The effects of knowledge mechanisms on employees' information security threat construal
Published 2023 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
The effects of knowledge mechanisms on employees' information security threat construal
Authors
Keywords
-
Journal
INFORMATION SYSTEMS JOURNAL
Volume -, Issue -, Pages -
Publisher
Wiley
Online
2023-01-10
DOI
10.1111/isj.12424
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- The Emerging Threat of Ai-driven Cyber Attacks: A Review
- (2022) Blessing Guembe et al. APPLIED ARTIFICIAL INTELLIGENCE
- With Great Power Comes Great Responsibility
- (2021) Stacie Petter et al. DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS
- Demystifying the role of causal-predictive modeling using partial least squares structural equation modeling in information systems research
- (2020) Wynne Chin et al. INDUSTRIAL MANAGEMENT & DATA SYSTEMS
- Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics
- (2019) Jeffrey D. Wall et al. INFORMATION & MANAGEMENT
- The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination
- (2018) Philip Menard et al. COMPUTERS & SECURITY
- Toward a Unified Model of Information Security Policy Compliance
- (2018) Gregory D. Moody et al. MIS QUARTERLY
- Don’t Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance
- (2018) Jordan B Barlow et al. Journal of the Association for Information Systems
- Organizational Citizenship Behavior Regarding Security: Leadership Approach Perspective
- (2017) Ofir Turel et al. JOURNAL OF COMPUTER INFORMATION SYSTEMS
- Avoidance of Information Technology Threats: A Theoretical Perspective
- (2017) Liang et al. MIS QUARTERLY
- Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations
- (2017) Siponen et al. MIS QUARTERLY
- Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study
- (2017) Puhakainen et al. MIS QUARTERLY
- Fear Appeals and Information Security Behaviors: An Empirical Study
- (2017) Johnston et al. MIS QUARTERLY
- Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- (2017) Bulgurcu et al. MIS QUARTERLY
- Construct Measurement and Validation Procedures in MIS and Behavioral Research: Integrating New and Existing Techniques
- (2017) MacKenzie et al. MIS QUARTERLY
- Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors
- (2017) Clay Posey et al. MIS QUARTERLY
- Beyond Deterrence: An Expanded View of Employee Computer Abuse
- (2017) Robert Willison et al. MIS QUARTERLY
- Bridging the Qualitative-Quantitative Divide: Guidelines for Conducting Mixed Methods Research in Information Systems
- (2017) Viswanath Venkatesh et al. MIS QUARTERLY
- Information security policy compliance model in organizations
- (2016) Nader Sohrabi Safa et al. COMPUTERS & SECURITY
- How users perceive and respond to security messages: a NeuroIS research agenda and empirical study
- (2016) Bonnie Brinton Anderson et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination
- (2016) Merrill Warkentin et al. Journal of the Association for Information Systems
- Improving the information security culture through monitoring and implementation actions illustrated through a case study
- (2015) Adéle da Veiga et al. COMPUTERS & SECURITY
- Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs
- (2015) Aggeliki Tsohou et al. COMPUTERS & SECURITY
- Choice decision of e-learning system: Implications from construal level theory
- (2015) Candy K.Y. Ho et al. INFORMATION & MANAGEMENT
- Impacts of Comprehensive Information Security Programs on Information Security Culture
- (2015) Yan Chen et al. JOURNAL OF COMPUTER INFORMATION SYSTEMS
- The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use
- (2015) Sutirtha Chatterjee et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets
- (2015) Clay Posey et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
- (2015) Allen C. Johnston et al. MIS QUARTERLY
- What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors
- (2015) Scott R. Boss et al. MIS QUARTERLY
- The effects of psychological distance on abstraction: Two meta-analyses.
- (2015) Courtney K. Soderberg et al. PSYCHOLOGICAL BULLETIN
- Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective
- (2014) John D'Arcy et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Employees’ adherence to information security policies: An exploratory field study
- (2013) Mikko Siponen et al. INFORMATION & MANAGEMENT
- Taxonomy of compliant information security behavior
- (2012) Keshnee Padayachee COMPUTERS & SECURITY
- Future directions for behavioral information security research
- (2012) Robert E. Crossler et al. COMPUTERS & SECURITY
- Motivating IS security compliance: Insights from Habit and Protection Motivation Theory
- (2012) Anthony Vance et al. INFORMATION & MANAGEMENT
- Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
- (2011) Princely Ifinedo COMPUTERS & SECURITY
- Consumer Acceptance of Recommendations by Interactive Decision Aids: The Joint Role of Temporal Distance and Concrete Versus Abstract Communications
- (2011) Clemens F. Köhler et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Construal-level theory of psychological distance.
- (2010) Yaacov Trope et al. PSYCHOLOGICAL REVIEW
- The psychology of password management: a tradeoff between security and convenience
- (2009) L. Tam et al. BEHAVIOUR & INFORMATION TECHNOLOGY
- Information security policy: An organizational-level process model
- (2009) Kenneth J. Knapp et al. COMPUTERS & SECURITY
- Information security culture: A management perspective
- (2009) J.F. Van Niekerk et al. COMPUTERS & SECURITY
- Behavioral and policy issues in information systems security: the insider threat
- (2009) Merrill Warkentin et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Protection motivation and deterrence: a framework for security policy compliance in organisations
- (2009) Tejaswini Herath et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- A Meta-Theory for Understanding Information Systems Within Sociotechnical Systems
- (2009) Robert P. Bostrom et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Keeping our network safe: a model of online protection behaviour
- (2006) Doohwang Lee et al. BEHAVIOUR & INFORMATION TECHNOLOGY
Become a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get StartedAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started