Security Constructs
Home
Categories
Constructs
Publications
Construct:
Ethical Egoism
This construct belongs to the following categories:
Uncategorised
This construct is used by:
Al-Omari
et al., 2013:
Information Security Policy Compliance: An Empirical Study of Ethical Ideology
Questions given: yes
Papers using this construct cite the following papers for the source of this construct:
Herath, 2009:
Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations
Bulgurcu et al., 2010:
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
Siponen et al., 2010:
Compliance with Information Security Policies: An Empirical Investigation
Yoon, 2011:
Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model
Aleassa et al., 2011:
Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action
Brady, 1996:
An Empirical Study of Ethical Predispositions
Casali, 2011:
Developing a Multidimensional Scale for Ethical Decision Making
Cullen et al., 1993:
The Ethical Climate Questionnaire: An Assessment of Its Development and Validity