Information technology --Security techniques --Information security management measurements, ISO/IEC 27004, 2009. ,
Variables influencing information security policy compliance, Information Management & Computer Security, vol.22, issue.1 ,
DOI : 10.1108/IMCS-08-2012-0045
The theory of planned behavior. Organizational Behavior and Human Decision Processes, pp.179-211, 1991. ,
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory, Computers & Security, vol.31, issue.1, pp.83-95, 2012. ,
DOI : 10.1016/j.cose.2011.10.007
Theory of Reasoned Action, 1979. ,
DOI : 10.4135/9781412952576.n209
Predicting and Changing Behavior: The Reasoned Action Approach, 2010. ,
The theory of planned behaviour: Reactions and reflections, Psychology & Health, vol.12, issue.9, pp.1113-1140, 2011. ,
DOI : 10.1037/0003-066X.54.7.480
Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*. Decision Sciences, pp.615-660, 2012. ,
Information systems user security: A structured model of the knowing???doing gap, Computers in Human Behavior, vol.28, issue.5, pp.1849-1858, 2012. ,
DOI : 10.1016/j.chb.2012.05.003
Organizational narcissism as a factor in information security| A structured model of the user knowing-doing gap, 2012. ,
Compliance with Information Security Policies: An Empirical Investigation, Computer, vol.43, issue.2, pp.64-71, 2010. ,
DOI : 10.1109/MC.2010.35
Protection motivation and deterrence: a framework for security policy compliance in organisations, European Journal of Information Systems, vol.48, issue.8, pp.106-125, 2009. ,
DOI : 10.1145/1076211.1076238
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly: Management Information Systems, pp.523-548, 2010. ,
The insider threat to organizational information security: a sturctural model and empirical test, p.1345, 2007. ,
Employees' Behavior towards IS Security Policy Compliance, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007. ,
DOI : 10.1109/HICSS.2007.206
Impact of perceived technical protection on security behaviors, Information Management & Computer Security, vol.17, issue.4, pp.330-340, 2009. ,
DOI : 10.1108/09685220910993980
Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model, Journal of Management Information Systems, vol.15, issue.4, pp.203-236, 2011. ,
DOI : 10.2753/MIS0742-1222280208
Understanding compliance with internet use policy from the perspective of rational choice theory. Decision Support Systems, pp.635-645, 2010. ,
The Influence of Perceived Source Credibility on End User Attitudes and Intentions to Comply with Recommended IT Actions, Journal of Organizational and End User Computing, vol.22, issue.3, pp.1-21, 2010. ,
DOI : 10.4018/joeuc.2010070101
Motivating IS Security Compliance: Insights from Habit and Protection Motivation Theory. Why do employees violate is security policies? Insights from multiple theoretical perspectives, Faculty of Science, pp.93-110, 2010. ,
DOI : 10.1016/j.im.2012.04.002
An integrative model of computer abuse based on social control and general deterrence theories, Information & Management, vol.41, issue.6, pp.707-718, 2004. ,
DOI : 10.1016/j.im.2003.08.008
Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior, Journal of Information Privacy and Security, vol.51, issue.4, pp.18-41, 2005. ,
DOI : 10.1037/0021-9010.89.2.322
Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies. Information and Management, pp.296-302, 2011. ,
Crime, Punishment, and Deterrence, 1975. ,
Causes of Delinquency, 1969. ,
The Synthesis of Regression Slopes in Meta-Analysis, Statistical Science, vol.22, issue.3, pp.414-429, 2007. ,
DOI : 10.1214/07-STS243
The theory of planned behavior. Organizational Behavior and Human Decision Processes, pp.179-211, 1991. ,
Theory of Planned Behavior ,
Efficacy of the Theory of Planned Behaviour: a meta-analytic review. The British journal of social psychology, pp.471-99, 2001. ,
Extending the Theory of Planned Behavior: A Review and Avenues for Further Research, Journal of Applied Social Psychology, vol.15, issue.1, pp.1429-1464, 1998. ,
DOI : 10.1037//0022-3514.36.5.498
Prospective prediction of health-related behaviours with the Theory of Planned Behaviour: a meta-analysis, Health Psychology Review, vol.16, issue.2, pp.97-144, 2011. ,
DOI : 10.1348/1359107041557075
Theory of reasoned action, theory of planned behavior, and the integrated behavioral model Health behavior and health education: theory research, and practice, United States of America, pp.68-96, 2008. ,
Descriptive Norms as an Additional Predictor in the Theory of Planned, Current Psycology: Developmental, Learning, Personality, Scoial. 22, pp.218-233, 2003. ,
The Theory of Reasoned Action: A Meta-Analysis of Past Research with Recommendations for Modifications and Future Research, Journal of Consumer Research, vol.15, issue.3, pp.325-343, 1988. ,
DOI : 10.1086/209170
Distinctions Pertaining to Fishbein and Ajzen's Theory of Reasoned Action Prediction and Change of Health Behavior: Applying the Reasoned Action Approach, N.J, 2007. ,
Evidence that the type of person affects the strength of the perceived behavioural control-intention relationship. The British journal of social psychology, pp.253-70, 2002. ,
a: Theories of reasoned action and planned behavior as models of condom use: a meta-analysis. Psychological bulletin, pp.142-61, 2001. ,
An assessment of survey research in POM: from constructs to theory, Journal of Operations Management, vol.16, issue.4, pp.407-425, 1998. ,
DOI : 10.1016/S0272-6963(98)00021-7
Health-related possible selves in young and middle adulthood., Psychology and Aging, vol.9, issue.1, pp.126-133, 1994. ,
DOI : 10.1037/0882-7974.9.1.126
Predicting and Changing Behavior Prediction and Change of Health Behavior: Applying the Reasoned Action Approach, N.J, 2007. ,