Emotional reactions and coping responses of employees to a cyber-attack: A case study
暂无分享,去创建一个
Patrick Stacey | Konstantina Spanaki | Rebecca Taylor | Omotolani Olowosule | Patrick Stacey | Konstantina Spanaki | Rebecca Taylor | Omotolani Olowosule
[1] Anne Beaudry,et al. IT-Induced Adaptation and Individual Performance: A Coping Acts Model , 2001, ICIS.
[2] Rossouw von Solms,et al. From information security to cyber security , 2013, Comput. Secur..
[3] M. Becker,et al. The Health Belief Model: A Decade Later , 1984, Health education quarterly.
[4] David H. Tobey,et al. Enhancing the Cybersecurity Workforce , 2011, IT Professional.
[5] Paul van Schaik,et al. Persuading end users to act cautiously online: a fear appeals study on phishing , 2018, Inf. Comput. Secur..
[6] S. Folkman,et al. Journal of Personality and Social Psychology If It Changes It Must Be a Process: Study of Emotion and Coping during Three Stages of a College Examination , 2022 .
[7] Kalle Lyytinen,et al. Design With a Positive Lens: An Affirmative Approach to Designing Information and Organizations , 2006, Commun. Assoc. Inf. Syst..
[8] Emil C. Lupu,et al. Organizational cloud security and control: a proactive approach , 2019, Inf. Technol. People.
[9] James Noble,et al. Interventions for Software Security: Creating a Lightweight Program of Assurance Techniques for Developers , 2019, 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP).
[10] Žaklina Spalević. Cyber Security as a Global Challenge of The Modern Era , 2014 .
[11] Deborah J. Armstrong,et al. The impact of relational leadership and social alignment on information security system effectiveness in Korean governmental organizations , 2018, Int. J. Inf. Manag..
[12] P. Sheeran,et al. Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory , 2000 .
[13] Sue Newell,et al. Coping with Information Technology: Mixed Emotions, Vacillation, and Nonconforming Use Patterns , 2015, MIS Q..
[14] C. Argyris. Management Information Systems: The Challenge to Rationality and Emotionality , 1971 .
[15] Watts S. Humphrey,et al. Software process improvement at Hughes Aircraft , 1991, IEEE Software.
[16] Gurpreet Dhillon,et al. Stakeholder perceptions of information security policy: Analyzing personal constructs , 2020, Int. J. Inf. Manag..
[17] Siew H. Chan,et al. Insight into hackers' reaction toward information security breach , 2019, Int. J. Inf. Manag..
[18] Marijn Janssen,et al. Agile and adaptive governance in crisis response: Lessons from the COVID-19 pandemic , 2020, International Journal of Information Management.
[19] Soumik Mondal,et al. TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition , 2017, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[20] Jane Webster,et al. Are we talking about the task or the computer? An examination of the associated domains of task-specific and computer self-efficacies , 2011, Comput. Hum. Behav..
[21] David Wastell,et al. The fetish of technique: methodology as a social defence , 1996 .
[22] Malcolm Robert Pattinson,et al. The effect of resilience and job stress on information security awareness , 2018, Inf. Comput. Secur..
[23] Nicholas Micallef,et al. Security questions education: exploring gamified features and functionalities , 2018, Inf. Comput. Secur..
[24] Younghwa Lee,et al. Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software , 2009, Eur. J. Inf. Syst..
[25] Mark Hall. Why people are key to cyber-security , 2016, Netw. Secur..
[26] Anne Beaudry,et al. Understanding User Responses to Information Technology: A Coping Model of User Adaption , 2005, MIS Q..
[27] Cleotilde Gonzalez,et al. Effects of cyber security knowledge on attack detection , 2015, Comput. Hum. Behav..
[28] Paul C. van Fenema,et al. Cocreating Understanding and Value in Distributed Work: How Members of Onsite and Offshore Vendor Teams Give, Make, Demand, and Break Sense , 2008, MIS Q..
[29] Murat Koyuncu,et al. Understanding key skills for information security managers , 2018, Int. J. Inf. Manag..
[30] M. Angela Sasse,et al. Employee Rule Breakers, Excuse Makers and Security Champions:: Mapping the risk perceptions and emotions that drive security behaviors , 2015, NSPW.
[31] Andrew D. Brown,et al. Saying it with feeling: Analysing speakable emotions , 2008 .
[32] Leandros A. Maglaras,et al. HEART-IS: A novel technique for evaluating human error-related information security incidents , 2019, Comput. Secur..
[33] Wanda J. Orlikowski,et al. Studying Information Technology in Organizations: Research Approaches and Assumptions , 1991, Inf. Syst. Res..
[34] Alan D. Smith,et al. Issues in cybersecurity; understanding the potential risks associated with hackers/crackers , 2002, Inf. Manag. Comput. Secur..
[35] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[36] Andy Koronios,et al. Information Technology Security and Risk Management , 2006 .
[37] Carl Colwill,et al. Human factors in information security: The insider threat - Who can you trust these days? , 2009, Inf. Secur. Tech. Rep..
[38] R. W. Rogers,et al. A meta-analysis of research on protection motivation theory. , 2000 .
[39] Efpraxia D. Zamani,et al. Generative mechanisms of workarounds, discontinuance and reframing: a study of negative disconfirmation with consumerised IT , 2020, Inf. Syst. J..
[40] K. Weick,et al. Collective mind in organizations: Heedful interrelating on flight decks. , 1993 .
[41] Anne Beaudry,et al. The Other Side of Acceptance: Studying the Direct and Indirect Effects of Emotions on Information Technology Use , 2010, MIS Q..
[42] Ana Ortiz de Guinea,et al. Why break the habit of a lifetime? rethinking the roles of intention, habit, and emotion in continuing information technology use , 2009 .
[43] Susan Greener,et al. Business Research Methods , 2008 .
[44] Monideepa Tarafdar,et al. Workplace Stress from Actual and Desired Computer‐Mediated Communication Use: A Multi‐Method Study , 2017 .
[45] Henri Barki,et al. Interpersonal Conflict and Its Management in Information System Development , 2001, MIS Q..
[46] Merrill Warkentin,et al. Beyond Deterrence: An Expanded View of Employee Computer Abuse , 2013, MIS Q..
[47] Patrick Stacey,et al. Designing emotion-centred Product Service Systems: The case of a cancer care facility , 2015 .
[48] M. Goldberg,et al. What to Convey in Antismoking Advertisements for Adolescents: The use of Protection Motivation Theory to Identify Effective Message Themes , 2003 .
[49] Tejaswini Herath,et al. Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective , 2014, J. Manag. Inf. Syst..
[50] Mahmood Hussain Shah,et al. Information security management needs more holistic approach: A literature review , 2016, Int. J. Inf. Manag..
[51] Steven Furnell,et al. Information security conscious care behaviour formation in organizations , 2015, Comput. Secur..
[52] Frederick J. Riggins,et al. The role of emotion in P2P microfinance funding: A sentiment analysis approach , 2020, Int. J. Inf. Manag..
[53] Mark I. Hwang,et al. Disentangling the Effect of Top Management Support and Training on Systems Implementation Success: A Meta-Analysis , 2014, Commun. Assoc. Inf. Syst..
[54] Hennie A. Kruger,et al. I shall, we shall, and all others will: paradoxical information security behaviour , 2018, Inf. Comput. Secur..
[55] Michael Rosen. COMING TO TERMS WITH THE FIELD: UNDERSTANDING AND DOING ORGANIZATIONAL ETHNOGRAPHY* , 1991 .
[56] R. Lazarus. From psychological stress to the emotions: a history of changing outlooks. , 1993, Annual review of psychology.
[57] Viswanath Venkatesh,et al. Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..
[58] Joe Nandhakumar,et al. Responding to games development challenges through mood-mediated improvisation , 2006, ECIS.
[59] Sylvain Frey,et al. The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game , 2018, IEEE Transactions on Software Engineering.
[60] Stephen B. Castleberry,et al. Effective Interpersonal Listening and Personal Selling , 2013 .
[61] George M. Giaglis,et al. Appropriating Information Technology Artefacts through Trial and Error: The Case of the Tablet , 2020, Information systems frontiers : a journal of research and innovation.
[62] Kim-Kwang Raymond Choo,et al. The cyber threat landscape: Challenges and future research directions , 2011, Comput. Secur..
[63] Karen E. Till,et al. Ethnography and participant observation , 2010 .
[64] Yajiong Xue,et al. Avoidance of Information Technology Threats: A Theoretical Perspective , 2009, MIS Q..
[65] Steven Furnell,et al. Guest editorial , 2018, Information and Computer Security.
[66] K. Scherer. The dynamic architecture of emotion: Evidence for the component process model , 2009 .
[67] Juan-Gabriel Cegarra-Navarro,et al. Implementing telemedicine through eListening in hospital-in-the-home units , 2010, Int. J. Inf. Manag..
[68] A. Bandura. Self-efficacy mechanism in human agency. , 1982 .
[69] Cary L. Cooper,et al. Appraisal of Email Use as A Source of Workplace Stress: A Person-Environment Fit Approach , 2019, J. Assoc. Inf. Syst..
[70] Joe Nandhakumar,et al. Designing in the dark: the changing user-developer relationship in information systems development , 1997, ICIS '97.
[71] Helge Janicke,et al. Dying of a hundred good symptoms: why good security can still fail - a literature review and analysis , 2019, Enterp. Inf. Syst..