Author of the publication

Seeing the forest and the trees: A meta-analysis of information security policy compliance literature.

, , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring Information Systems Control Alignment in Organizations., , , and . ICIS, Association for Information Systems, (2011)Control-style choices and performance impacts: How should senior IS managers enact control over uncertain IS projects?, , , and . Decis. Support Syst., (April 2023)Information Systems Control: A Review and Framework for Emerging Information Systems Processes., , and . J. Assoc. Inf. Syst., 17 (4): 2 (2016)When enough is enough: Investigating the antecedents and consequences of information security fatigue., , and . Inf. Syst. J., 31 (4): 521-549 (2021)Perceptions of control legitimacy in information systems development., and . Inf. Technol. People, 31 (3): 712-740 (2018)Barking Up the Wrong Tree? Reconsidering Policy Compliance as a Dependent Variable within Behavioral Cybersecurity Research., and . HICSS, page 4139-4148. ScholarSpace, (2023)Beyond Modes: a New Typology of ISD Control., and . ICIS, page 94. Association for Information Systems, (2010)(Re)considering the Concept of Reproducibility of Information Systems Literature Reviews.. AMCIS, Association for Information Systems, (2019)Hitting a moving target: a process model of information systems control change., , and . Inf. Syst. J., 26 (3): 195-226 (2016)Organizational information security policies: a review and research framework., , and . Eur. J. Inf. Syst., 26 (6): 605-641 (2017)