Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Organizational information security policies: a review and research framework
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …
of organizational policies that specify how users of information and technology resources …
A decade of NeuroIS research: progress, challenges, and future directions
NeuroIS is a field in Information Systems (IS) that makes use of neuroscience and
neurophysiological tools and knowledge to better understand the development, adoption …
neurophysiological tools and knowledge to better understand the development, adoption …
Seeing the forest and the trees
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …
(and noncompliance) with information security policies. However, the number of competing …
[HTML][HTML] A comprehensive model of information security factors for decision-makers
Decision-making in the context of organizational information security is highly dependent on
various information. For information security managers, not only relevant information has to …
various information. For information security managers, not only relevant information has to …
Risk perceptions of cyber-security and precautionary behaviour
A quantitative empirical online study examined a set of 16 security hazards on the Internet
and two comparisons in 436 UK-and US students, measuring perceptions of risk and other …
and two comparisons in 436 UK-and US students, measuring perceptions of risk and other …
Don't even think about it! The effects of antineutralization, informational, and normative communication on information security compliance
Organizations use security education, training, and awareness (SETA) programs to counter
internal security threats and promote compliance with information security policies. Yet …
internal security threats and promote compliance with information security policies. Yet …
Fostering information security compliance as organizational citizenship behavior
Abstract Information security is heightened when employees develop a strong sense of
information stewardship for information assets, a form of organizational citizenship behavior …
information stewardship for information assets, a form of organizational citizenship behavior …
Tuning out security warnings
Research in the fields of information systems and human-computer interaction has shown
that habituation—decreased response to repeated stimulation—is a serious threat to the …
that habituation—decreased response to repeated stimulation—is a serious threat to the …
Towards a NeuroIS research methodology: intensifying the discussion on methods, tools, and measurement
The genesis of the Neuro-Information Systems (NeuroIS) field took place in 2007. Since
then, a considerable number of IS scholars and academics from related disciplines have …
then, a considerable number of IS scholars and academics from related disciplines have …
More harm than good? How messages that interrupt can make us vulnerable
System-generated alerts are ubiquitous in personal computing and, with the proliferation of
mobile devices, daily activity. While these interruptions provide timely information, research …
mobile devices, daily activity. While these interruptions provide timely information, research …