Siponen et al., 2010: Compliance with Information Security Policies: An Empirical Investigation
This publication is cited by the following publications:
- Al-Omari et al., 2013: Intention to Comply
- Al-Omari et al., 2013: Self-Efficacy
- Al-Omari et al., 2013: Subjective Norm
- Al-Omari et al., 2013: Moral Obligation
- Al-Omari et al., 2013: Utilitarianism
- Al-Omari et al., 2013: Formalism
- Al-Omari et al., 2013: Ethical Egoism
- Al-Omari et al., 2013: Attitude
- Sommestad et al., 2014: Actual compliance
- Sommestad et al., 2014: Attitude towards compliance
- Sommestad et al., 2014: Intention to comply
- Sommestad et al., 2014: Normative beliefs
- Sommestad et al., 2014: Perceived cost of non-compliance
- Sommestad et al., 2014: Response efficacy
- Sommestad et al., 2014: Rewards
- Sommestad et al., 2014: Self-efficacy
- Sommestad et al., 2014: Source competency
- Sommestad et al., 2014: Source trustworthiness
- Sommestad et al., 2014: Source dynamism
- Sommestad et al., 2014: Threat appraisal
- Sommestad et al., 2014: Visibility
Citation:
Mikko Siponen, Seppo Pahnila, and M. Adam Mahmood.
Compliance with Information Security Policies: An Empirical Investigation.
Computer, 43(2):64–71, February 2010.
doi:10.1109/MC.2010.35.
Bibtex
@article{siponen_compliance_2010,
author = {Siponen, Mikko and Pahnila, Seppo and Mahmood, M. Adam},
doi = {10.1109/MC.2010.35},
issn = {0018-9162},
journal = {Computer},
month = {February},
number = {2},
pages = {64-71},
shorttitle = {Compliance with {{Information Security Policies}}},
title = {Compliance with {{Information Security Policies}}: {{An Empirical Investigation}}},
volume = {43},
year = {2010}
}