共 17 条
[1]
信息安全管理研究回顾、脉络梳理及未来展望[J] 林润辉;谢宗晓;刘琦; 信息系统学报 2015,
[2]
[3]
Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory[J] Lijiao Cheng;Ying Li;Wenli Li;Eric Holm;Qingguo Zhai Computers & Security 2013,
[4]
Future directions for behavioral information security research[J] Robert E. Crossler;Allen C. Johnston;Paul Benjamin Lowry;Qing Hu;Merrill Warkentin;Richard Baskerville Computers & Security 2013,
[5]
Employee Misuse of Information Technology Resources: Testing a Contemporary Deterrence Model[J] John D'Arcy;Sarv Devaraj Decision Sciences 2012,
[6]
The effects of multilevel sanctions on information security violations: A mediating model[J] Ken H. Guo;Yufei Yuan Information & Management 2012,
[7]
Security-related behavior in using information systems in the workplace: A review and synthesis[J] Ken H. Guo Computers & Security 2012,
[8]
Motivating IS security compliance: Insights from Habit and Protection Motivation Theory[J] Anthony Vance;Mikko Siponen;Seppo Pahnila Information & Management 2012,
[9]
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings[J] D'arcy; John;Herath; Tejaswini European Journal of Information Systems 2011,
[10]
Does deterrence work in reducing information security policy abuse by employees?[J] Qing Hu;Zhengchuan Xu;Tamara Dinev;Hong Ling Communications of the ACM 2011,

