Applying double loop learning to interpret implications for information systems security design, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme, System Security and Assurance (Cat. No.03CH37483), 2003. ,
DOI : 10.1109/ICSMC.2003.1244262
A Semantic Analysis of Security Policy Formulation and Implementation: A Case Study, the Americas Conference on Information Systems, 2006. ,
Resistance as a Social Drama: A Study of Change???Oriented Encounters, American Journal of Sociology, vol.109, issue.6, pp.1249-1318, 2004. ,
DOI : 10.1086/381913
Power, politics, and MIS implementation, Communications of the ACM, vol.26, issue.6, pp.430-444, 1983. ,
DOI : 10.1145/358141.358148
URL : http://dspace.mit.edu/bitstream/1721.1/48781/1/powerpoliticsmis00mark.pdf
Understanding Power: Bringing about Strategic Change, British Journal of Management, vol.43, issue.3, pp.3-16, 1996. ,
DOI : 10.1108/eb054273
The structure of social action, 1968. ,
Principles of information systems security: text and cases, 2007. ,
A comparative analysis of complex organizations: On power, involvement, and their correlates, 1975. ,
The Structuring of Organizational Structures, Administrative Science Quarterly, vol.25, issue.1, pp.1-17, 1980. ,
DOI : 10.2307/2392223
Organizations: A Dialectical View, Administrative Science Quarterly, vol.22, issue.1, pp.1-21, 1977. ,
DOI : 10.2307/2391741
Principles of Information Security, 2008. ,
The global state of information security, 2008. ,
Analysis of end user security behaviors, Computers & Security, vol.24, issue.2, pp.124-133, 2005. ,
DOI : 10.1016/j.cose.2004.07.001
Power relationships in information systems security policy formulation and implementation, the 16th Annual European Conference on Information Systems, 2008. ,
A Contingent analysis of the relationshiop between IS implementation strategies and IS success, Information Processing & Management, vol.27, issue.1, pp.111-128, 1991. ,
DOI : 10.1016/0306-4573(91)90034-J
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness, Decision Support Systems, vol.47, issue.2, pp.154-165, 2009. ,
DOI : 10.1016/j.dss.2009.02.005
An integrative study of information systems security effectiveness, International Journal of Information Management, vol.23, issue.2, pp.139-154, 2003. ,
DOI : 10.1016/S0268-4012(02)00105-6
Effective IS Security: An Empirical Study, Information Systems Research, vol.1, issue.3, pp.225-270, 1990. ,
DOI : 10.1287/isre.1.3.255
Coping with Systems Risk: Security Planning Models for Management Decision Making, MIS Quarterly, vol.22, issue.4, pp.441-469, 1998. ,
DOI : 10.2307/249551
If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security, European Journal of Information Systems, vol.46, issue.2, pp.151-164, 2009. ,
DOI : 10.1287/mnsc.46.2.186.11926
Employees' Behavior towards IS Security Policy Compliance, 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007. ,
Cultivating an organizational information security culture, Computer Fraud & Security, vol.2006, issue.10, pp.7-11, 2006. ,
DOI : 10.1016/S1361-3723(06)70430-4
Information Security Conscience: a precondition to an Information Security Culture, 8th Annual Security Conference, pp.15-16, 2009. ,
Towards information security behavioural compliance, Computers & Security, vol.23, issue.3, pp.191-198, 2004. ,
DOI : 10.1016/j.cose.2004.01.012
A Design Theory for Information Security Awareness, 2006. ,
A conceptual foundation for organizational information security awareness, Information Management & Computer Security, vol.8, issue.1, pp.31-41, 2000. ,
DOI : 10.1057/ejis.1992.2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.195.5335
A prototype tool for information security awareness and training, Logistics Information Management, vol.15, issue.5/6, pp.352-357, 2002. ,
DOI : 10.1108/09576050210447037
Dimensions of power and IS implementation, Information & Management, vol.41, issue.5, pp.635-644, 2004. ,
DOI : 10.1016/j.im.2003.02.001
Frameworks of power, 1989. ,
DOI : 10.4135/9781446279267
Foucault, power/knowledge and its relevance for Human Resource Management, Academy of Management Review, vol.18, issue.3, pp.518-545, 1993. ,
DOI : 10.2307/258907
The Case Research Strategy in Studies of Information Systems, MIS Quarterly, vol.11, issue.3, pp.369-388, 1987. ,
DOI : 10.2307/248684
Qualitative research in business & management, 2009. ,
Using Actor Network Theory to Understand Information Security Management, the 25th Annual IFIP TC, pp.20-23, 2010. ,
DOI : 10.4324/9780203019870
Power: a radical view, 1974. ,
DOI : 10.1007/978-1-349-02248-9
On Studying Organizational Cultures, Administrative Science Quarterly, vol.24, issue.4, pp.570-581, 1979. ,
DOI : 10.2307/2392363
From policies to culture, Computers & Security, vol.23, issue.4, pp.275-279, 2004. ,
DOI : 10.1016/j.cose.2004.01.013