Author of the publication

Dispositional and situational factors: influences on information security policy violations.

, , , and . Eur. J. Inf. Syst., 25 (3): 231-251 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions., , and . AMCIS, Association for Information Systems, (2011)Engaging Remote Employees: The Moderating Role of "Remote" Status in Determining Employee Information Security Policy Awareness., , and . JOEUC, 25 (1): 1-23 (2013)The Impact of National Culture on Workplace Privacy Expectations in the Context of Information Security Assurance., , and . AMCIS, page 521. Association for Information Systems, (2009)Personality and IT security: An application of the five-factor model., , , and . AMCIS, page 415. Association for Information Systems, (2006)Introduction to Innovative Behavioral IS Security and Privacy Research Minitrack., , and . HICSS, page 1. ScholarSpace / AIS Electronic Library (AISeL), (2017)Continuance of protective security behavior: A longitudinal study., , , and . Decis. Support Syst., (2016)The influence of the informal social learning environment on information privacy policy compliance efficacy and intention., , and . Eur. J. Inf. Syst., 20 (3): 267-284 (2011)Impact of Negative Message Framing on Security Adoption., , and . J. Comput. Inf. Syst., 51 (1): 41-51 (2010)Risk Perspectives in Systems Development., , , and . AMCIS, page 273. Association for Information Systems, (2007)The Influence of Perceived Source Credibility on End User Attitudes and Intentions to Comply with Recommended IT Actions., and . JOEUC, 22 (3): 1-21 (2010)