Publications
- Aagedal et al., 2002: Model-Based Risk Assessment to Improve Enterprise Security
- Abrams et al., 2003: Nurturing Interpersonal Trust in Knowledge-Sharing Networks
- Achenbach et al., 1987: Child/Adolescent Behavioral and Emotional Problems: Implications of Cross-Informant Correlations for Situational Specificity.
- Agarwal, 1998: A Conceptual and Operational Definition of Personal Innovativeness in the Domain of Information Technology
- Agarwal, 2000: A Field Study of the Adoption of Software Process Innovations by Information Systems Professionals
- Agho et al., 1992: Discriminant Validity of Measures of Job Satisfaction, Positive Affectivity and Negative Affectivity
- Agrawal, 2017: A Comparative Study on Information Security Risk Analysis Methods.
- Ajzen, 1980: Understanding Attitudes and Predicting Social Behavior
- Ajzen, 1985: From Intentions to Actions: A Theory of Planned Behavior
- Ajzen, 1991: The Theory of Planned Behavior
- Ajzen, 2002: Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior1
- Ajzen, 2006: Constructing a TPB Questionnaire: Conceptual and Methodological Considerations
- Akgun et al., 2006: Transactive Memory System in New Product Development Teams
- Akhawe, 2013: Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness.
- Alavi et al., 2005: An Empirical Examination of the Influence of Organizational Culture on Knowledge Management Practices
- Alavi, 2001: Review: Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues
- Alavi, 2002: Knowledge Integration in Virtual Teams: The Potential Role of KMS
- Alavi et al., 2014: A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations
- Aleassa et al., 2011: Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action
- Alfawaz et al., 2010: Information Security Culture: A Behaviour Compliance Conceptual Framework
- Alge, 2001: Effects of Computer Surveillance on Perceptions of Privacy and Procedural Justice.
- AlHogail, 2014: A Proposal of an Organizational Information Security Culture Framework
- AlHogail, 2014: Information Security Culture: A Definition and a Literature Review
- AlHogail, 2015: Cultivating and Assessing Organizational Information Security Culture, an Empirical Study
- Allen, 1990: The Measurement and Antecedents of Affective, Continuance and Normative Commitment to the Organization
- Alnatheer et al., 2012: Understanding And Measuring Information Security Culture.
- Ament, 2016: How Information Security Requirements Stress Employees
- Anderson, 2005: Creating Conscientious Cybercitizen: An Examination of Home Computer User Attitudes and Intentions towards Security
- Andrews, 2001: Discriminating among Organizational Politics, Justice, and Support
- Ardichvili et al., 2013: Motivation and Barriers to Participation in Virtual Knowledge-sharing Communities of Practice
- Ashford et al., 1989: Content, Causes, and Consequences of Job Insecurity: A Theory-Based Measure and Substantive Test
- Ashforth, 1989: Social Identity Theory and the Organization
- Ayyagari et al., 2011: Technostress: Technological Antecedents and Implications
- Bacharach, 1976: Structural and Process Constraints on Influence in Organizations: A Level- Specific Analysis
- Bagozzi, 2002: Intentional Social Action in Virtual Communities
- Bakker et al., 2006: Is Trust Really Social Capital? Knowledge Sharing in Product Development Projects
- Bandura et al., 1996: Mechanisms of Moral Disengagement in the Exercise of Moral Agency.
- Bandura, 1991: Self-Regulatory Mechanisms Governing the Impact of Social Comparison on Complex Decision Making.
- Bandura, 1977: Self-Efficacy: Toward a Unifying Theory of Behavioral Change.
- Bandura, 1995: Guide for Constructing Self-Efficacy Scales
- Bandura, 1997: Self Efficacy: The Exercise of Control
- Barge, 1988: A Critical Evaluation of Organizational Commitment and Identification
- Barki, 1989: Rethinking the Concept of User Involvement
- Barki, 1994: Measuring User Participation, User Involvement, and User Attitude
- Barn et al., 2014: Young People and Smart Phones: An Empirical Study on Information Security
- Barron, 1953: An ego-strength scale which predicts response to psychotherapy
- Barsky et al., 1997: Preference Parameters and Behavioral Heterogeneity: An Experimental Approach in the Health and Retirement Study
- Bartol, 2002: Encouraging Knowledge Sharing: The Role of Organizational Reward Systems
- Bassellier et al., 2003: The Influence of Business Managers' IT Competence on Championing IT
- Beck, 1991: Predicting Dishonest Actions Using the Theory of Planned Behavior
- Beebe et al., 2014: Framing Information Security Budget Requests to Influence Investment Decisions.
- Bell, 2007: Geography, Networks, and Knowledge Flow
- Benne, 1948: Functional Roles of Group Members
- Bergeron et al., 1990: Investigating the Support Role of the Information Center
- Bergeron, 1986: Factors Influencing the Use of DP Chargeback Information
- Bergeron, 1988: The Management of the End-User Environment: An Empirical Investigation
- Bergeron et al., 1995: Determinants of EIS Use: Testing a Behavioral Model
- Berinsky, 2007: An Estimate of Risk Aversion in the U.S. Electorate
- Bharadwaj, 2000: A Resource-Based Perspective on Information Technology Capability and Firm Performance: An Empirical Investigation
- Bhattacherjee, 2000: Acceptance of E-Commerce Services: The Case of Electronic Brokerages
- Bies, 1986: Interactional Justice: Communication Criteria of Fairness
- Bird, 1994: Careers as Repositories of Knowledge: A New Perspective on Boundaryless Careers
- Blais, 2006: A Domain-Specific Risk-Taking (DOSPERT) Scale for Adult Populations
- Bock, 2002: Breaking the Myths of Rewards: An Exploratory Study of Attitudes about Knowledge Sharing
- Bock et al., 2005: Behavioral Intention Formation in Knowledge Sharing: Examining the Roles of Extrinsic Motivators, Social-Psychological Forces, and Organizational Climate
- Boss et al., 2009: If Someone Is Watching, I'll Do What I'm Asked: Mandatoriness, Control, and Information Security
- Bossler, 2011: The General Theory of Crime and Computer Hacking: Low Self-Control Hackers
- Boudreau et al., 2001: Validation in Information Systems Research: A State-of-the-Art Assessment
- Brady, 1996: An Empirical Study of Ethical Predispositions
- Braunstein et al., 2011: Indirect Content Privacy Surveys: Measuring Privacy Without Asking About It
- Brayfield, 1951: An Index of Job Satisfaction.
- Breitinger, 2010: User Survey on Phone Security and Usage
- Brooke, 1996: SUS-A Quick and Dirty Usability Scale
- Brown, 2005: Model of Adoption of Technology in Households: A Baseline Model Test and Extension Incorporating Household Life Cycle
- Buchanan et al., 2007: Development of Measures of Online Privacy Concern and Protection for Use on the Internet
- Bulgurcu et al., 2009: Effects of Individual and Organization Based Beliefs and the Moderating Role of Work Experience on Insiders' Good Security Behaviors
- Bulgurcu et al., 2010: Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- Bulgurcu et al., 2010: Quality and Fairness of an Information Security Policy As Antecedents of Employees' Security Engagement in the Workplace: An Empirical Investigation
- Burgoon et al., 1989: Maintaining and Restoring Privacy through Communication in Different Types of Relationships
- Butt, 2008: Personality and Self Reported Mobile Phone Use
- Cable, 2001: Socialization Tactics and Person-Organization Fit
- Cabrera et al., 2006: Determinants of Individual Engagement in Knowledge Sharing
- Cacioppo et al., 1984: The Efficient Assessment of Need for Cognition
- Campbell, 2003: The Cocial Construction of Mobile Telephony: An Application of the Social Influence Model to Perceptions and Uses of Mobile Phones within Personal Communication Networks
- Campbell, 2007: A Cross-Cultural Comparison of Perceptions and Uses of Mobile Telephony
- Caprara et al., 1985: Effect of Insult and Dissipation\textendashRumination on Delayed Aggression and Hostility.
- Caprara et al., 1983: Instigation to Aggress and Escalation of Aggression Examined from a Personological Perspective: The Role of Irritability and of Emotional Susceptibility
- Caprara et al., 1984: The Eliciting Cue Value of Aggressive Slides Reconsidered in a Personological Perspective: The Weapons Effect and Irritability
- Caprara et al., 1986: Interpolating Physical Exercise between Instigation to Aggress and Aggression: The Role of Irritability and Emotional Susceptibility
- Caprara et al., 1994: Individual Differences in the Study of Human Aggression
- Cardinal, 2001: Technological Innovation in the Pharmaceutical Industry: The Use of Organizational Control in Managing Research and Development
- Casali, 2011: Developing a Multidimensional Scale for Ethical Decision Making
- Cavusoglu et al., 2015: Institutional Pressures in Security Management: Direct and Indirect Influences on Organizational Investment in Information Security Control Resources
- Chae, 2005: Mandates and Technology Acceptance: A Tale of Two Enterprise Technologies
- Chan et al., 2005: Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior
- Chang, 2011: Social Capital and Individual Motivations on Knowledge Sharing: Participant Involvement as a Moderator
- Chang, 2001: Determinants of the Intention to Use Internet/WWW at Work: A Confirmatory Study
- Chang, 2013: Exploring Organizational Culture for Information Security Management
- Chapple et al., 2005: Gender, Social Bonds, and Delinquency: A Comparison of Boys' and Girls' Models
- Chatterjee et al., 2002: Shaping up for E-Commerce: Institutional Enablers of the Organizational Assimilation of Web Technologies
- Chau, 2001: Information Technology Acceptance by Individual Professionals: A Model Comparison Approach*
- Chau, 1996: An Empirical Investigation on Factors Affecting the Acceptance of CASE by Systems Developers
- Chellappa, 2005: Personalization versus Privacy: An Empirical Examination of the Online Consumer's Dilemma
- Chen, 2007: How Organizational Climate and Structure Affect Knowledge Management\textemdashThe Social Interaction Perspective
- Cheney, 1983: On the Various and Changing Meanings of Organizational Membership: A Field Study of Organizational Identification
- Cheng et al., 2008: Trust and Knowledge Sharing in Green Supply Chains
- Cheng et al., 2013: Understanding the Violation of IS Security Policy in Organizations: An Integrated Model Based on Social Control and Deterrence Theory
- Cheung, 2001: Trust in Internet Shopping: Instrumental Development and Validation through Classical and Modern Approaches
- Cheung et al., 2000: Prediction of Internet and World Wide Web Usage at Work: A Test of an Extended Triandis Model
- Chiu et al., 2006: Understanding Knowledge Sharing in Virtual Communities: An Integration of Social Capital and Social Cognitive Theories
- Choi et al., 2008: The Effects of Socio-Technical Enablers on Knowledge Sharing: An Exploratory Examination
- Chow, 2008: Social Network, Social Trust and Shared Goals in Organizational Knowledge Sharing
- Christie, 1970: Studies in Machiavellianism
- Chu, 2014: Development and Validation of Instruments of Information Security Deviant Behavior
- Chuang, 2004: A Resource-Based Perspective on Knowledge Management Capability and Competitive Advantage: An Empirical Investigation
- Clarke, 2005: Authentication of Users on Mobile Telephones \textendash A Survey of Attitudes and Practices
- Clarke et al., 2016: Awareness of Mobile Device Security: A Survey of User's Attitudes
- Coleman, 1988: Social Capital in the Creation of Human Capital
- Colquitt, 2001: On the Dimensionality of Organizational Justice: A Construct Validation of a Measure
- Compeau et al., 1999: Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal Study
- Compeau, 1995: Application of Social Cognitive Theory to Training for Computer Skills
- Compeau, 1995: Computer Self-Efficacy: Development of a Measure and Initial Test
- Connelly, 2003: Predictors of Employees' Perceptions of Knowledge Sharing Cultures
- Constant et al., 1996: The Kindness of Strangers: The Usefulness of Electronic Weak Ties for Technical Advice
- Coopersmith, 1989: Self-Esteem Inventories
- Costa, 1992: Revised NEO Personality Inventory (NEO PI-R) and NEO Five-Factor Inventory (NEO-FFI): Professional Manual
- Cousins et al., 2006: Creating Supply Chain Relational Capital: The Impact of Formal and Informal Socialization Processes
- Cronbach, 1949: Essentials of Psychological Testing.
- Crossler et al., 2013: Future Directions for Behavioral Information Security Research
- Crossler, 2010: Protection Motivation Theory: Understanding Determinants to Backing Up Personal Data
- Cullen et al., 1993: The Ethical Climate Questionnaire: An Assessment of Its Development and Validity
- Culnan, 1999: Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation
- Cummings, 2004: Work Groups, Structural Diversity, and Knowledge Sharing in a Global Organization
- Cummings, 1996: The Organizational Trust Inventory (OTI): Development and Validation.
- D'Arcy, 2009: The Multifaceted Nature of Security Culture and Its Influence on End User Behavior
- D'Arcy, 2014: Security Culture and the Employment Relationship as Drivers of Employees' Security Compliance
- D'Arcy et al., 2014: Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective
- D'Arcy, 2011: A Review and Analysis of Deterrence Theory in the IS Security Literature: Making Sense of the Disparate Findings
- D'Arcy et al., 2009: User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
- D'Arcy, 2007: Deterring Internal Information Systems Misuse
- Da Veiga, 2007: An Information Security Governance Framework
- Da Veiga, 2010: A Framework and Assessment Instrument for Information Security Culture
- Da Veiga et al., 2007: Information Security Culture - Validation of an Assessment Instrument : Research Article
- Da Veiga, 2015: Information Security Culture and Information Protection Culture: A Validated Assessment Instrument
- Da Veiga, 2016: Comparing the Information Security Culture of Employees Who Had Read the Information Security Policy and Those Who Had Not: Illustrated through an Empirical Study
- Davenport, 1998: Working Knowledge: How Organizations Manage What They Know
- Davis, 1989: Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology
- Dawson, 2013: Knowledge Capabilities as the Focus of Organisational Development and Strategy
- DeCew, 1997: In Pursuit of Privacy: Law, Ethics, and the Rise of Technology
- DeLone, 1992: Information Systems Success: The Quest for the Dependent Variable
- Delone, 2003: The DeLone and McLean Model of Information Systems Success: A Ten-Year Update
- den Braber et al., 2007: Model-Based Security Analysis in Seven Steps \textemdash a Guided Tour to the CORAS Method
- Deshpande, 1982: Factors Affecting the Use of Market Research Information: A Path Analysis
- Dinev, 2004: Internet Privacy Concerns and Their Antecedents - Measurement Validity and a Regression Model
- Dinev, 2006: An Extended Privacy Calculus Model for E-Commerce Transactions
- Dinnie, 1999: The Second Annual Global Information Security Survey
- Doney, 1997: An Examination of the Nature of Trust in Buyer-Seller Relationships
- Dugo, 2007: The Insider Threat to Organizational Information Security: A Structural Model and Empirical Test
- Earp et al., 2005: Examining Internet Privacy Policies Within the Context of User Privacy Values
- Eddy et al., 1999: The Effects of Information Management Policies on Reactions to Human Resource Information Systems: An Integration of Privacy and Procedural Justice Perspectives
- Edwards, 1957: The Social Desirability Variable in Personality Assessment and Research.
- Egelman, 2015: Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS)
- Eisenberger et al., 1986: Perceived Organizational Support
- Eisenhardt, 1985: Control: Organizational and Economic Approaches
- Eliason, 1999: Techniques of Neutralization Used by Deer Poachers in the Western United States: A Research Note
- Ellen et al., 1991: The Role of Perceived Consumer Effectiveness in Motivating Environmentally Conscious Behaviors
- Ellison et al., 2007: The Benefits of Facebook ``Friends:'' Social Capital and College Students' Use of Online Social Network Sites
- Evans et al., 1995: Religion and Crime Reexamined: The Impact of Relition, Secular Controls, and Social Ecology on Adult Criminality
- Eysenck, 1975: Manual of the Eysenck Personality Questionnaire
- Fang, 2010: In Justice We Trust: Exploring Knowledge-Sharing Continuance Intentions in Virtual Communities of Practice
- Feledi et al., 2013: Toward~Web-Based Information Security Knowledge Sharing
- Feledi, 2012: Challenges of Web-Based Information Security Knowledge Sharing
- Fenigstein et al., 1975: Public and Private Self-Consciousness: Assessment and Theory.
- Fey, 2008: Top Management Incentive Compensation and Knowledge Sharing in Multinational Corporations
- Filius et al., 2013: Knowledge Management in the HRD Office: A Comparison of Three Cases
- Fishbein, 1975: Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research
- Forsyth, 1980: A Taxonomy of Ethical Ideologies
- Fowler, 2009: Survey Research Methods
- Freese, 2004: Risk Preferences and Gender Differences in Religiousness: Evidence from the World Values Survey
- Frost et al., 2002: Centers of Excellence in Multinational Corporations
- Furnell, 2009: From Culture to Disobedience: Recognising the Varying User Acceptance of IT Security
- Furnell, 2008: End-User Security Culture: A Lesson That Will Never Be Learnt?
- Gabriel, 2011: Selecting Security Champions
- Galbraith, 1973: Designing Complex Organizations
- Ganesan, 1994: Determinants of Long-Term Orientation in Buyer-Seller Relationships
- Gaski, 1984: The Theory of Power and Conflict in Channels of Distribution
- Gautam et al., 2004: Organizational Identification and Organizational Commitment: Distinct Aspects of Two Related Concepts
- Gefen, 2000: Lessons Learnt from the Successful Adoption of an ERP: The Central Role of Trust
- Gefen et al., 2003: Trust and TAM in Online Shopping: An Integrated Model
- Gefen, 2000: E-Commerce: The Role of Familiarity and Trust
- Germain, 1996: The Role of Context and Structure in Radical and Incremental Logistics Innovation Adoption
- Ghoshal, 1988: Creation, Adoption, and Diffusion of Innovations by Subsidiaries of Multinational Corporations
- Ghoshal, 1986: The Innovative Multinational: A Differentiated Network of Organizational Roles and Management Proceesses
- Gist, 1992: Self-Efficacy: A Theoretical Analysis of Its Determinants and Malleability
- Gold et al., 2001: Knowledge Management: An Organizational Capabilities Perspective
- Goldberg, 1990: An Alternative" Description of Personality": The Big-Five Factor Structure.
- Goldberg, 1992: The Development of Markers for the Big-Five Factor Structure.
- Goodman, 1998: Computer-Aided Systems and Communities: Mechanisms for Organizational Learning in Distributed Environments
- Grasmick et al., 1993: Testing the Core Empirical Implications of Gottfredson and Hirschi's General Theory of Crime
- Green, 1989: Perceived Importance of Systems Analysts' Job Skills, Roles, and Non-Salary Incentives
- Green, 1999: Perceived Control of Software Developers and Its Impact on the Successful Diffusion of Information Technology.
- Gresov, 1993: The Context of Interunit Influence Attempts
- Grewal et al., 2001: An Investigation into the Antecedents of Organizational Participation in Business-to-Business Electronic Markets
- Grootaert et al., 2004: Measuring Social Capital: An Integrated Questionnaire
- Gruen et al., 2000: Relationship Marketing Activities, Commitment, and Membership Behaviors in Professional Associations
- Guo et al., 2011: Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
- Gupta, 1986: Resource Sharing among SBUs: Strategic Antecedents and Administrative Implications
- Gupta, 2000: Knowledge Flows within Multinational Corporations
- Hackman, 1975: Development of the Job Diagnostic Survey.
- Haeussinger, 2013: Information Security Awareness: Its Antecedents and Mediating Effects on Security Compliant Behavior
- Halbert, 1997: Discourses of Danger and the Computer Hacker
- Haldin-Herrgard, 2013: Difficulties in Diffusion of Tacit Knowledge in Organizations
- Hale, 1998: Seven Dimensions of Success Reward Plans
- Hall, 2001: Social Exchange for Knowledge Exchange
- Hansen, 1999: The Search-Transfer Problem: The Role of Weak Ties in Sharing Knowledge across Organization Subunits
- Harbach et al., 2014: It's a Hard Lock Life: A Field Study of Smartphone (Un) Locking Behavior and Risk Perception
- Hargadon, 1998: Firms as Knowledge Brokers: Lessons in Pursuing Continuous Innovation
- Hargittai, 2012: Succinct Survey Measures of Web-Use Skills
- Hargittai, 2005: Survey Measures of Web-Oriented Digital Literacy
- Harrington, 1996: The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions
- Harris, 1998: E-Commerce and Privacy: What Net Users Want
- Hartono et al., 2014: Measuring Perceived Security in B2C Electronic Commerce Website Usage: A Respecification and Validation
- Hartwick, 1994: Explaining the Role of User Participation in Information System Use
- Hays et al., 1989: A Five-Item Measure of Socially Desirable Response Set
- Heide, 1995: Vendor Consideration and Switching Behavior for Buyers in High-Technology Markets
- Heinssen et al., 1987: Assessing Computer Anxiety: Development and Validation of the Computer Anxiety Rating Scale
- Hendriks, 1999: Why Share Knowledge? The Influence of ICT on the Motivation for Knowledge Sharing
- Herath, 2009: Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness
- Herath, 2009: Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations
- Hill et al., 2009: Organizational Context and Face-to-Face Interaction: Influences on the Development of Trust and Collaborative Behaviors in Computer-Mediated Groups
- Hirschi, 1969: Causes of Delinquency
- Hoegl, 2001: Teamwork Quality and the Success of Innovative Projects: A Theoretical Concept and Empirical Evidence
- Hofstede et al., 2008: Values Survey Module 2008
- Hogan, 1970: A Dimension of Moral Judgment.
- Hogan, 1973: Moral Conduct and Moral Character: A Psychological Perspective.
- Hollinger, 1991: Hackers: Computer Heroes or Electronic Highwaymen?
- Holm et al., 2000: The Emergence and Impact of MNC Centres of Excellence
- Hong, 2013: Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies
- Hoopes, 1999: Shared Knowledge, "Glitches," and Product Development Performance
- Hoving, 2003: Knowledge Management-Coming Up the Learning Curve
- Hoyle et al., 2002: Reliability and Validity of a Brief Measure of Sensation Seeking
- Hsu, 2008: Acceptance of Blog Usage: The Roles of Technology Acceptance, Social Influence and Knowledge Sharing Motivation
- Hsu et al., 2007: Knowledge Sharing Behavior in Virtual Communities: The Relationship between Trust, Self-Efficacy, and Outcome Expectations
- Hu et al., 2012: Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*
- Hu et al., 2014: Why Individuals Commit Information Security Violations: Neural Correlates of Decision Processes and Self-Control
- Hu et al., 2015: The Role of Self-Control in Information Security Violations: Insights from a Cognitive Neuroscience Perspective
- Hu et al., 2011: Does Deterrence Work in Reducing Information Security Policy Abuse by Employees?
- Huang, 2009: Knowledge Sharing and Group Cohesiveness on Performance: An Empirical Study of Technology R&D Teams in Taiwan
- Huang et al., 2010: Perception of Information Security
- Hurley, 1998: Innovation, Market Orientation, and Organizational Learning: An Integration and Empirical Examination
- Hutchings, 2013: Facilitating Knowledge Sharing in Russian and Chinese Subsidiaries: The Role of Personal Networks and Group Membership
- Ifinedo, 2012: Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory
- Ifinedo, 2014: Information Systems Security Policy Compliance: An Empirical Study of the Effects of Socialisation, Influence, and Cognition
- Igbaria et al., 1996: A Motivational Model of Microcomputer Usage
- Iivari, 1996: Why Are CASE Tools Not Used?
- Ipe, 2003: Knowledge Sharing in Organizations: A Conceptual Framework
- Jap, 1999: Pie-Expansion Efforts: Collaboration Processes in Buyer-Supplier Relationships
- Jarvenpaa, 1991: Executive Involvement and Participation in the Management of Information Technology
- Jarvenpaa, 1999: Communication and Trust in Global Virtual Teams
- Jarvenpaa et al., 1999: Consumer Trust in an Internet Store: A Cross-Cultural Validation
- Jarvenpaa et al., 2000: Consumer Trust in an Internet Store
- Jaw, 2003: Promoting Organizational Learning and Self-Renewal in Taiwanese Companies: The Role of HRM
- Jaworski, 1993: Market Orientation: Antecedents and Consequences
- Jeon et al., 2011: Individual, Social, and Organizational Contexts for Active Knowledge Sharing in Communities of Practice
- Jiacheng et al., 2010: A Cognitive Model of Intra-Organizational Knowledge-Sharing Motivations in the View of Cross-Culture
- Jiang et al., 2002: Measuring Information System Service Quality: SERVQUAL from the Other Side
- John et al., 1991: The Big Five Inventory\textemdashVersions 4a and 54
- Johnson et al., 1999: An Industry Analysis of Developer Beliefs About Object-Oriented Systems Development
- Johnston et al., 2016: Dispositional and Situational Factors: Influences on Information Security Policy Violations
- Johnston, 2010: Fear Appeals and Information Security Behaviors: An Empirical Study
- Johnston, 2010: The Influence of Perceived Source Credibility on End User Attitudes and Intentions to Comply with Recommended It Actions
- Joireman et al., 2012: Promotion Orientation Explains Why Future-Oriented People Exercise and Eat Healthy: Evidence From the Two-Factor Consideration of Future Consequences-14 Scale
- Joo, 2016: The Influence of Information Security on the Adoption of Web-Based Integrated Information Systems: An e-Government Study in Peru
- Joseph, 1992: Computer Infectors
- Kachra, 2008: Know-How Transfer: The Role of Social, Economic/Competitive, and Firm Boundary Factors
- Kahn, 2001: Market Orientation, Interdepartmental Integration, and Product Development Performance
- Kajzer et al., 2014: An Exploratory Investigation of Message-Person Congruence in Information Security Awareness Campaigns
- Kale et al., 2000: Learning and Protection of Proprietary Assets in Strategic Alliances: Building Relational Capital
- Kalman, 1999: The Effects of Organizational Commitment and Expected Outcomes on the Motivation to Share Discretionary Information in a Collaborative Database: Communication Dilemmas and Other Serious Games
- Kam, 2015: Risk Orientations and Policy Frames
- Kanawattanachai, 2002: Dynamic Nature of Trust in Virtual Teams
- Kankanhalli et al., 2005: Contributing Knowledge to Electronic Knowledge Repositories: An Empirical Investigation
- Kankanhalli et al., 2003: An Integrative Study of Information Systems Security Effectiveness
- Karahanna et al., 1999: Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs
- Karlsson et al., 2017: Measuring Employees' Compliance \textendash the Importance of Value Pluralism
- Kearney et al., 2016: Theorising on Risk Homeostasis in the Context of Information Security Behaviour
- Kelley, 2016: Attention and Past Behavior, Not Security Knowledge, Modulate Users' Decisions to Login to Insecure Websites
- Kennedy, 2016: The Pathway to Security\textendashMitigating User Negligence
- Kim, 2008: An Analysis of Faculty Perceptions: Attitudes toward Knowledge Sharing and Collaboration in an Academic Institution
- Kim, 1995: R&D Project Team Climate and Team Performance in Korea: A Multidimensional Approach
- King, 1996: Key Dimensions of Facilitators and Inhibitors for the Strategic Use of Information Technology
- Kirsch, 2007: The Last Line of Defense: Motivating Employees to Follow Corporate Security Guidelines
- Kirsch, 1996: The Management of Complex Tasks in Organizations: Controlling the Systems Development Process
- Klein et al., 1990: A Transaction Cost Analysis Model of Channel Integration in International Markets
- Knapp et al., 2006: Information Security: Management's Effect on Culture and Policy
- Knapp et al., 2005: Managerial Dimensions in Information Security: A Theoretical Model of Organizational Effectiveness
- Kogan, 1964: Risk Taking: A Study in Cognition and Personality.
- Kogut, 1992: Knowledge of the Firm, Combinative Capabilities, and the Replication of Technology
- Koh, 2004: Knowledge Sharing in Virtual Communities: An e-Business Perspective
- Kohlberg, 1968: The Child as a Moral Philosopher
- Kolekofski, 2003: Beliefs and Attitudes Affecting Intentions to Share Information in an Organizational Setting
- Kolhberg, 1974: Moralization: The Cognitive-Developmental Approach
- Komatsu et al., 2013: Human Aspects of Information Security: An Empirical Study of Intentional versus Actual Behavior
- Kotabe et al., 2003: Gaining from Vertical Partnerships: Knowledge Transfer, Relationship Duration, and Supplier Performance Improvement in the U.S. and Japanese Automotive Industries
- Koys, 1991: Inductive Measures of Psychological Climate
- Kreiner, 2006: Consequences of Work-Home Segmentation or Integration: A Person-Environment Fit Perspective
- Kuhl, 1994: Action versus State Orientation: Psychometric Properties of the Action Control Scale. ACS-90
- Kumar et al., 1995: The Effects of Perceived Interdependence on Dealer Attitudes
- Kumaraguru, 2005: Privacy Indexes: A Survey of Westin's Studies
- Kuo, 2008: A Study of the Intention\textendashAction Gap in Knowledge Sharing Practices
- Kwan et al., 2010: Applying the Randomized Response Technique to Elicit Truthful Responses to Sensitive Questions in IS Research: The Case of Software Piracy Behavior
- Lai, 2005: Technology Acceptance Model for Internet Banking: An Invariance Analysis
- Lane, 1998: Relative Absorptive Capacity and Interorganizational Learning
- Lawshe, 1975: A Quantitative Approach to Content Validity
- Lawson et al., 2009: Knowledge Sharing in Interorganizational Product Development Teams: The Effect of Formal and Informal Socialization Mechanisms
- Leathers, 1992: Successful Nonverbal Communication: Principles and Applications
- Lee, 1994: Self-Efficacy Beliefs: Comparison of Five Measures.
- Lee, 2003: Knowledge Management Enablers, Processes, and Organizational Performance: An Integrative View and Empirical Examination
- Lee, 2001: The Impact of Knowledge Sharing, Organizational Capability and Partnership Quality on IS Outsourcing Success
- Lee et al., 2006: Effects of Managerial Drivers and Climate Maturity on Knowledge-Management Performance: Empirical Validation
- Lee, 2001: A Trust Model for Consumer Internet Shopping
- Lee et al., 2004: An Integrative Model of Computer Abuse Based on Social Control and General Deterrence Theories
- Lee, 2009: Threat or Coping Appraisal: Determinants of SMB Executives' Decision to Adopt Anti-Malware Software
- Lee et al., 2007: Understanding Personal Web Usage in Organizations
- Leonard, 2001: Illegal, Inappropriate, and Unethical Behavior in an Information Technology Context: A Study to Explain Influences
- Lesser, 2000: Leveraging Social Capital in Organizations
- Leventhal et al., 1980: Beyond Fairness: A Theory of Allocation Preferences
- Leventhal, 1976: The Distribution of Rewards and Resources in Groups and Organizations
- Lewis, 2004: Knowledge and Performance in Knowledge-Worker Teams: A Longitudinal Study of Transactive Memory Systems
- Li et al., 2010: Understanding Compliance with Internet Use Policy from the Perspective of Rational Choice Theory
- Liang et al., 2007: Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management
- Liang, 2009: Avoidance of Information Technology Threats: A Theoretical Perspective
- Liebowitz, 1999: Knowledge Management Handbook
- Limayem et al., 2004: Factors Motivating Software Piracy: A Longitudinal Study
- Lin, 2007: To Share or Not to Share: Modeling Knowledge Sharing Using Exchange Ideology as a Moderator
- Lin et al., 2008: Knowledge Sharing and Creation in a Teachers' Professional Virtual Community
- Lin, 2004: Perceptions of Senior Managers toward Knowledge-sharing Behaviour
- Lin, 2005: Impact of Organizational Learning and Knowledge Management Factors on E-business Adoption
- Lin et al., 2009: Fostering the Determinants of Knowledge Sharing in Professional Virtual Communities
- Lin et al., 1999: An Intention Model-Based Study of Software Piracy
- Liu, 2008: Sources of Knowledge Acquisition and Patterns of Knowledge-Sharing Behaviors\textemdashAn Empirical Study of Taiwanese High-Tech Firms
- Loch, 1996: Evaluating Ethical Decision Making and Computer Use
- Locke, 1986: Generalizing from Laboratory to Field Settings: Research Findings from Industrial-Organizational Psychology, Organizational Behavior, and Human Resource Management
- Loke, 2015: If Nothing Happens, Is Everything All Right? Distinguishing Genuine Reassurance from a False Sense of Security
- Loyd, 1984: Reliability and Factorial Validity of Computer Attitude Scales
- Luchenski et al., 2013: Patient and Public Views on Electronic Health Records and Their Uses in the United Kingdom: Cross-Sectional Survey
- Luchenski et al., 2012: Survey of Patient and Public Perceptions of Electronic Health Records for Healthcare, Policy and Research: Study Protocol
- Luhtanen, 1992: A Collective Self-Esteem Scale: Self-Evaluation of One's Social Identity
- Lund et al., 2011: A Guided Tour of the Coras Method
- Malhotra et al., 2004: Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model
- Malhotra, 2005: A Multidimensional Commitment Model of Volitional Systems Adoption and Usage Behavior
- Mani et al., 2015: Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: An Empirical Analysis
- Mani et al., 2014: Information Security in the South Australian Real Estate Industry: A Study of 40 Real Estate Organisations
- Marakas et al., 2007: The Evolving Nature of the Computer Self-Efficacy Construct: An Empirical Investigation of Measurement Construction, Validity, Reliability and Stability over Time
- Markides, 1996: Corporate Diversification and Organizational Structure: A Resource-Based View
- Marks et al., 2001: A Temporally Based Framework and Taxonomy of Team Processes
- Marshall, 1974: Dimensions of Privacy Preferences
- Martins, 2002: Information Security Culture
- Mason, 2014: Cultural Values, Information Sources, and Perceptions of Security
- Mathieson, 1991: Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior
- Maurer, 1994: Investigation of Perceived Environment, Perceived Outcome, and Person Variables in Relationship to Voluntary Development Activity by Employees.
- Mayer et al., 1995: An Integrative Model of Organizational Trust
- McAllister, 1995: Affect- and Cognition-Based Trust as Foundations for Interpersonal Cooperation in Organizations
- McKinney et al., 2002: The Measurement of Web-Customer Satisfaction: An Expectation and Disconfirmation Approach
- McKnight et al., 2002: Developing and Validating Trust Measures for E-Commerce: An Integrative Typology
- McKnight et al., 2002: The Impact of Initial Consumer Trust on Intentions to Transact with a Web Site: A Trust Building Model
- Mento et al., 1992: Relationship of Goal Level to Valence and Instrumentality.
- Miller, 2000: Going to Hell in Asia: The Relationship between Risk and Religion in a Cross Cultural Setting
- Miller, 1986: Psychological and Traditional Determinants of Structure
- Miller, 1982: Innovation in Conservative and Entrepreneurial Firms: Two Models of Strategic Momentum
- Miller et al., 1982: Top Executive Locus of Control and Its Relationship to Strategy-Making, Structure, and Environment
- Milne et al., 2000: Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory
- Mintzberg, 1979: The Structuring of Organizations: A Synthesis of the Research
- Mishra, 1996: Organizational Responses to Crisis
- Mohr, 1994: Characteristics of Partnership Success: Partnership Attributes, Communication Behavior, and Conflict Resolution Techniques
- Monteiro et al., 2008: Knowledge Flows Within Multinational Corporations: Explaining Subsidiary Isolation and Its Performance Implications
- Moore, 1991: Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation
- Moore, 2000: One Road to Turnover: An Examination of Work Exhaustion in Technology Professionals
- Moran, 2004: Creating a Multi-Company Community of Practice for Chief Information Officers
- Morgan, 1994: The Commitment-Trust Theory of Relationship Marketing
- Mothersbaugh et al., 2012: Disclosure Antecedents in an Online Service Context: The Role of Sensitivity of Information
- Mowday et al., 1979: The Measurement of Organizational Commitment
- Myyry et al., 2009: What Levels of Moral Reasoning and Values Explain Adherence to Information Security Rules? An Empirical Study
- Nadeau et al., 1999: Attitude Towards Risk-Taking and Individual Choice in the Quebec Referendum on Sovereignty
- Nadler, 1987: Strategic Organization Design: Concepts, Tools & Processes
- Nagin, 1993: Enduring Individual Differences and Rational Choice Theories of Crime
- Nahapiet, 1998: Social Capital, Intellectual Capital, and the Organizational Advantage
- Nance, 1988: An Investigation into the Use and Usefulness of Security Software in Detecting Computer Abuse
- Netemeyer et al., 1997: An Investigation into the Antecedents of Organizational Citizenship Behaviors in a Personal Selling Context
- Netemeyer et al., 1996: Development and Validation of Work-Family Conflict and Family-Work Conflict Scales.
- Neuwirth et al., 2000: Protection Motivation and Risk Communication
- Nobel, 1998: Innovation in Multinational Corporations: Control and Communication Patterns in International R&D Operations
- Nonaka et al., 2000: SECI, Ba and Leadership: A Unified Model of Dynamic Knowledge Creation
- O'Reilly, 1986: Organizational Commitment and Psychological Attachment: The Effects of Compliance, Identification, and Internalization on Prosocial Behavior.
- Orlikowski, 1993: Learning from Notes: Organizational Issues in Groupware Implementation
- Pahnila et al., 2007: Employees' Behavior towards IS Security Policy Compliance
- Papoutsi et al., 2015: Patient and Public Views about the Security and Privacy of Electronic Health Records (EHRs) in the UK: Results from a Mixed Methods Study
- Parker, 1998: Enhancing Role Breadth Self-Efficacy: The Roles of Job Enrichment and Other Organizational Interventions
- Parsons et al., 2014: Determining Employee Awareness Using the Human Aspects of Information Security Questionnaire (HAIS-Q)
- Parsons et al., 2014: A Study of Information Security Awareness in Australian Government Organisations
- Parsons et al., 2015: The Influence of Organizational Information Security Culture on Information Security Decision Making
- Paternoster, 1996: Sanction Threats and Appeals to Morality: Testing a Rational Choice Model of Corporate Crime
- Pattinson et al., 2016: Assessing Information Security Attitudes: A Comparison of Two Studies
- Patton, 1995: Factor Structure of the Barratt Impulsiveness Scale
- Pavlou, 2006: Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior
- Pavri, 1988: An Empirical Study Of The Factors Contributing To Microcomputer Usage
- Payne, 1971: G. G. Stern's Organizational Climate Index: A Reconceptualization and Application to Business Organizations
- Peace et al., 2003: Software Piracy in the Workplace: A Model and Empirical Test
- Pedersen, 2001: Adoption of Mobile Commerce: An Exploratory Analysis
- Pee et al., 2008: Explaining Non-Work-Related Computing in the Workplace: A Comparison of Alternative Models
- Pinsonneault, 1997: Anonymity in Group Support Systems Research: A New Conceptualization, Measure, and Contingency Framework
- Porter et al., 1974: Organizational Commitment, Job Satisfaction, and Turnover among Psychiatric Technicians.
- Portes, 1998: Social Capital: Its Origins and Applications in Modern Sociology
- Prahalad, 1999: The Multinational Mission: Balancing Local Demands and Global Vision
- Preibusch, 2013: Guide to Measuring Privacy Concern: Review of Survey and Observational Instruments
- Quigley et al., 2007: A Multilevel Investigation of the Motivational Mechanisms Underlying Knowledge Sharing and Performance
- Rainer et al., 2007: Do Information Security Professionals and Business Managers View Information Security Issues Differently?
- Ratnasingam, 2005: Trust in Inter-Organizational Exchanges: A Case Study in Business to Business Electronic Commerce
- Redmiles et al., 2016: How i Learned to Be Secure: A Census-Representative Survey of Security Advice Sources and Behavior
- Requena, 2003: Social Capital, Satisfaction and Quality of Life in the Workplace
- Rest, 1979: Development in Judging Moral Issues
- Rest, 1986: D.I.T.: Manual for the Defining Issues Test
- Reynolds, 1982: Development of Reliable and Valid Short Forms of the Marlowe-Crowne Social Desirability Scale
- Rhee et al., 2009: Self-Efficacy in Information Security: Its Influence on End Users' Information Security Practice Behavior
- Rhee et al., 2005: I Am Fine but You Are Not: Optimistic Bias and Illusion of Control on Information Security
- Ridings et al., 2002: Some Antecedents and Effects of Trust in Virtual Communities
- Riemenschneider et al., 2003: Understanding It Adoption Decisions in Small Business: Integrating Current Theories
- Rioux, 2001: The Causes of Organizational Citizenship Behavior: A Motivational Analysis.
- Rippetoe, 1987: Effects of Components of Protection-Motivation Theory on Adaptive and Maladaptive Coping with a Health Threat.
- Rogers, 1995: The Psychological Testing Enterprise: An Introduction
- Rotter, 1966: Generalized Expectancies for Internal Versus External Control of Reinforcement
- Rulke et al., 2000: Sources of Managers' Knowledge of Organizational Capabilities
- Ryan et al., 2010: Organizational Practices That Foster Knowledge Sharing: Validation across Distinct National Cultures
- Ryu et al., 2003: Knowledge Sharing Behavior of Physicians in Hospitals
- Sacks, 1994: On the Job Learning in the Software Industry: Corporate Culture and the Acquisition of Knowledge
- Salter, 1973/03//Mar/Apr73: Tailor Incentive Compensation to Strategy
- Sambamurthy, 1996: Information Technology and Innovation: Strategies for Success
- Schaub, 1995: The Ultimate Computer Security Survey
- Scholtes, 1993: Total Quality or Performance Appraisal: Choose One
- Schulz, 2001: The Uncertain Relevance of Newness: Organizational Learning and Knowledge Flows
- Schulz, 2003: Pathways of Relevance: Exploring Inflows of Knowledge into Subunits of Multinational Corporations
- Schwartz et al., 1999: Multimethod Probes of Basic Human Values
- Schwartz, 1972: A test of a model for reducing measured attitude-behavior discrepancies
- Scott, 1995: Decision-Making Style: The Development and Assessment of a New Measure
- Senge, 2006: The Fifth Discipline: The Art and Practice of the Learning Organization
- Seonghee, 2008: An Analysis of Faculty Perceptions: Attitudes toward Knowledge Sharing and Collaboration in an Academic Institution
- Seydlitz, 1993: Complexity in the Relationships among Direct and Indirect Parental Controls and Delinquency
- Shapiro et al., 1994: Explanations: What Factors Enhance Their Perceived Adequacy?
- Sheehan, 2000: Dimensions of Privacy Concern among Online Consumers
- Sheeran, 1996: How Confidently Can We Infer Health Beliefs from Questionnaire Responses?
- Shih, 2004: Extended Technology Acceptance Model of Internet Utilization Behavior
- Shih, 2015: Investigate the Effects of Information Security Climate and Psychological Ownership on Information Security Policy Compliance.
- Shirazi et al., 2017: Cloud Computing Security and Privacy: An Empirical Study
- Siegel, 1973: Job Involvement, Participation in Decision Making, Personal Background and Job Behavior
- Simon, 1945: Administrative Behavior, 4th Edition
- Simonin, 1999: Ambiguity and the Process of Knowledge Transfer in Strategic Alliances
- Siponen et al., 2014: Employees' Adherence to Information Security Policies: An Exploratory Field Study
- Siponen et al., 2010: Compliance with Information Security Policies: An Empirical Investigation
- Siponen, 2010: Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations
- Siponen, 2014: Guidelines for Improving the Contextual Relevance of Field Surveys: The Case of Information Security Policy Violations
- Siponen, 2009: Information Security Management Standards: Problems and Solutions
- Sivadas, 2000: An Examination of Organizational Factors Influencing New Product Success in Internal and Alliance-Based Processes
- Skinner et al., 1992: Cooperation in Supplier-Dealer Relations
- Smith et al., 1996: Information Privacy: Measuring Individuals' Concerns about Organizational Practices
- Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Sommestad et al., 2014: Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
- Son, 2011: Out of Fear or Desire? Toward a Better Understanding of Employees' Motivation to Follow IS Security Policies
- Sparks, 1998: Marketing Researcher Ethical Sensitivity: Conceptualization, Measurement, and Exploratory Investigation
- Srinivasan et al., 2002: Customer Loyalty in E-Commerce: An Exploration of Its Antecedents and Consequences
- Stanciu, 2016: Students' Awareness on Information Security between Own Perception and Reality\textendashan Empirical Study
- Starbuck, 1992: Learning by Knowledge-Intensive Firms
- Steffensmeier, 1996: Gender and Crime: Toward a Gendered Theory of Female Offending
- Straub, 1989: Validating Instruments in MIS Research
- Straub, 1990: Effective IS Security: An Empirical Study
- Swanson, 1987: Information Channel Disposition and Use
- Taggart, 1997: Autonomy and Procedural Justice: A Framework for Evaluating Subsidiary Strategy
- Tamjidyamcholo et al., 2014: Evaluation Model for Knowledge Sharing in Information Security Professional Virtual Community
- Tamjidyamcholo et al., 2013: Information Security \textendash Professional Perceptions of Knowledge-Sharing Intention under Self-Efficacy, Trust, Reciprocity, and Shared-Language
- Tang, 2016: The Impacts of Organizational Culture on Information Security Culture: A Case Study
- Taylor, 2009: Knowledge Sharing among Accounting Academics in an Electronic Network of Practice
- Taylor, 1995: Understanding Information Technology Usage: A Test of Competing Models
- Taylor, 2004: Organizational Readiness for Successful Knowledge Sharing: Challenges for Public Sector Managers
- Teigland, 2004: Extending Richness with Reach: Participation and Knowledge Exchange in Electronic Networks of Practice
- Thibaut, 1959: The Social Psychology of Groups
- Thibaut, 1975: Procedural Justice: A Psychological Analysis
- Thompson, 1998: 1997 Computer Crime and Security Survey
- Thompson et al., 1991: Personal Computing: Toward a Conceptual Model of Utilization
- Thompson et al., 1994: Influence of Experience on Personal Computer Utilization: Testing a Conceptual Model
- Thurman, 1984: Deviance and the Neutralization of Moral Commitment: An Empirical Analysis
- Tobin, 1998: The Knowledge-Enabled Organization: Moving from "Training" to "Learning" to Meet Business Goals
- Triandis, 1977: Interpersonal Behavior
- Tsai, 1998: Social Capital and Value Creation: The Role of Intrafirm Networks
- Tsai, 2002: Social Structure of ``Coopetition'' Within a Multiunit Organization: Coordination, Competition, and Intraorganizational Knowledge Sharing
- Tsohou et al., 2015: Managing the Introduction of Information Security Awareness Programmes in Organisations
- Tsohou et al., 2015: Analyzing the Role of Cognitive and Cultural Biases in the Internalization of Information Security Policies: Recommendations for Information Security Awareness Programs
- Tu et al., 2015: Learning to Cope with Information Security Risks Regarding Mobile Device Loss or Theft: An Empirical Examination
- Tyler et al., 1996: Understanding Why the Justice of Group Procedures Matters: A Test of the Psychological Dynamics of the Group-Value Model.
- Van Der Vegt et al., 1998: Motivating Effects of Task and Outcome Interdependence in Work Teams
- Van Vianen, 2000: Person-Organization Fit: The Match between Newcomers' and Recruiters' Preferences for Organizational Cultures
- Vance et al., 2014: Using Measures of Risk Perception to Predict Information Security Behavior: Insights from Electroencephalography (EEG)
- Vance et al., 2012: Motivating IS Security Compliance: Insights from Habit and Protection Motivation Theory
- Vance, 2012: IS Security Policy Violations: A Rational Choice Perspective
- Vancil, 1979: Decentralization: Managerial Ambiguity by Design
- Venkatesh et al., 2003: User Acceptance of Information Technology: Toward a Unified View
- Venkatesh et al., 2002: User Acceptance Enablers in Individual Decision Making About Technology: Toward an Integrated Model
- Venkatesh, 2000: Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model
- Victor, 1987: A Theory and Measure of Ethical Climate in Organizations
- Victor, 1988: The Organizational Bases of Ethical Work Climates
- Wah et al., 2007: Social Capital and Knowledge Sharing in Knowledge-Based Organizations: An Empirical Study
- Walker, 1987: Marketing's Role in the Implementation of Business Strategies: A Critical Review and Conceptual Framework
- Wamba, 2016: Social Media Tools Adoption and Use by SMES: An Empirical Study
- Wang, 2004: The Influence of Ethical and Self-Interest Concerns on Knowledge Sharing Intentions among Managers: An Empirical Study
- Wang, 1996: Beyond Accuracy: What Data Quality Means to Data Consumers
- Wasko, 2000: ``It Is What One Does'': Why People Participate and Help Others in Electronic Communities of Practice
- Wasko, 2005: Why Should I Share? Examining Social Capital and Knowledge Contribution in Electronic Networks of Practice
- Watson et al., 2015: Mapping User Preference to Privacy Default Settings
- Webster et al., 1990: Computer Training and Computer Anxiety in the Educational Process: An Experimental Analysis
- Webster, 1992: Microcomputer Playfulness: Development of a Measure with Workplace Implications
- Weiss, 1993: The Nature of Organizational Search in High Technology Markets
- Wenzel, 2004: The Social Side of Sanctions: Personal and Social Norms as Moderators of Deterrence
- Wilke et al., 2014: An Evolutionary Domain-Specific Risk Scale
- Willem et al., 2006: The Role of Inter-Unit Coordination Mechanisms in Knowledge Sharing: A Case Study of a British MNC
- Willem, 2009: Knowledge Sharing in Inter-Unit Cooperative Episodes: The Impact of Organizational Structure Dimensions
- Williamson, 1975: Markets and Hierarchies: Analysis and Antitrust Implications: A Study in the Economics of Internal Organization
- Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Witte, 1996: Predicting Risk Behaviors: Development and Validation of a Diagnostic Scale
- Wolfe, 2008: Knowledge Sharing: The Effects of Incentives, Environment, and Person
- Wong et al., 2001: The Significant Role of Chinese Employees' Organizational Commitment: Implications for Managing Employees in Chinese Societies
- Woon et al., 2005: A Protection Motivation Theory Approach to Home Wireless Security
- Woon, 2007: Investigation of IS Professionals' Intention to Practise Secure Development of Applications
- Workman et al., 2008: Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test
- Workman, 2007: Punishment and Ethics Deterrents: A Study of Insider Security Contravention
- Wu, 2006: Measuring KMS Success: A Respecification of the DeLone and McLean's Model
- Xue et al., 2011: Punishment, Justice, and Compliance in Mandatory IT Settings
- Yahya, 2002: Managing Human Resources toward Achieving Knowledge Management
- Yamagishi, 1993: Generalized Exchange and Social Dilemmas
- Yang, 2007: Can Organizational Knowledge Capabilities Affect Knowledge Sharing Behavior?
- Yang et al., 2005: Development and Validation of an Instrument to Measure User Perceived Service Quality of Information Presenting Web Portals
- Yoo, 2013: Developments of Transactive Memory Systems and Collective Mind in Virtual Teams
- Yoon, 2011: Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model
- Zander, 1995: Knowledge and the Speed of the Transfer and Imitation of Organizational Capabilities: An Empirical Test
- Zboralski, 2009: Antecedents of Knowledge Sharing in Communities of Practice
- Zeithaml et al., 1996: The Behavioral Consequences of Service Quality
- Zhang et al., 2009: Impact of Perceived Technical Protection on Security Behaviors
- Zhang, 2006: Thinking Styles and the Big Five Personality Traits Revisited
- Zhang et al., 2014: After We Knew It: Empirical Study and Modeling of Cost-Effectiveness of Exploiting Prevalent Known Vulnerabilities across Iaas Cloud
- Zuckerman et al., 1978: Sensation Seeking in England and America: Cross-Cultural, Age, and Sex Comparisons.
- Al-Khaldi, 1999: The Influence of Attitudes on Personal Computer Utilization among Knowledge Workers: The Case of Saudi Arabia
- Al-Omari et al., 2013: Information Security Policy Compliance: An Empirical Study of Ethical Ideology
- Becerra-Fernandez, 2001: Organizational Knowledge Management: A Contingency Perspective
- Goffman, 1969: The Presentation of Self in Everyday Life
- Hernández-Espallardo, 2003: The Effects of Authoritative Mechanisms of Coordination on Market Orientation in Asymmetrical Channel Partnerships
- Leonard-Barton, 1995: Wellsprings of Knowledge: Building and Sustaining the Sources of Innovation
- Ragu-Nathan et al., 2008: The Consequences of Technostress for End Users in Organizations: Conceptual Development and Empirical Validation
- van den Hooff, 2003: The Context of Knowledge Sharing: The Influence of Organizational Commitment, Communication and CMC Use on Knowledge Sharing
- van den Hooff, 2004: Knowledge Sharing in Context: The Influence of Organizational Commitment, Communication Climate and CMC Use on Knowledge Sharing
- van Muijen et al., 1999: Organizational Culture: The Focus Questionnaire