Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Organizational information security policies: a review and research framework
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …
of organizational policies that specify how users of information and technology resources …
Information security awareness and behavior: a theory-based literature review
B Lebek, J Uffen, M Neumann, B Hohler… - Management …, 2014 - emerald.com
Purpose–This paper aims to provide an overview of theories used in the field of employees'
information systems (IS) security behavior over the past decade. Research gaps and …
information systems (IS) security behavior over the past decade. Research gaps and …
Seeing the forest and the trees
WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - JSTOR
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …
(and noncompliance) with information security policies. However, the number of competing …
Health information privacy concerns, antecedents, and information disclosure intention in online health communities
This study explores the antecedents and consequences of health information privacy
concerns in online health communities by integrating the dual calculus and protection …
concerns in online health communities by integrating the dual calculus and protection …
What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors
Because violations of information security (ISec) and privacy have become ubiquitous in
both personal and work environments, academic attention to ISec and privacy has taken on …
both personal and work environments, academic attention to ISec and privacy has taken on …
Understanding online safety behaviors: A protection motivation theory perspective
Internet users experience a variety of online security threats that require them to enact safety
precautions. Protection motivation theory (PMT) provides a theoretical framework for …
precautions. Protection motivation theory (PMT) provides a theoretical framework for …
Understanding employee responses to stressful information security requirements: A co** perspective
We use co** theory to explore an underlying relationship between employee stress
caused by burdensome, complex, and ambiguous information security requirements …
caused by burdensome, complex, and ambiguous information security requirements …
Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment
C Liu, N Wang, H Liang - International Journal of Information Management, 2020 - Elsevier
Employees' non-compliance with organizational information security policy (ISP) when using
informational resources has become the main reason for continuous security incidents …
informational resources has become the main reason for continuous security incidents …
What Users Do besides Problem-Focused Co** When Facing IT Security Threats
H Liang, Y Xue, A Pinsonneault, YA Wu - MIS quarterly, 2019 - JSTOR
This paper investigates how individuals cope with IT security threats by taking into account
both problem-focused and emotion-focused co**. While problem-focused co** (PFC) …
both problem-focused and emotion-focused co**. While problem-focused co** (PFC) …
Mobile banking services adoption in Pakistan: are there gender differences?
Purpose The purpose of this paper is to provide a comprehensive insight into the deciding
factors affecting an individual's intention to adopt mobile banking (m-banking) services in …
factors affecting an individual's intention to adopt mobile banking (m-banking) services in …