标题
Understanding Shadow IT usage intention: a view of the dual-factor model
作者
关键词
-
出版物
ONLINE INFORMATION REVIEW
Volume -, Issue -, Pages -
出版商
Emerald
发表日期
2023-09-23
DOI
10.1108/oir-04-2022-0243
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance
- (2020) Mario Silic et al. JOURNAL OF MANAGEMENT INFORMATION SYSTEMS
- Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization
- (2019) John D’Arcy et al. INFORMATION & MANAGEMENT
- Quality matters: Evoking subjective norms and coping appraisals by system design to increase security intentions
- (2019) Mark Grimes et al. DECISION SUPPORT SYSTEMS
- The mediating role of social presence in the relationship between shadow IT usage and individual performance: a social presence theory perspective
- (2019) Gabriela Labres Mallmann et al. BEHAVIOUR & INFORMATION TECHNOLOGY
- From improper to acceptable: How perpetrators neutralize workplace bullying behaviors in the cyber world
- (2018) Sixuan Zhang et al. INFORMATION & MANAGEMENT
- Self-control, organizational context, and rational choice in Internet abuses at work
- (2018) Han Li et al. INFORMATION & MANAGEMENT
- The Acceptance of Justifications among Shadow IT Users and Nonusers – An Empirical Analysis
- (2018) Steffi Haag et al. INFORMATION & MANAGEMENT
- Information quality, user satisfaction, and the manifestation of workarounds: a qualitative and quantitative study of enterprise content management system users
- (2017) Sven Laumer et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- A new perspective on neutralization and deterrence: Predicting shadow IT usage
- (2017) Mario Silic et al. INFORMATION & MANAGEMENT
- Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions
- (2017) Anderson et al. MIS QUARTERLY
- Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations
- (2017) Siponen et al. MIS QUARTERLY
- Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
- (2017) Bulgurcu et al. MIS QUARTERLY
- Beyond Deterrence: An Expanded View of Employee Computer Abuse
- (2017) Robert Willison et al. MIS QUARTERLY
- Employees' information security policy compliance: A norm activation perspective
- (2016) Adel Yazdanmehr et al. DECISION SUPPORT SYSTEMS
- Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China
- (2016) Yan Chen et al. MIS QUARTERLY
- Managing the introduction of information security awareness programmes in organisations
- (2015) Aggeliki Tsohou et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
- (2015) Allen C. Johnston et al. MIS QUARTERLY
- Shadow IT – A view from behind the curtain
- (2014) Mario Silic et al. COMPUTERS & SECURITY
- Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory
- (2013) Lijiao Cheng et al. COMPUTERS & SECURITY
- Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition
- (2013) Princely Ifinedo INFORMATION & MANAGEMENT
- New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs
- (2012) Mikko Siponen et al. INFORMATION & MANAGEMENT
- A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings
- (2011) John D'Arcy et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Shadow systems
- (2009) Sandy Behrens COMMUNICATIONS OF THE ACM
- Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
- (2009) Tejaswini Herath et al. DECISION SUPPORT SYSTEMS
- Protection motivation and deterrence: a framework for security policy compliance in organisations
- (2009) Tejaswini Herath et al. EUROPEAN JOURNAL OF INFORMATION SYSTEMS
- Explaining non-work-related computing in the workplace: A comparison of alternative models
- (2008) Loo Geok Pee et al. INFORMATION & MANAGEMENT
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now