The #1 Cyber Security Threat to Information Systems Today (2015) http://www.forbes.com/sites/sungardascyber-security-threats-to-in- formation-systems-today, pp.6-46, 2015. ,
Security risks and protection in online learning: A survey, The International Review of Research in Open and Distributed Learning, vol.14, issue.5, 2013. ,
DOI : 10.19173/irrodl.v14i5.1632
URL : https://doi.org/10.19173/irrodl.v14i5.1632
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach, Information Systems Research, vol.20, issue.1, pp.79-98, 2009. ,
DOI : 10.1287/isre.1070.0160
Enforcing Information Security Policies through Cultural Boundaries: A Multinational Company Approach, Proceedings of 2011 ECIS, pp.1-11, 2011. ,
Sp 800-30. Risk management guide for information technology systems, 2002. ,
Security culture and the employment relationship as drivers of employees??? security compliance, Information Management & Computer Security, vol.22, issue.5, pp.474-489, 2014. ,
DOI : 10.1177/014920639101700305
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness, Decision Support Systems, vol.47, issue.2, pp.154-165, 2009. ,
DOI : 10.1016/j.dss.2009.02.005
Studying users' computer security behavior using the Health Belief Model. PACIS, Proceedings, vol.45, pp.423-437, 2007. ,
DOI : 10.1016/j.dss.2008.11.010
Protection motivation and deterrence: a framework for security policy compliance in organisations, European Journal of Information Systems, vol.48, issue.8, pp.106-125, 2009. ,
DOI : 10.1145/1076211.1076238
Fear appeals and information security behaviors: an empirical study, MIS quarterly, pp.549-566, 2010. ,
Technical opinionAre employees putting your company at risk by not following information security policies?, Communications of the ACM, vol.52, issue.12, pp.145-147, 2009. ,
DOI : 10.1145/1610252.1610289
Examining the Continuance of Secure Behavior: A Longitudinal Field Study of Mobile Device Authentication, Information Systems Research, vol.27, issue.2, 2016. ,
DOI : 10.1287/isre.2016.0634
Motivating IS security compliance: Insights from Habit and Protection Motivation Theory, Information & Management, vol.49, issue.3-4, pp.190-198, 2012. ,
DOI : 10.1016/j.im.2012.04.002
Employees??? adherence to information security policies: An exploratory field study, Information & Management, vol.51, issue.2, pp.217-224, 2014. ,
DOI : 10.1016/j.im.2013.08.006
Studying users' computer security behavior: A health belief perspective, Decision Support Systems, vol.46, issue.4, pp.815-825, 2009. ,
DOI : 10.1016/j.dss.2008.11.010
Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics, Journal of Marketing Research, vol.18, issue.3, pp.382-388, 1981. ,
DOI : 10.2307/3150980
Structural equation modeling and regression: Guidelines for research practice. Communications of the association for information systems, p.7, 2000. ,
A practical guide to factorial validity using PLS-Graph: Tutorial and annotated example. Communications of the Association for Information systems, p.5, 2005. ,
The holistic approach to construct validation in IS research: examples of the interplay between theory and measurement Administrative Sciences Association of, administrative sciences association of Canada annual conference, pp.34-43, 1995. ,