Filtros de búsqueda

Lista de obras de Mikko Siponen

A Design Theory for Secure Information Systems Design Methods

article by Juhani Heikka et al published November 2006 in Journal of the Association for Information Systems

A Pragmatic Evaluation of the Theory of Information Ethics

scientific article published on 01 January 2004

A survey of usability capability maturity models: implications for practice and research

Agile Software Development Methods: A Comparative Review1

article

An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric

artículo científico

Can individuals’ neutralization techniques be overcome? A field experiment on password policy

artículo científico publicado en 2020

Citizens' Cybersecurity Behavior: Some Major Challenges

artículo científico publicado en 2021

Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions

artículo científico publicado en 2022

Compliance with Information Security Policies: An Empirical Investigation

artículo científico publicado en 2010

Consumption behavior of eco-friendly products and applications of ICT innovation

artículo científico publicado en 2021

Demystifying beliefs about the natural sciences in information system

Demystifying the Influential IS Legends of Positivism

Demystifying the Influential IS Legends of Positivism: Response to Lee’s Commentary

Determinants of Individual Knowledge Innovation Behavior

artículo científico publicado en 2021

Discovering the interplay between defensive avoidance and continued use intention of anti-malware software among experienced home users: A moderated mediation model

artículo científico publicado en 2022

Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures

artículo científico publicado en 2020

Employees’ adherence to information security policies: An exploratory field study

artículo científico publicado en 2014

Errors and Complications in SQL Query Formulation

Examining the side effects of organizational Internet monitoring on employees

artículo científico publicado en 2020

Executives' Commitment to Information Security

Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations

How Do Mobile ICTs Enable Organizational Fluidity: Toward a Theoretical Framework

artículo científico publicado en 2017

How does information technology-based service degradation influence consumers’ use of services? An information technology-based service degradation decision theory

IS Security Policy Violations

artículo científico publicado en 2012

Improving password memorability, while not inconveniencing the user

artículo científico publicado en 2019

Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity

artículo científico publicado en 2023

Intervention Effect Rates as a Path to Research Relevance: Information Systems Security Example

Mechanistic Explanations and Deliberate Misrepresentations

Narrowing the Theory’s or Study’s Scope May Increase Practical Relevance

Omission of Quality Software Development Practices

On natural science beliefs in IS: Short comments to commentators

Overcoming the insider

article

Personal use of technology at work: a literature review and a theoretical model for understanding how it affects employee job performance

artículo científico publicado en 2021

Protection Motivation Theory in Information Systems Security Research

Reconsidering the Role of Research Method Guidelines for Qualitative, Mixed-methods, and Design Science Research

Shall we follow? Impact of reputation concern on information security managers’ investment decisions

artículo científico publicado en 2020

Speak their Language: Designing Effective Messages to Improve Employees’ Information Security Decision Making

artículo científico publicado en 2018

State of the art in information security policy development

artículo científico publicado en 2020

Supply chain finance platform evaluation based on acceptability analysis

artículo científico publicado en 2022

The Primary Scientific Contribution is Hardly a Theory in Design Science Research

artículo científico publicado en 2021

To Calculate or To Follow Others: How Do Information Security Managers Make Investment Decisions?

To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls

Too many passwords? How understanding our memory can increase password memorability

artículo científico publicado en 2018

Toward a Unified Model of Information Security Policy Compliance

artículo científico publicado en 2018

Toward a stage theory of the development of employees’ information security behavior

artículo científico publicado en 2020

Towards maturity of information security maturity criteria: six lessons learned from software maturity criteria

artículo científico publicado en 2002

Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice

artículo científico publicado en 2004

Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats

artículo científico publicado en 2021

Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work

artículo científico publicado en 2013

What Leads to Prosocial Behaviors on Social Networking Services: A Tripartite Model

artículo científico publicado en 2017

When more is less: The other side of artificial intelligence recommendation

scholarly article by Sihua Chen et al published August 2021 in Journal of Management Science and Engineering

Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model

article

Why is the hypothetico-deductive (H-D) method in information systems not an H-D method?

artículo científico publicado en 2020