User participation in information systems security risk management, MIS Quarterly, vol.34, issue.3, pp.503-522, 2010. ,
Understanding the mindset of the abusive insider: An examination of insiders??? causal reasoning following internal security changes, Computers & Security, vol.30, issue.6-7, pp.6-7, 2011. ,
DOI : 10.1016/j.cose.2011.05.002
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach, Information Systems Research, vol.20, issue.1, pp.1-20, 2009. ,
An integrative model of computer abuse based on social control and general deterrence theories, Information & Management, vol.41, issue.6, pp.41-707, 2004. ,
DOI : 10.1016/j.im.2003.08.008
Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*, Decision Sciences, vol.26, issue.6, pp.615-660, 2012. ,
DOI : 10.1111/j.1540-5915.2012.00361.x
Does deterrence work in reducing information security policy abuse by employees?, Communications of the ACM, vol.54, issue.6, pp.54-60, 2011. ,
DOI : 10.1145/1953122.1953142
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory, Computers & Security, vol.31, issue.1, pp.83-95, 2012. ,
DOI : 10.1016/j.cose.2011.10.007
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings, European Journal of Information Systems, vol.22, issue.1, pp.643-658, 2011. ,
DOI : 10.4018/irmj.2009010102
Out of fear or desire? Toward a better understanding of employees??? motivation to follow IS security policies, Information & Management, vol.48, issue.7, pp.296-302, 2011. ,
DOI : 10.1016/j.im.2011.07.002
What drives electronic commerce across cultures? A crosscultural empirical investigation of the theory of planned behavior, Journal of Electronic Commerce Research, vol.3, issue.4, pp.240-253, 2002. ,
User behaviour towards protective information technologies: the role of national cultural differences, Information Systems Journal, vol.9, issue.4, pp.391-412, 2009. ,
DOI : 10.1111/j.1365-2575.2007.00289.x
Culture's Consequences: International Differences in Work-related Values, 1980. ,
Culture and IS: National Cultural Dimensions within IS Discipline, Proceedings of the 13th Annual Conference of the UK Academy for Information Systems, pp.1-14, 2009. ,
Culture: A critical review of concepts and definitions. Peabody Museum, 1952. ,
Managing organizational culture, Management Review, vol.69, pp.8-13, 1980. ,
Diagnosing cultural barriers to knowledge management, Academy of Management Executive, vol.14, issue.4, pp.113-127, 2000. ,
National character, Anthropology Today, pp.396-421, 1962. ,
The Analysis of Subjective Culture, 1972. ,
Managing your organization's culture, The Nonprofit World Report, vol.3, issue.2, pp.12-15, 1985. ,
Industry Mindsets: Exploring the Cultures of Two Macro-Organizational Settings, Organization Science, vol.5, issue.3, pp.363-383, 1994. ,
DOI : 10.1287/orsc.5.3.384
Culture's Consequences. Comparing Values, Behaviors, Institutions, and Organizations Across Nations, 2001. ,
Information security knowledge sharing in??organizations: Investigating the effect of??behavioral information security governance and??national culture, Computers & Security, vol.43, pp.90-110, 2014. ,
DOI : 10.1016/j.cose.2014.03.004
The Impact of Individualism???Collectivism, Social Presence, and Group Diversity on Group Decision Making Under Majority Influence, Journal of Management Information Systems, vol.23, issue.4, pp.53-80, 2007. ,
DOI : 10.2753/MIS0742-1222230404
Structure in fives: Designing effective organizations, 1983. ,
Computer security impaired by legitimate users, Computers & Security, vol.23, issue.3, pp.253-264, 2004. ,
DOI : 10.1016/j.cose.2003.09.002
URL : https://hal.archives-ouvertes.fr/hal-00691818
On Crimes and Punishments, 1963. ,
DOI : 10.1017/CBO9780511802485.006
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness, Decision Support Systems, vol.47, issue.2, pp.154-165, 2009. ,
DOI : 10.1016/j.dss.2009.02.005
Neutralization: new insights into the problems of employee information systems security policy violations, MIS Quarterly, vol.46, issue.5, pp.487-502, 2010. ,
Profiling grounded theory approaches in information systems research, European Journal of Information Systems, vol.20, issue.3, pp.119-129, 2013. ,
DOI : 10.1111/j.1365-2575.2009.00328.x
Beginning Qualitative Research: A Philosophic and Practical Guide, 1994. ,
Naturalistic inquiry, International Journal of Intercultural Relations, vol.9, issue.4, 1985. ,
DOI : 10.1016/0147-1767(85)90062-8
Individuals and organizations: The cultural match, Training and Development Journal, vol.37, issue.2, pp.28-36, 1983. ,
Review: A review of culture in information systems research: Toward a theory of information technology culture conflict, MIS Quarterly, vol.30, pp.357-399, 2006. ,
What holds the modern company together?, Harvard Business Review, vol.74, issue.6, pp.133-148, 1996. ,
Toward a Theory of Organizational Culture and Effectiveness, Organization Science, vol.6, issue.2, pp.204-223, 1995. ,
DOI : 10.1287/orsc.6.2.204
Theory Z: How American business can meet the Japanese challenge, Business Horizons, vol.24, issue.6, 1981. ,
DOI : 10.1016/0007-6813(81)90031-8
Empowerment: Key to IS World-Class Quality, MIS Quarterly, vol.16, issue.4, pp.491-505, 1992. ,
DOI : 10.2307/249733
URL : http://elibrary.aisnet.org/Default.aspx?url=http://aisel.aisnet.org/cgi/viewcontent.cgi?article=2196&context=misq