Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance
Authors
Keywords
-
Journal
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
Volume 37, Issue 1, Pages 129-161
Publisher
Informa UK Limited
Online
2020-03-02
DOI
10.1080/07421222.2019.1705512
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Taking “Fun and Games” Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM)
- (2018) Paul Lowry et al. Journal of the Association for Information Systems
- It’s complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis
- (2017) Gregory D. Moody et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda
- (2017) Paul Benjamin Lowry et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Using IT Design to Prevent Cyberbullying
- (2017) Paul Benjamin Lowry et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Training to Mitigate Phishing Attacks Using Mindfulness Techniques
- (2017) Matthew L. Jensen et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- A Video-Based Screening System for Automated Risk Assessment Using Nuanced Facial Features
- (2017) Steven J. Pentland et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Creating High-Value Real-World Impact through Systematic Programs of Research
- (2017) Jay F. Nunamaker et al. MIS QUARTERLY
- Toward Meaningful Engagement: A Framework for Design and Research of Gamified Information Systems
- (2017) De Liu et al. MIS QUARTERLY
- Detecting Fake Websites: The Contribution of Statistical Learning Theory
- (2017) Abbasi et al. MIS QUARTERLY
- Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- (2017) Bulgurcu et al. MIS QUARTERLY
- Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors
- (2017) Clay Posey et al. MIS QUARTERLY
- Beyond Deterrence: An Expanded View of Employee Computer Abuse
- (2017) Robert Willison et al. MIS QUARTERLY
- Positioning and Presenting Design Science Research for Maximum Impact
- (2017) Shirley Gregor et al. MIS QUARTERLY
- The inner and the outer model in explanatory design theory: the case of designing electronic feedback systems
- (2016) Bjoern Niehaves et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Close games versus blowouts: Optimal challenge reinforces one's intrinsic motivation to win
- (2016) Liang Meng et al. INTERNATIONAL JOURNAL OF PSYCHOPHYSIOLOGY
- Factors That Influence Employees’ Security Policy Compliance: An Awareness-Motivation-Capability Perspective
- (2016) Xiaofeng Chen et al. JOURNAL OF COMPUTER INFORMATION SYSTEMS
- Overconfidence in Phishing Email Detection
- (2016) Jingguo Wang et al. Journal of the Association for Information Systems
- The Last Research Mile: Achieving Both Rigor and Relevance in Information Systems Research
- (2015) Jay F. Nunamaker et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets
- (2015) Clay Posey et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Proposing the Multimotive Information Systems Continuance Model (MISC) to Better Explain End-User System Evaluations and Continuance Intentions
- (2015) Paul Lowry et al. Journal of the Association for Information Systems
- Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations
- (2015) Anthony Vance et al. MIS QUARTERLY
- An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
- (2015) Allen C. Johnston et al. MIS QUARTERLY
- What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors
- (2015) Scott R. Boss et al. MIS QUARTERLY
- Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals
- (2015) Nathan W. Twyman et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Shadow IT – A view from behind the curtain
- (2014) Mario Silic et al. COMPUTERS & SECURITY
- Enhancing User-Game Engagement Through Software Gaming Elements
- (2014) Mengxiang Li et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Gamifying learning experiences: Practical implications and outcomes
- (2013) Adrián Domínguez et al. COMPUTERS & EDUCATION
- Organizations' Information Security Policy Compliance: Stick or Carrot Approach?
- (2013) Yan Chen et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Using Accountability to Reduce Access Policy Violations in Information Systems
- (2013) Anthony Vance et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Playing Super Mario induces structural brain plasticity: gray matter changes resulting from training with a commercial video game
- (2013) S Kühn et al. MOLECULAR PSYCHIATRY
- An online game approach for improving students’ learning performance in web-based problem-solving activities
- (2012) Gwo-Jen Hwang et al. COMPUTERS & EDUCATION
- Future directions for behavioral information security research
- (2012) Robert E. Crossler et al. COMPUTERS & SECURITY
- VirSchool: The effect of background music and immersive display systems on memory for facts learned in an educational virtual environment
- (2011) Eric Fassbender et al. COMPUTERS & EDUCATION
- A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings
- (2011) John D'Arcy et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Teaching Johnny not to fall for phish
- (2010) Ponnurangam Kumaraguru et al. ACM Transactions on Internet Technology
- Predicting Collaboration Technology Use: Integrating Technology Adoption and Collaboration Research
- (2010) Susan A. Brown et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
- (2009) Tejaswini Herath et al. DECISION SUPPORT SYSTEMS
- Perceived interactivity leading to e-loyalty: Development of a model for cognitive–affective user responses
- (2009) Dianne Cyr et al. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES
- Determinants of the Choice of Open Source Software License
- (2009) Ravi Sen et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Measuring and defining the experience of immersion in games
- (2008) Charlene Jennett et al. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started