information, security, interview, threats, attacks, theory, fear, vulnerability, visibility, president, vulnerabilities, pmt, behaviors, enforcement, appeals, protection, insiders, attackers, precautions, vice

Articles (25)

Title Topic Weight Author Year Journal
Information Security: Facilitating User Precautions Vis-š-Vis Enforcement Against Attackers. 0.647 Png, Ivan P. L.; Wang, Qiu-Hong; 2009 JMIS
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric 0.427 Johnston, Allen; Warkentin, Merrill E.; Siponen, Mikko; 2015 MISQ
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence. 0.359 Png, Ivan P. L.; Wang, Chen-Yu; Wang, Qiu-Hong; 2008 JMIS
The Impact of Organizational Commitment on Insiders Motivation to Protect Organizational Information Assets 0.324 Posey, Clay; Roberts, Tom L; Lowry, Paul Benjamin; 2015 JMIS
What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors 0.314 Boss, Scott R.; Galletta, Dennis F.; Lowry, Paul Benjamin; Moody, Gregory D.; Polak, Peter; 2015 MISQ
FEAR APPEALS AND INFORMATION SECURITY BEHAVIORS: AN EMPIRICAL STUDY. 0.301 Johnston, Allen C.; Warkentin, Merrill E.; 2010 MISQ
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications 0.274 Wang, Jingguo; Gupta, Manish; 2015 MISQ
INSIDERS' PROTECTION OF ORGANIZATIONAL INFORMATION ASSETS: DEVELOPMENT OF A SYSTEMATICS-BASED TAXONOMY AND THEORY OF DIVERSITY FOR PROTECTION-MOTIVATED BEHAVIORS. 0.234 Posey, Clay; Roberts, Tom L.; Lowry, Paul Benjamin; Bennett, Rebecca J.; Courtney, James F.; 2013 MISQ
Information Disclosure and the Diffusion of Information Security Attacks 0.234 Mitra, Sabyasachi; Ransbotham, Sam; 2015 ISR
Research Note--Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance 0.207 Wright, Ryan T.; Jensen, Matthew L.; Thatcher, Jason Bennett; 2014 ISR
The Impact of Fake Reviews on Online Visibility: A Vulnerability Assessment of the Hotel Industry 0.183 Lappas, Theodoros; Sabnis, Gaurav; Valkanas, Georgios; 2016 ISR
Threats to Information Systems: Today's Reality, Yesterday's Understanding. 0.166 Loch, Karen D.; Carr, Houston H.; Warkentin, Merrill E.; 1992 MISQ
Special Section: Competitive Strategy, Economics, and Information Systems. 0.160 Clemons, Eric K.; Kauffman, Robert J.; Weber, Thomas A.; 2009 JMIS
Hacker Behavior, Network Effects, and the Security Software Market. 0.157 Dey, Debabrata; Lahiri, Atanu; Zhang, Guoying; 2012 JMIS
Research Note‹An Exploration of Risk Characteristics of Information Security Threats and Related Public Information Search Behavior 0.125 Wang, Jingguo; Xiao, Nan; Rao, H. Raghav; 2015 ISR
Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China 0.120 Chen, Yan; Zahedi, Fatemeh Mariam; 2016 MISQ
Information Risk of Inadvertent Disclosure: An Analysis of File-Sharing Risk in the Financial Supply Chain. 0.111 Johnson, M. Eric; 2008 JMIS
Morality and Computers: Attitudes and Differences in Moral Judgments. 0.101 Gattiker, Urs E.; Kelley, Helen; 1999 ISR
Risks and Benefits of Signaling Information System Characteristics to Strategic Attackers. 0.098 Cremonini, Marco; Nizovtsev, Dmitri; 2009 JMIS
Social Media, Knowledge Sharing, and Innovation: Toward a Theory of Communication Visibility 0.097 Leonardi, Paul M.; 2014 ISR