional IS security approaches: implications for research and practice , 2005, Eur. J. Inf. Syst..
[12] Detmar W. Straub,et al. Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..
[13] I. Ajzen. The theory of planned behavior , 1991 .
[14] Jintae Lee,et al. A holistic model of computer abuse within organizations , 2002, Inf. Manag. Comput. Secur..
[15] Robert Willison,et al. A Critical assesment if IS Security Research Between , 2007 .
[16] Detmar W. Straub,et al. Discovering and Disciplining Computer Abuse in Organizations: A Field Study , 1990, MIS Q..
[17] Sang M. Lee,et al. An integrative model of computer abuse based on social control and general deterrence theories , 2004, Inf. Manag..