Understanding Shadow IT usage intention: a view of the dual-factor model
Published 2023 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Understanding Shadow IT usage intention: a view of the dual-factor model
Authors
Keywords
-
Journal
ONLINE INFORMATION REVIEW
Volume -, Issue -, Pages -
Publisher
Emerald
Online
2023-09-23
DOI
10.1108/oir-04-2022-0243
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance
- (2020) Mario Silic et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization
- (2019) John D’Arcy et al. INFORMATION & MANAGEMENT
- Quality matters: Evoking subjective norms and coping appraisals by system design to increase security intentions
- (2019) Mark Grimes et al. DECISION SUPPORT SYSTEMS
- The mediating role of social presence in the relationship between shadow IT usage and individual performance: a social presence theory perspective
- (2019) Gabriela Labres Mallmann et al. BEHAVIOUR & INFORMATION TECHNOLOGY
- From improper to acceptable: How perpetrators neutralize workplace bullying behaviors in the cyber world
- (2018) Sixuan Zhang et al. INFORMATION & MANAGEMENT
- Self-control, organizational context, and rational choice in Internet abuses at work
- (2018) Han Li et al. INFORMATION & MANAGEMENT
- The Acceptance of Justifications among Shadow IT Users and Nonusers – An Empirical Analysis
- (2018) Steffi Haag et al. INFORMATION & MANAGEMENT
- Information quality, user satisfaction, and the manifestation of workarounds: a qualitative and quantitative study of enterprise content management system users
- (2017) Sven Laumer et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- A new perspective on neutralization and deterrence: Predicting shadow IT usage
- (2017) Mario Silic et al. INFORMATION & MANAGEMENT
- Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions
- (2017) Anderson et al. MIS QUARTERLY
- Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations
- (2017) Siponen et al. MIS QUARTERLY
- Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- (2017) Bulgurcu et al. MIS QUARTERLY
- Beyond Deterrence: An Expanded View of Employee Computer Abuse
- (2017) Robert Willison et al. MIS QUARTERLY
- Employees' information security policy compliance: A norm activation perspective
- (2016) Adel Yazdanmehr et al. DECISION SUPPORT SYSTEMS
- Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China
- (2016) Yan Chen et al. MIS QUARTERLY
- Managing the introduction of information security awareness programmes in organisations
- (2015) Aggeliki Tsohou et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
- (2015) Allen C. Johnston et al. MIS QUARTERLY
- Shadow IT – A view from behind the curtain
- (2014) Mario Silic et al. COMPUTERS & SECURITY
- Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory
- (2013) Lijiao Cheng et al. COMPUTERS & SECURITY
- Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition
- (2013) Princely Ifinedo INFORMATION & MANAGEMENT
- New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs
- (2012) Mikko Siponen et al. INFORMATION & MANAGEMENT
- A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings
- (2011) John D'Arcy et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Shadow systems
- (2009) Sandy Behrens COMMUNICATIONS OF THE ACM
- Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
- (2009) Tejaswini Herath et al. DECISION SUPPORT SYSTEMS
- Protection motivation and deterrence: a framework for security policy compliance in organisations
- (2009) Tejaswini Herath et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Explaining non-work-related computing in the workplace: A comparison of alternative models
- (2008) Loo Geok Pee et al. INFORMATION & MANAGEMENT
Find the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
SearchAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started