参考文献
|
-
Anderson, R.,Moore, T.(2006).The economics of information security.Science,314(5799),610-613.
-
Bodin, L.D.,Gordon, L.A.,Loeb, M.P.(2005).Evaluating information security investments using the analytic hierarchy process.Communications of the ACM,48(2),78-83.
-
Boss S. R.,Kirsch, L.J.,Angermeier, I.,Shingler, R.A.,Boss, R.W.(2009).If someone is watching, I'll do what I'm asked: Mandatoriness, control, and information security.European Journal of Information Systems,18(2),151-164.
-
Bulgurcu, B.,Cavusoglu, H.,Benbasat, I.(2010).Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness.MIS Quarterly,34(3),523-548.
-
Cattell, R.B.(1996).The scree test for the number of factors.Multivariate Behavioral Research,1,245-276.
-
Chang, S E.,Chen, S.Y.,Chen, C.Y.(2011).Exploring the relationships between IT capabilities and information security management.International Journal of Technology Management,54(2/3),147-166.
-
Chang, S E.,Lin, C.(2007).Exploring organizational culture for information security management.Industrial Management & Data System,107(3),438-458.
-
Colwill, C.(2009).Human factors in information security: The insider threat - Who can you trust these days?.Information Security Technical Report,14(4),186-196.
-
Cross, R.M.(2005).Exploring attitudes: The case for Q methodology.Health Education Research,20(2),206-213.
-
Da Veiga, A.,Eloff, J.H.P.(2010).A framework and assessment instrument for information security culture.Computers & Security,29(2),196-207.
-
D'Agostino Sr.,R.B.,Russell, H. K.(2005).Encyclopedia of Biostatistics.Chichester, UK:John Wiley & Sons.
-
D'Arcy, J.,Hovav, A.,Galletta, D.(2009).User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach.Information Systems Research,20(1),79-98.
-
David, S.,Marlys, M.,David, B.,Mark, W.(2014).A theory of employee compliance with information security.MWAIS 2014 Proceedings
-
Desserler, G.(2000).Human Resource Management.Upper Saddle River, NJ:Prentice Hall.
-
Fulford, H.,Doherty, N.(2003).The application of information security policies in large UK-based organizations: An exploratory investigation.Information Management & Computer Security,11(2/3),106-114.
-
Hagen, J. M.,Albrechtsen, E.,Hovden, J.(2008).Implementation and effectiveness of organizational information security measures.Information Management & Computer Security,16(4),377-397.
-
Höne, K.,Eloff, J.H.P.(2002).What makes an effective information security policy?.Network Security,2002(6),14-16.
-
Hong, K.,Chi, Y.,Chao, L.R.,Tang, J.(2003).An integrated system theory of information security management.Information Management & Computer Security,11(5),243-248.
-
Hsu, M.L.(1979).Predicting American elderly viewer preferences in elderly-oriented television programming.American Studies,9(4),81-112.
-
Hu, Q.,Dinev, T.,Hart, P.,Cooke, D.(2012).Managing employee compliance with information security policies: The critical role of top management and organizational culture.Decision Sciences,43(4),615-660.
-
Jirasek, V.(2012).Practical application of information security models.Information Security Technical Report,17(1/2),1-8.
-
Kaiser, H.F.(1985).The varimax criterion for analytic rotation in factor analysis.Psychometrics,23,187-200.
-
Kankanhalli, A.,Hock-Hai, T.,Bernard, C.Y.T.,Kwok-Kee, W.(2003).An integrative study of information systems security effectiveness.International Journal of Information Management,23,139-154.
-
Knapp, K. J.,Marshall, T.E.,Rainer, R.K.,Ford, F.N.(2006).Information security: Management's effect on culture and policy.Information Management & Computer Security,14(1),24-36.
-
Lim, J S.,Atif, A.,Shanton, C.,Sean, M.(2010).Embedding information security culture emerging concerns and challenges.PACIS 2010 Proceedings
-
Ma, Q.,Johnston, A.C.,Pearson, J.M.(2008).Information security management objectives and practices: A parsimonious framework.Information Management & Computer Security,16(3),251-270.
-
Mejias, R.J.,Harvey, M.G.(2012).A case for information security awareness (ISA) programmes to protect global information, innovation and knowledge resource.International Journal of Transitions and Innovation Systems,2(3/4),302-324.
-
Myyry, L.,Siponen, M.,Pahnila, S.,Vartiainen, T.,Vance, A.(2009).What levels of moral reasoning and values explain adherence to information security rules? An empirical study.European Journal of Information Systems,18(2),126-139.
-
Puhakainen, P.,Siponen, M.(2010).Improving employees' compliance through information systems security training: An action research study.MIS Quarterly,34(4),757-778.
-
Saint-Germain, R.(2005).Information security management best practice based on ISO/IEC 17799.Information Management Journal,39(4),60-66.
-
Schlinger, M.J.(1969).Cues on Q-technique.Journal of Advertising Research,9(3),53-60.
-
Schuler, S.,Jackson, E.(2000).Managing Human Resources.Cincinnati, OH:South-Western College Publishing.
-
Shaw, R S.,Chen, C.C.,Harris, A.L.,Huang, H.J.(2009).The impact of information richness on information security awareness training effectiveness.Computers & Education,52,92-100.
-
Siponen, M.,Pahnila, S.,Mahmood, M.A.(2010).Compliance with information security policies: An empirical investigation.Computer,43(2),64 -71.
-
Sotirakou, T.,Zeppou, M.(2005).How to align Greek civil service with European Union public sector management policies - A demand role for HR managers in the contemporary public administrative context.International Journal of Public Sector Management,18(1),54-82.
-
Sveen, F.O.,Sarriegi, J.M.,Rich, E.,Gonzalez, J.J.(2007).Toward viable information security reporting systems.Information Management & Computer Security,15(5),408-419.
-
Van Niekerk, J.F.,Von Solms, R.(2010).Information security culture: A management perspective.Computers & Security,29(4),476-486.
-
Vermeulen, C.,Von Solms, R.(2002).The information security management toolbox - Taking the pain out of security management.Information Management & Computer Security,10(2/3),119-125.
-
Von Solms, R.(1999).Information security management: Why standards are important.Information Management & Computer Security,7(1),50-58.
-
Von Solms, R.,Van Der Haar, H.,von Solms, S. H.,Caelli, W. J.(1994).A framework for information security evaluation.Information & Management,26(3),143-153.
-
Vroom, C.,Von Solms, R.(2004).Towards information security behavioral compliance.Computers & Security,23(3),191-198.
-
Warkentin, M.,Davis, K.,Bekkering, E.(2004).Introducing the check-off password system (COPS): A advancement in user authentication methods and information security.Journal of Organizational and End User Computing,16(3),41-58.
-
Whitten, D.(2008).The chief information security officer: An analysis of the skills required for success.Journal of Computer Information Systems,48(3),15-19.
-
Workman, M.,Bommer, W.H.,Straub, D.(2008).Security lapses and the omission of information security measures: A threat control model and empirical test.Computers in Human Behavior,24(6),2799-2816.
-
Zakaria, O.(2006).Employee security perception in cultivating information security culture.IFIP International Federation for Information Processing,193,83-92.
-
Zall, M.(2000).Internet recruiting.Strategic Finance,81(12),67-72.
|