User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach J D'Arcy, A Hovav, D Galletta Information systems research 20 (1), 79-98, 2009 | 1817 | 2009 |
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the US and South Korea A Hovav, J D’Arcy Information & Management 49 (2), 99-110, 2012 | 366 | 2012 |
The impact of denial‐of‐service attack announcements on the market value of firms A Hovav, J D'Arcy Risk Management and Insurance Review 6 (2), 97-121, 2003 | 336 | 2003 |
Does one size fit all? Examining the differential effects of IS security countermeasures J D’Arcy, A Hovav Journal of business ethics 89, 59-71, 2009 | 264 | 2009 |
Deterring internal information systems misuse J D'Arcy, A Hovav Communications of the ACM 50 (10), 113-117, 2007 | 237 | 2007 |
A model of Internet standards adoption: the case of IPv6 A Hovav, R Patnayakuni, D Schuff Information Systems Journal 14 (3), 265-294, 2004 | 149 | 2004 |
The impact of virus attack announcements on the market value of firms. A Hovav, J D'Arcy WOSIS, 146-156, 2004 | 145 | 2004 |
This is my device! Why should I follow your rules? Employees’ compliance with BYOD security policy A Hovav, FF Putri Pervasive and Mobile Computing 32, 35-49, 2016 | 126 | 2016 |
To bridge or to bond? Diverse social connections in an IS project team JY Han, A Hovav International Journal of Project Management 31 (3), 378-390, 2013 | 98 | 2013 |
Employees compliance with BYOD security policy: Insights from reactance, organizational justice, and protection motivation theory FF Putri, A Hovav | 94 | 2014 |
The role of user computer self-efficacy, cybersecurity countermeasures awareness, and cybersecurity skills influence on computer misuse MS Choi, Y Levy Ph D, H Anat | 82 | 2013 |
The ripple effect of an information security breach event: A stakeholder analysis A Hovav, P Gray Communications of the Association for Information Systems 34 (1), 50, 2014 | 74 | 2014 |
Capital market reaction to defective IT products: The case of computer viruses A Hovav, J D'arcy Computers & Security 24 (5), 409-424, 2005 | 62 | 2005 |
From hindsight to foresight: Applying futures research techniques in information systems P Gray, A Hovav Communications of the Association for Information Systems 22 (1), 12, 2008 | 50 | 2008 |
Global diffusion of the internet V-the changing dynamic of the internet: Early and late adopters of the IPv6 standard A Hovav, D Schuff Communications of the Association for Information Systems 15 (1), 14, 2005 | 44 | 2005 |
Determinants of Internet standards adoption: The case of South Korea A Hovav, M Hemmert, YJ Kim Research Policy 40 (2), 253-262, 2011 | 40 | 2011 |
Using a dairy management information system to facilitate precision agriculture: The case of the AfiMilk® system R Berger, A Hovav Information Systems Management 30 (1), 21-34, 2013 | 37 | 2013 |
Towards a best fit between organizational security countermeasures and information systems misuse behaviors J D’Arcy, A Hovav Journal of Information System Security 3 (2), 3-30, 2007 | 37 | 2007 |
Tutorial: identity management systems and secured access control A Hovav, R Berger Communications of the Association for Information Systems 25 (1), 42, 2009 | 34 | 2009 |
Market reaction to security breach announcements: Evidence from South Korea A Hovav, JY Han, J Kim ACM SIGMIS Database: the DATABASE for Advances in Information Systems 48 (1 …, 2017 | 30 | 2017 |