1Burcu Bulgurcu,Hasan Cavusoglu,Izak Benbasat.Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Quarterly . 2010 被引量:1
2Dinev T,Hu Q.The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems . 2007 被引量:1
3Dhillon G,Backhouse J.Current directions in IS se-curity research:Towards socio-organizational perspec-tives. Information Systems Journal . 2001 被引量:1
4Janine L. Spears,Henri Barki.User participation in information systems security risk management. MIS Quarterly . 2010 被引量:1
5Sam Ransbotham,Sabyaschi Mitra,Jon Ramsey.Are markets for vulnerabilities effective?. MIS Quarterly . 2012 被引量:1
6Backhouse, James,Hsu, Carol W.,Silva, Leiser.Circuits of power in creating De Jure standards: Shaping an international information systems security standard. MIS Quarterly: Management Information Systems . 2006 被引量:1
7Li, Chan,Peters, Gary F.,Richardson, Vernon J.,Watson, Marcia Weidenmier.The consequences of information technology control weaknesses on management information systems: The case of Sarbanes-Oxley internal control reports. MIS Quarterly: Management Information Systems . 2012 被引量:1
8Detmar W. Straub,Jr.,William D. Nance.Discovering and disciplining computer abuse in organizations: a field study. MIS Quarterly . 1990 被引量:1
9Burrell G,Morgan G.Socilolgical Paradigms and Organization Analysis. . 1979 被引量:1
10Puhakainen, Petri,Siponen, Mikko.Improving employees’ compliance through information systems security training: An action research study. MIS Quarterly: Management Information Systems . 2010 被引量:1
7Crossler R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., Baskerville, R.. Future Directions for Behavioral Information Security Research. Computers & Security, 2013, (32): 90-101. 被引量:1
8Computer Security Institute. CSI 2010/2011 Computer Crime and Security Survey. New York: Computer Security Institute. 2011: 11-12. 被引量:1