• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4633406)   Today's Articles (4928)   Subscriber (49951)
For: Menard P, Warkentin M, Lowry PB. The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination. Comput Secur 2018. [DOI: 10.1016/j.cose.2018.01.020] [Citation(s) in RCA: 37] [Impact Index Per Article: 6.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
Number Cited by Other Article(s)
1
Limbu YB, Huhmann BA. Message Effectiveness of Fear Appeals in Vaccination Communication Campaigns: A Systematic Review. Vaccines (Basel) 2024;12:653. [PMID: 38932382 PMCID: PMC11209406 DOI: 10.3390/vaccines12060653] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/06/2024] [Revised: 06/08/2024] [Accepted: 06/09/2024] [Indexed: 06/28/2024]  Open
2
Ogbanufe O, Ge L. A Comparative Evaluation of Behavioral Security Motives: Protection, Intrinsic, and Identity Motivations. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103136] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/19/2023]
3
Securing online accounts and assets: An examination of personal investments and protection motivation. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2023. [DOI: 10.1016/j.ijinfomgt.2022.102590] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/07/2022]
4
Mady A, Gupta S, Warkentin M. The effects of knowledge mechanisms on employees' information security threat construal. INFORMATION SYSTEMS JOURNAL 2023. [DOI: 10.1111/isj.12424] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/11/2023]
5
The valued coexistence of protection motivation and stewardship in information security behaviors. Comput Secur 2023. [DOI: 10.1016/j.cose.2022.102960] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
6
Khan F, Bashir S, Talib MNA, Khan KU. The impact of psychological ownership of knowledge on knowledge hiding behaviour: a bibliographic analysis. CURRENT PSYCHOLOGY 2022. [DOI: 10.1007/s12144-022-04033-7] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/03/2022]
7
Nehme A, George JF. Approaching IT Security & Avoiding Threats in the Smart Home Context. J MANAGE INFORM SYST 2022. [DOI: 10.1080/07421222.2022.2127449] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/14/2022]
8
Wong LW, Lee VH, Tan GWH, Ooi KB, Sohal A. The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2022. [DOI: 10.1016/j.ijinfomgt.2022.102520] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
9
Understanding Combined Health and Business Risk Behaviour: Small Tourism Firm Owners Reopening Amid COVID-19 in Pingyao, China. Behav Sci (Basel) 2022;12:bs12100358. [PMID: 36285927 PMCID: PMC9598443 DOI: 10.3390/bs12100358] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/29/2022] [Revised: 09/04/2022] [Accepted: 09/07/2022] [Indexed: 11/16/2022]  Open
10
Organizational and team culture as antecedents of protection motivation among IT employees. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102774] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
11
Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks. INFORMATION 2022. [DOI: 10.3390/info13090413] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
12
Collignon SE, Nazir S, Surendra NC. Agile Systems Development: Privacy Theoretical Lens to Challenge the Full Information Disclosure Paradigm. INFORMATION & MANAGEMENT 2022. [DOI: 10.1016/j.im.2022.103679] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
13
Madan S, Savani K, Katsikeas CS. Privacy please: Power distance and people's responses to data breaches across countries. JOURNAL OF INTERNATIONAL BUSINESS STUDIES 2022;54:731-754. [PMID: 35607320 PMCID: PMC9118180 DOI: 10.1057/s41267-022-00519-5] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/30/2020] [Revised: 02/15/2022] [Accepted: 02/22/2022] [Indexed: 06/13/2023]
14
Burns AJ, Roberts TL, Posey C, Lowry PB, Fuller B. Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse. INFORMATION SYSTEMS RESEARCH 2022. [DOI: 10.1287/isre.2022.1133] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
15
Iseki S, Sasaki K, Kitagami S. Development of a Japanese version of the Psychological Ownership Scale. PeerJ 2022;10:e13063. [PMID: 35350635 PMCID: PMC8957756 DOI: 10.7717/peerj.13063] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/21/2021] [Accepted: 02/14/2022] [Indexed: 01/11/2023]  Open
16
Karlsson F, Kolkowska E, Petersson J. Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis. Comput Secur 2022. [DOI: 10.1016/j.cose.2021.102578] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/03/2022]
17
Ogbanufe O, Pavur R. Going through the emotions of regret and fear: Revisiting protection motivation for identity theft protection. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2022. [DOI: 10.1016/j.ijinfomgt.2021.102432] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
18
Ma X. IS professionals’ information security behaviors in Chinese IT organizations for information security protection. Inf Process Manag 2022. [DOI: 10.1016/j.ipm.2021.102744] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
19
Marett K, Nabors M. Local learning from municipal ransomware attacks: A geographically weighted analysis. INFORMATION & MANAGEMENT 2021. [DOI: 10.1016/j.im.2021.103482] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
20
Abumalloh RA, Asadi S, Nilashi M, Minaei-Bidgoli B, Nayer FK, Samad S, Mohd S, Ibrahim O. The impact of coronavirus pandemic (COVID-19) on education: The role of virtual and remote laboratories in education. TECHNOLOGY IN SOCIETY 2021;67:101728. [PMID: 34538984 PMCID: PMC8435357 DOI: 10.1016/j.techsoc.2021.101728] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/23/2020] [Revised: 07/01/2021] [Accepted: 09/01/2021] [Indexed: 05/21/2023]
21
Ogbanufe O. Enhancing End-User Roles in Information Security: Exploring the Setting, Situation, and Identity. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102340] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
22
Iqbal S, Zakar R, Fischer F. Extended Theoretical Framework of Parental Internet Mediation: Use of Multiple Theoretical Stances for Understanding Socio-Ecological Predictors. Front Psychol 2021;12:620838. [PMID: 34177688 PMCID: PMC8219882 DOI: 10.3389/fpsyg.2021.620838] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/23/2020] [Accepted: 05/14/2021] [Indexed: 11/13/2022]  Open
23
Can financial incentives help with the struggle for security policy compliance? INFORMATION & MANAGEMENT 2021. [DOI: 10.1016/j.im.2021.103447] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
24
Sarkar S, Vance A, Ramesh B, Demestihas M, Wu DT. The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context. INFORMATION SYSTEMS RESEARCH 2020. [DOI: 10.1287/isre.2020.0941] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
25
Schuetz SW, Benjamin Lowry P, Pienta DA, Bennett Thatcher J. The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security. J MANAGE INFORM SYST 2020. [DOI: 10.1080/07421222.2020.1790187] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
26
Park J, Shin M. The Impact of Information Ownership and Psychological Context on Employee Information Sharing Motivation. JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT 2020. [DOI: 10.1142/s0219649220500021] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
27
Experimental Evaluation of Information Interventions to Encourage Non-Motorized Travel: A Case Study in Hefei, China. SUSTAINABILITY 2020. [DOI: 10.3390/su12156201] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
28
Wu D, Moody GD, Zhang J, Lowry PB. Effects of the design of mobile security notifications and mobile app usability on users’ security perceptions and continued use intention. INFORMATION & MANAGEMENT 2020. [DOI: 10.1016/j.im.2019.103235] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
29
Protection Motivation Theory: A Proposed Theoretical Extension and Moving beyond Rationality—The Case of Flooding. WATER 2020. [DOI: 10.3390/w12071848] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
30
Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures. INFORMATION & MANAGEMENT 2020. [DOI: 10.1016/j.im.2019.103212] [Citation(s) in RCA: 21] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
31
Sharma S. Can’t change my political disaffection! The role of political disaffection, trust, and resistance to change in internet voting. DIGITAL POLICY, REGULATION AND GOVERNANCE 2020. [DOI: 10.1108/dprg-07-2019-0049] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
32
Karjalainen M, Siponen M, Puhakainen P, Sarker S. Universal and Culture-dependent Employee Compliance of Information Systems Security Procedures. JOURNAL OF GLOBAL INFORMATION TECHNOLOGY MANAGEMENT 2019. [DOI: 10.1080/1097198x.2019.1701355] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
33
Verkijika SF. “If you know what to do, will you take action to avoid mobile phishing attacks”: Self-efficacy, anticipated regret, and gender. COMPUTERS IN HUMAN BEHAVIOR 2019. [DOI: 10.1016/j.chb.2019.07.034] [Citation(s) in RCA: 14] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/01/2022]
34
Kari T, Salo M, Frank L. Role of situational context in use continuance after critical exergaming incidents. INFORMATION SYSTEMS JOURNAL 2019. [DOI: 10.1111/isj.12273] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
35
Institutional governance and protection motivation: Theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world. Comput Secur 2019. [DOI: 10.1016/j.cose.2019.101594] [Citation(s) in RCA: 32] [Impact Index Per Article: 6.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
36
Sharma S, Warkentin M. Do I really belong?: Impact of employment status on information security policy compliance. Comput Secur 2019. [DOI: 10.1016/j.cose.2018.09.005] [Citation(s) in RCA: 18] [Impact Index Per Article: 3.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
37
Crossler RE, Andoh-Baidoo FK, Menard P. Espoused cultural values as antecedents of individuals’ threat and coping appraisal toward protective information technologies: Study of U.S. and Ghana. INFORMATION & MANAGEMENT 2019. [DOI: 10.1016/j.im.2018.11.009] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
38
Renaud K, Otondo R, Warkentin M. “This is the way ‘I’ create my passwords” ... does the endowment effect deter people from changing the way they create their passwords? Comput Secur 2019. [DOI: 10.1016/j.cose.2018.12.018] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
39
Aurigemma S, Mattson T. Effect of long-term orientation on voluntary security actions. INFORMATION AND COMPUTER SECURITY 2019. [DOI: 10.1108/ics-07-2018-0086] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA