ICT and economic growth -Comparing developing, emerging and developed countries, World Development, vol.104, pp.197-211, 2018. ,
Information communications technology and economic growth in Sub-Saharan Africa: A panel data approach, Telecommunications Policy, 2018. ,
Roles of organizational climate, social bonds, and perceptions of security threats on IS security policy compliance intentions, Information Resources Management Journal, vol.31, issue.1, pp.53-82, 2018. ,
Does deterrence work in reducing information security policy abuse by employees?, Communications of the ACM, vol.54, issue.6, pp.54-60, 2011. ,
Employee misuse of information technology resources: testing a contemporary deterrence model, Decision Sciences, vol.43, issue.6, pp.1091-1124, 2012. ,
Understanding nonmalicious security violations in the workplace: a composite behavior model, Journal of Management Information Systems, vol.28, issue.2, pp.203-236, 2011. ,
Information systems security policy compliance: an empirical study of the effects of socialisation, influence, and cognition, Information & Management, vol.51, issue.1, pp.69-79, 2014. ,
Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness, MIS Quarterly, vol.34, issue.3, pp.523-548, 2010. ,
, What is Cyber Hygiene? A Definition of Cyber Hygiene, Benefits, Best Practices, and More, 2018.
, Clearswift Insider Threat Index (CITI), 2017.
Conceptualising improvisation in information systems security, European Journal of Information Systems, vol.21, issue.6, pp.592-607, 2012. ,
Top exemplars of non-malicious, counterproductive computer security behaviours (CCSB) engagements among employees in Nigeria: recommendations for management, the 8 th iSTEAMS, pp.5-12, 2017. ,
Criminal uses of information & communication technologies in sub-Saharan Africa: Trends, concerns and perspectives, Journal of Information Technology Impact, vol.9, issue.3, pp.155-172, 2009. ,
, Nigeria adopts framework for national security policy, Technology Times, 2018.
Insider threat prediction tool: evaluating the probability of IT misuse, Computers & Security, vol.21, issue.1, pp.62-73, 2002. ,
Threats to information systems: today's reality, yesterday's understanding, MIS Quarterly, vol.16, issue.2, pp.173-186, 1992. ,
Analysis of end user security behaviors, Computers & Security, vol.24, issue.2, pp.124-133, 2005. ,
Using social cognitive theory to understand employees' counterproductive computer security behaviors (CCSB): A pilot study, The 27 th International Business Research Conference (IBRC), 2014. ,
Variables influencing information security policy compliance: a systematic review of quantitative studies, Information Management and Computer Security, vol.22, issue.1, pp.42-75, 2014. ,
The theory of planned behavior, Organizational behavior and human decision processes, vol.50, issue.2, pp.179-211, 1991. ,
Control: Organizational and economic approaches, Management science, vol.31, issue.2, pp.134-149, 1985. ,
Social foundations of thought and action: A social cognitive theory, 1986. ,
Employees' information security policy compliance: a norm activation perspective, Decision Support Systems, vol.92, pp.36-46, 2016. ,
Common method biases in behavioral research: a critical review of the literature and recommended remedies, Journal of Applied Psychology, vol.88, issue.5, pp.879-903, 2003. ,
Understanding and mitigating uncertainty in online exchange relationships: a principal-agent perspective, MIS Quarterly, vol.31, issue.1, pp.105-136, 2007. ,
, Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), 2014.
, WarpPLS 5.0 User Manual, 2017.
Specifying formative constructs in information systems research, MIS Quarterly, vol.31, issue.4, pp.623-656, 2007. ,
, PLS path modeling. Computational Statistics and Data Analysis, vol.48, pp.159-205, 2005.
URL : https://hal.archives-ouvertes.fr/hal-00869374
Using PLS path modeling for assessing hierarchical construct models: Guidelines and empirical illustration, MIS Quarterly, vol.33, issue.1, pp.177-195, 2009. ,
Neutralization: New insights into the problem of employee information systems security policy violations, MIS Quarterly, vol.34, issue.3, pp.487-502, 2010. ,