security, information, compliance, policy, organizations, breach, disclosure, policies, deterrence, breaches, incidents, results, study, abuse, managed, isp, violations, based, comply, protection
Siponen, Mikko (1.04) |
Vance, Anthony (0.84) |
Johnson, M. Eric (0.84) |
Kwon, Juhee (0.73) |
Lowry, Paul Benjamin (0.66) |
Hui, Kai-Lung (0.64) |
Hui, Wendy (0.64) |
Yue, Wei T. (0.64) |
Geng, Xianjun (0.55) |
Lee, Chul Ho (0.55) |
Raghunathan, Srinivasan (0.55) |
Warkentin, Merrill E. (0.45) |
Benbasat, Izak (0.40) |
Bulgurcu, Burcu (0.40) |
Cavusoglu, Hasan (0.40) |
Puhakainen, Petri (0.37) |
Eggett, Dennis (0.30) |
D'Arcy, John (0.29) |
Herath, Tejaswini C. (0.29) |
Shoss, Mindy K. (0.29) |
Hsu, Jack Shih-Chieh (0.29) |
Hung, Yu Wen (0.29) |
Shih, Sheng-Pao (0.29) |
Borle, Sharad (0.28) |
Sen, Ravi (0.28) |
Willison, Robert (0.28) |
Straub Jr., Detmar W. (0.28) |
Chen, Yan (0.26) |
Ramamurthy, K. (0.26) |
Wen, Kuang-Wei (0.26) |
Kannan, Karthik N. (0.25) |
Rees Ulmer, Jackie (0.25) |
Wang, Tawei (0.25) |
DêArcy, John (0.25) |
Galletta, Dennis (0.25) |
Hovav, Anat (0.25) |
Nance, William D. (0.23) |
Straub, Jr., Detmar W. (0.23) |
Gal-Or, Esther (0.22) |
Ghose, Anindya (0.22) |
Rao, H. Raghav (0.22) |
Barki, Henri (0.20) |
Spears, Janine L. (0.20) |
Mitra, Sabyasachi (0.20) |
Ransbotham, Sam (0.20) |
Whinston, Andrew B. (0.20) |
Xue, Ling (0.20) |
Zhao, Xia (0.20) |
Archer, Norman P. (0.18) |
Connelly, Catherine E. (0.18) |
Guo, Ken H. (0.18) |
Yuan, Yufei (0.18) |
Cremonini, Marco (0.16) |
Nizovtsev, Dmitri (0.16) |
Boockholdt, J. L. (0.15) |
Muralidhar, Krishnamurty (0.15) |
Sarathy, Rathindra (0.15) |
Ada, Serkan (0.15) |
Han, Wencui (0.15) |
Rao, Raghav (0.15) |
Sharman, Raj (0.15) |
CHOI, BEN C.F. (0.14) |
Jiang, Zhenhui (Jack) (0.14) |
Kim, Sung S. (0.14) |
Gordon, Lawrence A. (0.14) |
Loeb, Martin P. (0.14) |
Sohail, Tashfeen (0.14) |
Lee, Ronald M. (0.13) |
Ryu, Young U. (0.13) |
Png, Ivan P. L. (0.12) |
Wang, Chen-Yu (0.12) |
Wang, Qiu-Hong (0.12) |
Bunker, Deborah (0.12) |
Jamieson, Rodger (0.12) |
Smith, Stephen (0.12) |
Winchester, Donald (0.12) |
Zwass, Vladimir (0.12) |
Mahmood, M. Adam (0.11) |
Raghu, T. S. (0.11) |
Straub, Detmar (0.11) |
Articles (46)
Title
|
Topic Weight
|
Author
|
Year
|
Journal
|
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement. |
0.636 |
Hui, Kai-Lung;
Hui, Wendy;
Yue, Wei T.;
|
2012
|
JMIS
|
Health-Care Security Strategies for Data Protection and Regulatory Compliance. |
0.512 |
Kwon, Juhee;
Johnson, M. Eric;
|
2013
|
JMIS
|
NEUTRALIZATION: NEW INSIGHTS INTO THE PROBLEM OF EMPLOYEE INFORMATION SYSTEMS SECURITY POLICY VIOLATIONS. |
0.463 |
Siponen, Mikko;
Vance, Anthony;
|
2010
|
MISQ
|
INFORMATION SECURITY POLICY COMPLIANCE: AN EMPIRICAL STUDY OF RATIONALITY-BASED BELIEFS AND INFORMATION SECURITY AWARENESS. |
0.400 |
Bulgurcu, Burcu;
Cavusoglu, Hasan;
Benbasat, Izak;
|
2010
|
MISQ
|
IMPROVING EMPLOYEES' COMPLIANCE THROUGH INFORMATION SYSTEMS SECURITY TRAINING: AN ACTION RESEARCH STUDY. |
0.366 |
Puhakainen, Petri;
Siponen, Mikko;
|
2010
|
MISQ
|
Mandatory Standards and Organizational Information Security |
0.362 |
Lee, Chul Ho;
Geng, Xianjun;
Raghunathan, Srinivasan;
|
2016
|
ISR
|
Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective |
0.292 |
D'Arcy, John;
Herath, Tejaswini C.;
Shoss, Mindy K.;
|
2014
|
JMIS
|
The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness |
0.289 |
Hsu, Jack Shih-Chieh;
Shih, Sheng-Pao;
Hung, Yu Wen;
Lowry, Paul Benjamin;
|
2015
|
ISR
|
Estimating the Contextual Risk of Data Breach: An Empirical Approach |
0.285 |
Sen, Ravi;
Borle, Sharad;
|
2015
|
JMIS
|
BEYOND DETERRENCE: AN EXPANDED VIEW OF EMPLOYEE COMPUTER ABUSE. |
0.284 |
Willison, Robert;
Warkentin, Merrill E.;
|
2013
|
MISQ
|
Effective IS Security: An Empirical Study. |
0.284 |
Straub Jr., Detmar W.;
|
1990
|
ISR
|
Organizations' Information Security Policy Compliance: Stick or Carrot Approach? |
0.258 |
Chen, Yan;
Ramamurthy, K.;
Wen, Kuang-Wei;
|
2012
|
JMIS
|
The Association Between the Disclosure and the Realization of Information Security Risk Factors. |
0.253 |
Wang, Tawei;
Kannan, Karthik N.;
Rees Ulmer, Jackie;
|
2013
|
ISR
|
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach. |
0.250 |
DêArcy, John;
Hovav, Anat;
Galletta, Dennis;
|
2009
|
ISR
|
Using Accountability to Reduce Access Policy Violations in Information Systems. |
0.233 |
Vance, Anthony;
Lowry, Paul Benjamin;
Eggett, Dennis;
|
2013
|
JMIS
|
Proactive Versus Reactive Security Investments in the Healthcare Sector |
0.220 |
Kwon, Juhee;
Johnson, M. Eric;
|
2014
|
MISQ
|
The Economic Incentives for Sharing Security Information. |
0.220 |
Gal-Or, Esther;
Ghose, Anindya;
|
2005
|
ISR
|
USER PARTICIPATION IN INFORMATION SYSTEMS SECURITY RISK MANAGEMENT. |
0.205 |
Spears, Janine L.;
Barki, Henri;
|
2010
|
MISQ
|
Information Disclosure and the Diffusion of Information Security Attacks |
0.203 |
Mitra, Sabyasachi;
Ransbotham, Sam;
|
2015
|
ISR
|
Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements. |
0.203 |
Zhao, Xia;
Xue, Ling;
Whinston, Andrew B.;
|
2013
|
JMIS
|