Security Constructs
Home
Categories
Constructs
Publications
Category:
uncategorised
Constructs in this category:
Action Control
Affilliation
Agile Business Strategy
Altruism
Anonymity
Anxiety
Apathy
Awareness
Barratt Impulsiveness Scale
Benefits of Knowledge Sharing
Bias
Buyer Product Development Performance
Career usefulness
Certainty of shame for oneself
Character traits
Choice Dilemmas
Co-worker congruence
Codification
Cohesion
Collective esteem
Community Loyalty
Community identification
Community leader
Community-related outcome expectations
Compatibility
Competence
Computer Playfulness
Computer deindividuation
Computer monitoring
Conservation
Controllability
Conventional reasoning
Coopersmith self-esteem inventory
Coping intentions
Data Quality Management Practices
Data Security
Defining Issues Test
Delinquent Behavior
Deterrent efforts
Deterrent severity
Digital Literacy
Distributive justice
Domain-Specific Risk-Taking (DOSPERT)
Domain-Specific Risk-Taking Scale
EKR Usage
Ease of Use
Ego Strength
Elasticity of intertemporal substitution
Electronic Health Records security
Email use
Employee commitment
Encouragement by Others
Enjoyment in Helping Others
Ethical Attitudes
Ethical Behavior Intention
Ethical Egoism
Ethical climate
Evaluation
Evolutionary Risk Scale
Expected Associations
Expected Contribution
Expected reciprocal benefit
Expected relationships
Expressive use
Extent of Coordination
External influence
Extra-unit knowledge
Facebook Intensity (FBI) Index
Facil. conditions
Facilitating conditions
Fairness
Fashion
Financial Performance
Formal Socialization Mechanisms
Formal integrative mechanisms
Frequency of EIS use
Friendship
General Decision-Making Style
General precautions
General risk appetite
Group commitment
Habits
Hacker screen concern
Hacker screen realism
Helping behaviour
IPC (Collection)
IPC (Control)
IPC (Errors)
IPC (Improper Access)
IPC (Secondary Usage)
IT capabilities
IT-skill level
Identification
Image
Impact
Implicit knowledge sharing
Impression Management
Incident reporting
Informal Socialization Mechanisms
Informal coordination
Information Literacy
Information Security Ownerships
Information Security Policy Enforcements
Information Security Policy Provision
Information Security Training
Information System Knowledge
Information handling
Information security risk reduction expectation
Information security threats
Informational justice
Instrumental use
Instrumentality
Inter-personal influence
Interaction frequency
Interdependency
Internet use
Internet users' information privacy concerns (IUIPC)
Interpersonal justice
Interunit Competition
Intraorganizational (or Interunit) Knowledge Sharing
Intrinsic Benefit
Invasion of Privacy
Involvement In Information Security
Job Insecurity
Job Satisfaction
KM resources/technology
Know-how transfer
Knowledge
Knowledge complexity
Knowledge quality
Knowledge regarding the response
Knowledge-sharing behaviour
Lateral socialization mechanisms
Leader evaluation
Learning capacity
Learning orientation
Level of IT Usage
Level of IT support
Local knowledge
Loss of Knowledge Power
Machiavellianism
Malware warning screen concern
Malware warning screen realism
Management support
Mandatoriness
Mimetic pressure
Mobile computing
Moral Disengagement
Moral Judgement
Moral Obligation
Moral maturity
NEO-FFI
NMSV Intention
Need for Cognition
Negative Affectivity
Neutralization
Nonwork-related computing
Norm of reciprocity
Norms for Knowledge Sharing
Openness in Communication
Openness to change
Opportunistic behavior
Organizational Care
Organizational Ethical Climate
Organizational Knowledge Sharing
Organizational identification
Organizational information security culture
Organizational support of KS
Others' Use
Outcome Expectations
Outcome satisfaction
Pace of Change
Participation
Participative decision-making
Password management
Perceive Usefulness
Perceived Security Risk of NMSV
Perceived Security Threats
Perceived Security Vulnerabilities
Perceived Size
Perceived Value congruence
Perceived availability
Perceived behavioural control to knowledge sharing
Perceived compatibility
Perceived confidentiality
Perceived ease of use
Perceived enjoyment
Perceived goal orientation
Perceived identity match
Perceived information security Climate
Perceived justice of punishment
Perceived legitimacy
Perceived non-repudiation
Perceived organizational support
Perceived rule orientation
Perceived security risk
Perceived security risk of malware
Perceived security risks from Internet breaches
Perceived threat
Perceived top management participation
Perceived usefulness
Perceived vulnerability
Perception
Perception of Piracy Issue
Personal Innovativeness in the Domain of Information Technology
Personal Normative Beliefs
Personal outcome expectations
Possibility
Postconventional reasoning
Power
Preconventional reasoning
Presenteeism
Pressure of competing values
Preventive efforts
Preventive security software
Privacy Concerns Scale
Privacy Preference Scale
Privacy behavior: General Caution
Privacy behavior: Technical Protection
Pro-Sharing Norms
Procedural justice
Product usefulness
Prosocial Motives
Public use
Ratings of Focal Subsidiary Capabilities
Received task interdependence
Rejection of universal moral principles in favor of relativism
Relative Advantage for Job Performance
Reliability
Reputation building
Resource availability
Resource fitness
Reward
Rewards
Risk Acceptance
Risk Aversion
Risk Beliefs
Risk Perception
Role Ambiguity
SETA programs
Safety of Resources
Safety/security
Satisfaction
Satisfaction with knowledge sharing
Secondary Sources' Influence
Security Behavior Intentions Scale
Security Management and Operations
Security Programme Management
Security assessment
Security communication
Security culture
Security, Training and Awareness Programs
Security-related stress
Self-Set Goal Level
Sense of Self-Worth
Severity of shame for oneself
Shared Values
Shared goals
Shared language
Shared vision
Sharing materials
Shopping Enjoyment
Smartphone Risk Attitudes
Social
Social Desirability Scale
Social desirability
Social influence
Social interaction culture
Social interaction ties
Social network
Social networking
Social norm
Socially desirable response set
Software piracy
Source competency
Source dynamism
Specification
Strain
Strategic Investment Rationale
Strategic Relatedness
Subjective norm about knowledge sharing
Subjective norms about knowledge sharing
Subjective omission of security
Subsidiary Performance
Subsidiary autonomy
Subsidiary knowledge level
Supplier Product Development Outcomes
Support
System Usability Scale
Tacitness of Knowledge
Technology Protection and Operations
Threat severity
Threat susceptibility
Times spent on knowledge sharing
Top Management
Top Management Championship
Top management commitment to security
Top management support
Training types
Trust Toward Their Colleagues
Unit differences
Use of External Expertise
User Security Management
Utilitarianism
Utilization
Value priorities
Value-monistic/non-contextualised compliance
Value-pluralistic/contextualised compliance
Vertical socialization mechanisms
Visibility
Vulnerability
Vulnerability of Resources
Web Assimilation
Web-Shopping Risk Attitudes
Web-Use Skills
Well-Articulated Decision Making Practices
Westin Index
Westin Privacy segmentation
Westin/Harris segmentation index
Willingness to Buy
Willingness to Gamble Lifetime Income
Willingness to disclose items of personal data
Work Home Conflict
Work Impediment
applied security knowledge
attitude toward KS
collective mind
compensation
competition
computer monitoring within their organizations
computer security knowledge
conformity
cultural values
decision making
digital and physical security advice sources
disclosing personal information
effort-based learning
email and Internet usage
enjoy helping others
environmental dynamism
ethical ideology
ethical orientation
exchange ideology
idealism
importance and utility of digital and physical security advice
importance of InfoSec policies
information security culture
information sensitivity
information sources
knowledge management climate
knowledge sharing culture
knowledge sharing in a small/large-group
knowledge sharing level
latent punishment
managerial ethical profile
mobile phone usage
moral reasoning
need of IT security training
network ties
organizational norms
organizational participation
penalties
perceived benefits
perceived level of competence
perceived relative advantage
perceived risks
perception of current security threats
perception of necessary skills
perceptions of Snowden and his actions
perceptions of the certainty
performance appraisal
personal security measures
principles of InfoSec policies
privacy attitudes
privacy concern
privacy concern information abuse
privacy concern information finding
religiosity
reporting security incidents
rules of InfoSec policies
security risks
seeking and providing knowledge
self-consciousness
self-rated expertise
sensation-seeking
service quality instrument
severity of organizational sanctions for engaging in IS misuse
social desirability bias
social norms
social relationship
source credibility
sources of knowledge acquisition
strategic context
team performance
technical security knowledge
technology adoption
time preference
training
transactive memory system
user perceived service quality of web portals
users’ awareness of security policies
utilitarian vs formalist
web-use skills index