information, security, interview, threats, attacks, theory, fear, vulnerability, visibility, president, vulnerabilities, pmt, behaviors, enforcement, appeals, protection, insiders, attackers, precautions, vice
Halbrecht, Herbert (2.09) |
Lowry, Paul Benjamin (1.45) |
Posey, Clay (1.14) |
Png, Ivan P. L. (1.01) |
Wang, Qiu-Hong (1.01) |
Warkentin, Merrill E. (0.89) |
Roberts, Tom L. (0.82) |
Ransbotham, Sam (0.56) |
Dickson, Gary W. (0.44) |
Johnston, Allen (0.43) |
Siponen, Mikko (0.43) |
Wang, Jingguo (0.40) |
Halbrecht, Herbert Z. (0.39) |
Wang, Chen-Yu (0.36) |
Roberts, Tom L (0.32) |
Boss, Scott R. (0.31) |
Galletta, Dennis F. (0.31) |
Moody, Gregory D. (0.31) |
Polak, Peter (0.31) |
Johnston, Allen C. (0.30) |
Gupta, Manish (0.27) |
Bennett, Rebecca J. (0.23) |
Courtney, James F. (0.23) |
Mitra, Sabyasachi (0.23) |
Mitra, Sabyaschi (0.23) |
Ramsey, Jon (0.23) |
Jensen, Matthew L. (0.21) |
Thatcher, Jason Bennett (0.21) |
Wright, Ryan T. (0.21) |
Lappas, Theodoros (0.18) |
Sabnis, Gaurav (0.18) |
Valkanas, Georgios (0.18) |
Chen, Yan (0.18) |
Zahedi, Fatemeh Mariam (0.18) |
Carr, Houston H. (0.17) |
Loch, Karen D. (0.17) |
Clemons, Eric K. (0.16) |
Kauffman, Robert J. (0.16) |
Weber, Thomas A. (0.16) |
Dey, Debabrata (0.16) |
Lahiri, Atanu (0.16) |
Zhang, Guoying (0.16) |
Rao, H. Raghav (0.12) |
Xiao, Nan (0.12) |
Johnson, M. Eric (0.11) |
Gattiker, Urs E. (0.10) |
Kelley, Helen (0.10) |
Articles (25)
Title
|
Topic Weight
|
Author
|
Year
|
Journal
|
Information Security: Facilitating User Precautions Vis-š-Vis Enforcement Against Attackers. |
0.647 |
Png, Ivan P. L.;
Wang, Qiu-Hong;
|
2009
|
JMIS
|
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric |
0.427 |
Johnston, Allen;
Warkentin, Merrill E.;
Siponen, Mikko;
|
2015
|
MISQ
|
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence. |
0.359 |
Png, Ivan P. L.;
Wang, Chen-Yu;
Wang, Qiu-Hong;
|
2008
|
JMIS
|
The Impact of Organizational Commitment on Insiders Motivation to Protect Organizational Information Assets |
0.324 |
Posey, Clay;
Roberts, Tom L;
Lowry, Paul Benjamin;
|
2015
|
JMIS
|
What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors |
0.314 |
Boss, Scott R.;
Galletta, Dennis F.;
Lowry, Paul Benjamin;
Moody, Gregory D.;
Polak, Peter;
|
2015
|
MISQ
|
FEAR APPEALS AND INFORMATION SECURITY BEHAVIORS: AN EMPIRICAL STUDY. |
0.301 |
Johnston, Allen C.;
Warkentin, Merrill E.;
|
2010
|
MISQ
|
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications |
0.274 |
Wang, Jingguo;
Gupta, Manish;
|
2015
|
MISQ
|
INSIDERS' PROTECTION OF ORGANIZATIONAL INFORMATION ASSETS: DEVELOPMENT OF A SYSTEMATICS-BASED TAXONOMY AND THEORY OF DIVERSITY FOR PROTECTION-MOTIVATED BEHAVIORS. |
0.234 |
Posey, Clay;
Roberts, Tom L.;
Lowry, Paul Benjamin;
Bennett, Rebecca J.;
Courtney, James F.;
|
2013
|
MISQ
|
Information Disclosure and the Diffusion of Information Security Attacks |
0.234 |
Mitra, Sabyasachi;
Ransbotham, Sam;
|
2015
|
ISR
|
Research Note--Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance |
0.207 |
Wright, Ryan T.;
Jensen, Matthew L.;
Thatcher, Jason Bennett;
|
2014
|
ISR
|
The Impact of Fake Reviews on Online Visibility: A Vulnerability Assessment of the Hotel Industry |
0.183 |
Lappas, Theodoros;
Sabnis, Gaurav;
Valkanas, Georgios;
|
2016
|
ISR
|
Threats to Information Systems: Today's Reality, Yesterday's Understanding. |
0.166 |
Loch, Karen D.;
Carr, Houston H.;
Warkentin, Merrill E.;
|
1992
|
MISQ
|
Special Section: Competitive Strategy, Economics, and Information Systems. |
0.160 |
Clemons, Eric K.;
Kauffman, Robert J.;
Weber, Thomas A.;
|
2009
|
JMIS
|
Hacker Behavior, Network Effects, and the Security Software Market. |
0.157 |
Dey, Debabrata;
Lahiri, Atanu;
Zhang, Guoying;
|
2012
|
JMIS
|
Research Note‹An Exploration of Risk Characteristics of Information Security Threats and Related Public Information Search Behavior |
0.125 |
Wang, Jingguo;
Xiao, Nan;
Rao, H. Raghav;
|
2015
|
ISR
|
Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China |
0.120 |
Chen, Yan;
Zahedi, Fatemeh Mariam;
|
2016
|
MISQ
|
Information Risk of Inadvertent Disclosure: An Analysis of File-Sharing Risk in the Financial Supply Chain. |
0.111 |
Johnson, M. Eric;
|
2008
|
JMIS
|
Morality and Computers: Attitudes and Differences in Moral Judgments. |
0.101 |
Gattiker, Urs E.;
Kelley, Helen;
|
1999
|
ISR
|
Risks and Benefits of Signaling Information System Characteristics to Strategic Attackers. |
0.098 |
Cremonini, Marco;
Nizovtsev, Dmitri;
|
2009
|
JMIS
|
Social Media, Knowledge Sharing, and Innovation: Toward a Theory of Communication Visibility |
0.097 |
Leonardi, Paul M.;
|
2014
|
ISR
|