关注
Anat Zeelim Hovav
Anat Zeelim Hovav
None
在 korea.ac.kr 的电子邮件经过验证
标题
引用次数
引用次数
年份
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
J D'Arcy, A Hovav, D Galletta
Information systems research 20 (1), 79-98, 2009
18172009
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the US and South Korea
A Hovav, J D’Arcy
Information & Management 49 (2), 99-110, 2012
3662012
The impact of denial‐of‐service attack announcements on the market value of firms
A Hovav, J D'Arcy
Risk Management and Insurance Review 6 (2), 97-121, 2003
3362003
Does one size fit all? Examining the differential effects of IS security countermeasures
J D’Arcy, A Hovav
Journal of business ethics 89, 59-71, 2009
2642009
Deterring internal information systems misuse
J D'Arcy, A Hovav
Communications of the ACM 50 (10), 113-117, 2007
2372007
A model of Internet standards adoption: the case of IPv6
A Hovav, R Patnayakuni, D Schuff
Information Systems Journal 14 (3), 265-294, 2004
1492004
The impact of virus attack announcements on the market value of firms.
A Hovav, J D'Arcy
WOSIS, 146-156, 2004
1452004
This is my device! Why should I follow your rules? Employees’ compliance with BYOD security policy
A Hovav, FF Putri
Pervasive and Mobile Computing 32, 35-49, 2016
1262016
To bridge or to bond? Diverse social connections in an IS project team
JY Han, A Hovav
International Journal of Project Management 31 (3), 378-390, 2013
982013
Employees compliance with BYOD security policy: Insights from reactance, organizational justice, and protection motivation theory
FF Putri, A Hovav
942014
The role of user computer self-efficacy, cybersecurity countermeasures awareness, and cybersecurity skills influence on computer misuse
MS Choi, Y Levy Ph D, H Anat
822013
The ripple effect of an information security breach event: A stakeholder analysis
A Hovav, P Gray
Communications of the Association for Information Systems 34 (1), 50, 2014
742014
Capital market reaction to defective IT products: The case of computer viruses
A Hovav, J D'arcy
Computers & Security 24 (5), 409-424, 2005
622005
From hindsight to foresight: Applying futures research techniques in information systems
P Gray, A Hovav
Communications of the Association for Information Systems 22 (1), 12, 2008
502008
Global diffusion of the internet V-the changing dynamic of the internet: Early and late adopters of the IPv6 standard
A Hovav, D Schuff
Communications of the Association for Information Systems 15 (1), 14, 2005
442005
Determinants of Internet standards adoption: The case of South Korea
A Hovav, M Hemmert, YJ Kim
Research Policy 40 (2), 253-262, 2011
402011
Using a dairy management information system to facilitate precision agriculture: The case of the AfiMilk® system
R Berger, A Hovav
Information Systems Management 30 (1), 21-34, 2013
372013
Towards a best fit between organizational security countermeasures and information systems misuse behaviors
J D’Arcy, A Hovav
Journal of Information System Security 3 (2), 3-30, 2007
372007
Tutorial: identity management systems and secured access control
A Hovav, R Berger
Communications of the Association for Information Systems 25 (1), 42, 2009
342009
Market reaction to security breach announcements: Evidence from South Korea
A Hovav, JY Han, J Kim
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 48 (1 …, 2017
302017
系统目前无法执行此操作,请稍后再试。
文章 1–20