security, information, compliance, policy, organizations, breach, disclosure, policies, deterrence, breaches, incidents, results, study, abuse, managed, isp, violations, based, comply, protection
Siponen, Mikko (1.04) Vance, Anthony (0.84) Johnson, M. Eric (0.84) Kwon, Juhee (0.73)
Lowry, Paul Benjamin (0.66) Hui, Kai-Lung (0.64) Hui, Wendy (0.64) Yue, Wei T. (0.64)
Geng, Xianjun (0.55) Lee, Chul Ho (0.55) Raghunathan, Srinivasan (0.55) Warkentin, Merrill E. (0.45)
Benbasat, Izak (0.40) Bulgurcu, Burcu (0.40) Cavusoglu, Hasan (0.40) Puhakainen, Petri (0.37)
Eggett, Dennis (0.30) D'Arcy, John (0.29) Herath, Tejaswini C. (0.29) Shoss, Mindy K. (0.29)
Hsu, Jack Shih-Chieh (0.29) Hung, Yu Wen (0.29) Shih, Sheng-Pao (0.29) Borle, Sharad (0.28)
Sen, Ravi (0.28) Willison, Robert (0.28) Straub Jr., Detmar W. (0.28) Chen, Yan (0.26)
Ramamurthy, K. (0.26) Wen, Kuang-Wei (0.26) Kannan, Karthik N. (0.25) Rees Ulmer, Jackie (0.25)
Wang, Tawei (0.25) DêArcy, John (0.25) Galletta, Dennis (0.25) Hovav, Anat (0.25)
Nance, William D. (0.23) Straub, Jr., Detmar W. (0.23) Gal-Or, Esther (0.22) Ghose, Anindya (0.22)
Rao, H. Raghav (0.22) Barki, Henri (0.20) Spears, Janine L. (0.20) Mitra, Sabyasachi (0.20)
Ransbotham, Sam (0.20) Whinston, Andrew B. (0.20) Xue, Ling (0.20) Zhao, Xia (0.20)
Archer, Norman P. (0.18) Connelly, Catherine E. (0.18) Guo, Ken H. (0.18) Yuan, Yufei (0.18)
Cremonini, Marco (0.16) Nizovtsev, Dmitri (0.16) Boockholdt, J. L. (0.15) Muralidhar, Krishnamurty (0.15)
Sarathy, Rathindra (0.15) Ada, Serkan (0.15) Han, Wencui (0.15) Rao, Raghav (0.15)
Sharman, Raj (0.15) CHOI, BEN C.F. (0.14) Jiang, Zhenhui (Jack) (0.14) Kim, Sung S. (0.14)
Gordon, Lawrence A. (0.14) Loeb, Martin P. (0.14) Sohail, Tashfeen (0.14) Lee, Ronald M. (0.13)
Ryu, Young U. (0.13) Png, Ivan P. L. (0.12) Wang, Chen-Yu (0.12) Wang, Qiu-Hong (0.12)
Bunker, Deborah (0.12) Jamieson, Rodger (0.12) Smith, Stephen (0.12) Winchester, Donald (0.12)
Zwass, Vladimir (0.12) Mahmood, M. Adam (0.11) Raghu, T. S. (0.11) Straub, Detmar (0.11)

Articles (46)

Title Topic Weight Author Year Journal
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement. 0.636 Hui, Kai-Lung; Hui, Wendy; Yue, Wei T.; 2012 JMIS
Health-Care Security Strategies for Data Protection and Regulatory Compliance. 0.512 Kwon, Juhee; Johnson, M. Eric; 2013 JMIS
NEUTRALIZATION: NEW INSIGHTS INTO THE PROBLEM OF EMPLOYEE INFORMATION SYSTEMS SECURITY POLICY VIOLATIONS. 0.463 Siponen, Mikko; Vance, Anthony; 2010 MISQ
INFORMATION SECURITY POLICY COMPLIANCE: AN EMPIRICAL STUDY OF RATIONALITY-BASED BELIEFS AND INFORMATION SECURITY AWARENESS. 0.400 Bulgurcu, Burcu; Cavusoglu, Hasan; Benbasat, Izak; 2010 MISQ
IMPROVING EMPLOYEES' COMPLIANCE THROUGH INFORMATION SYSTEMS SECURITY TRAINING: AN ACTION RESEARCH STUDY. 0.366 Puhakainen, Petri; Siponen, Mikko; 2010 MISQ
Mandatory Standards and Organizational Information Security 0.362 Lee, Chul Ho; Geng, Xianjun; Raghunathan, Srinivasan; 2016 ISR
Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective 0.292 D'Arcy, John; Herath, Tejaswini C.; Shoss, Mindy K.; 2014 JMIS
The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness 0.289 Hsu, Jack Shih-Chieh; Shih, Sheng-Pao; Hung, Yu Wen; Lowry, Paul Benjamin; 2015 ISR
Estimating the Contextual Risk of Data Breach: An Empirical Approach 0.285 Sen, Ravi; Borle, Sharad; 2015 JMIS
BEYOND DETERRENCE: AN EXPANDED VIEW OF EMPLOYEE COMPUTER ABUSE. 0.284 Willison, Robert; Warkentin, Merrill E.; 2013 MISQ
Effective IS Security: An Empirical Study. 0.284 Straub Jr., Detmar W.; 1990 ISR
Organizations' Information Security Policy Compliance: Stick or Carrot Approach? 0.258 Chen, Yan; Ramamurthy, K.; Wen, Kuang-Wei; 2012 JMIS
The Association Between the Disclosure and the Realization of Information Security Risk Factors. 0.253 Wang, Tawei; Kannan, Karthik N.; Rees Ulmer, Jackie; 2013 ISR
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach. 0.250 DêArcy, John; Hovav, Anat; Galletta, Dennis; 2009 ISR
Using Accountability to Reduce Access Policy Violations in Information Systems. 0.233 Vance, Anthony; Lowry, Paul Benjamin; Eggett, Dennis; 2013 JMIS
Proactive Versus Reactive Security Investments in the Healthcare Sector 0.220 Kwon, Juhee; Johnson, M. Eric; 2014 MISQ
The Economic Incentives for Sharing Security Information. 0.220 Gal-Or, Esther; Ghose, Anindya; 2005 ISR
USER PARTICIPATION IN INFORMATION SYSTEMS SECURITY RISK MANAGEMENT. 0.205 Spears, Janine L.; Barki, Henri; 2010 MISQ
Information Disclosure and the Diffusion of Information Security Attacks 0.203 Mitra, Sabyasachi; Ransbotham, Sam; 2015 ISR
Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements. 0.203 Zhao, Xia; Xue, Ling; Whinston, Andrew B.; 2013 JMIS