共 17 条
[1]
信息安全管理研究回顾、脉络梳理及未来展望[J]. 林润辉,谢宗晓,刘琦.信息系统学报. 2015(01)
[3]
计算机安全学[M]. 电子工业出版社 , (美)MattBishop著, 2005
[4]
Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory[J] . Lijiao Cheng,Ying Li,Wenli Li,Eric Holm,Qingguo Zhai.Computers & Security . 2013
[5]
Future directions for behavioral information security research[J] . Robert E. Crossler,Allen C. Johnston,Paul Benjamin Lowry,Qing Hu,Merrill Warkentin,Richard Baskerville.Computers & Security . 2013
[6]
Employee Misuse of Information Technology Resources: Testing a Contemporary Deterrence Model[J] . John D’Arcy,Sarv Devaraj.Decision Sciences . 2012 (6)
[7]
The effects of multilevel sanctions on information security violations: A mediating model[J] . Ken H. Guo,Yufei Yuan.Information & Management . 2012 (6)
[8]
Security-related behavior in using information systems in the workplace: A review and synthesis[J] . Ken H. Guo.Computers & Security . 2012
[9]
Motivating IS security compliance: Insights from Habit and Protection Motivation Theory[J] . Anthony Vance,Mikko Siponen,Seppo Pahnila.Information & Management . 2012 (3-4)
[10]
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings[J] . D’arcy, John,Herath, Tejaswini.European Journal of Information Systems . 2011 (6)