cost of cyber crime study, Ponemon Institute LLC & Accenture, p.54, 2017. ,
, McAfee labs threat report, 2017.
, Usable security: why do we need it? How do we get it?, 2005.
Behavioral and policy issues in information systems security: the insider threat, European Journal of Information Systems, vol.18, issue.2, pp.101-105, 2009. ,
If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security, European Journal of Information Systems, vol.18, pp.151-164, 2009. ,
Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness, MIS Quarterly, vol.34, issue.3, pp.523-548, 2010. ,
User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach, Information Systems Research, vol.20, issue.1, pp.79-98, 2009. ,
Cybersecurity policy compliance: an empirical study of Jamaican government agencies, SIG GlobDev Pre-ECIS Workshop, 2015. ,
Protection motivation and deterrence: a framework for security policy compliance in organisations, European Journal of Information Systems, vol.18, issue.2, pp.106-125, 2009. ,
Analysis of end user security behaviors, Computers & Security, vol.24, issue.2, pp.124-133, 2005. ,
Self-Efficacy: toward a unifying theory of behaviour change, Psychological Review, vol.84, issue.2, pp.191-215, 1977. ,
Computer self-efficacy: development of a measure and initial test, MIS Quarterly, vol.19, issue.2, pp.189-211, 1995. ,
Exploring the impacts of individual styles on security compliance behavior: a preliminary analysis. SIG ICT in Global Development, 10th Annual Pre-ICIS Workshop, 2017. ,
Studying users' computer security behavior: a health belief perspective, Decision Support Systems, vol.46, issue.4, pp.815-825, 2009. ,
Harvesting implicit group attitudes and beliefs from a demonstration web site, Group Dynamics: Theory, Research, and Practice, vol.6, issue.1, pp.101-115, 2002. ,
Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory, Computers & Security, vol.31, issue.1, pp.83-95, 2012. ,
Motivating IS security compliance: insights from habit and protection motivation theory, Information & Management, vol.49, issue.3-4, pp.190-198, 2012. ,
Gender difference and employees' cybersecurity behaviors, Computers in Human Behavior, vol.69, pp.437-443, 2017. ,
Decision styles-a perspective, Leadership & Organization Development Journal, vol.4, issue.4, pp.3-9, 1983. ,
The influence of decision style on decision making behavior, Management Science, vol.26, issue.4, pp.371-386, 1980. ,
Cyber peers' influence for adolescent consumer in decision-making styles and online purchasing behavior, Journal of Applied Psychology, vol.43, issue.6, pp.1228-1237, 2013. ,
, International Monetary Fund: Regional economic outlook: Sub-Saharan Africa. World Economic and Financial Surveys, p.123, 2015.
, World Economic Forum
Evaluating contextual variables affecting productivity, Operations Research, vol.56, issue.1, pp.48-58, 2008. ,
Overview on data envelopment analysis. Advances in research methods for information systems research, pp.139-150, 2014. ,
A data envelopment analysis approach to estimate IT-enabled production capability, MIS Quarterly, vol.41, issue.1, pp.189-205, 2017. ,
Using data envelopment analysis (DEA) for monitoring efficiency-based performance of productivity-driven organizations: design and implementation of a decision support system, Omega, vol.41, issue.1, pp.131-142, 2013. ,
Some models for estimating technical and scale inefficiencies in data envelopment analysis, Management Science, vol.30, issue.9, pp.1078-1092, 1984. ,
Tool path compensation strategies for single point incremental sheet forming using multivariate adaptive regression splines, Computer-Aided Design, vol.45, issue.3, pp.575-590, 2013. ,
A hybrid decision support framework for generating & selecting causal explanatory regression splines models for information systems research, Information Systems Frontiers, vol.17, issue.4, pp.845-856, 2015. ,
The elements of statistical learning: data mining, inference, and prediction, 2001. ,
Generalized additive model, 1990. ,
Managing with style: a guide to understanding assessing, and improving decision making, 1987. ,