Mechanisms fostering the misuse of information systems for corrupt practices in the Nigerian public sector

I Inuwa, C Ononiwu, MMO Kah, AKM Quaye - … as a Catalyst for ICT4D: 15th …, 2019 - Springer
The paper explores the misuse of information systems for corrupt practices in the Nigerian
public sector as a phenomenon under study. Routine Activity theory, Model of Emergent IT …

[PDF][PDF] Influence of personality traits on cyberloafing in the service sector of Pakistan

S Abro, NH Phulpoto, S Memon… - Journal of …, 2021 - researchgate.net
The main purpose of this study was to analyze the relationship between the Big Five
Personality Model and Cyberloafing. Results have demonstrated that the elements of the …

Information security policy development: considering the practices of making rules

H Paananen - JYU dissertations, 2023 - jyx.jyu.fi
Information security policies (ISPs) are at the core of organizations' information security
efforts. They set objectives for protecting information assets and direct employees to achieve …

Cultural bias in reviews and mitigation options

RM Davison - Information Systems Journal, 2014 - dl.acm.org
Editorial - Cultural Bias in Reviews and Mitigation Options | Information Systems Journal skip to
main content ACM Digital Library home ACM home Google, Inc. (search) Advanced Search Browse …

Öğretmen algılarına göre örgütsel adalet ve örgütsel sağlık arasındaki ilişki (Kemalpaşa örneği

M Tekel - 2019 - adudspace.adu.edu.tr
Bu araştırmanın amacı ilköğretim ve ortaöğretim öğretmenlerinin algılarına göre örgütsel
adalet ile örgütsel sağlık arasındaki ilişkileri incelemektir. İlişkisel tarama modelinde …

Response biases in policy compliance research

S Kurowski - Information & Computer Security, 2020 - emerald.com
Purpose The purpose of this study is to use a developed and pre-tested scenario-based
measurement instrument for policy compliance and determine whether policy compliance …

The influence of familiarity with Information Technology on the effects of deterrence

R Huang, N Liang - Current Psychology, 2023 - Springer
Abstract Deterrence research in Information Systems Security (ISS) investigates the effects
of sanctions on employees' behaviors to comply with ISS policy. However, the literature of …

Personal and Contextual Predictors of Information Security Policy Compliance: Evidence from a Low-Fidelity Simulation

RR Brooks, KJ Williams, SY Lee - Journal of Business and Psychology, 2023 - Springer
The objective of this study was to examine the roles that organizational security climate and
perceived costs and rewards of compliance play in predicting the extent to which people …

The differential effects of interpersonal justice and injustice on computer abuse: A regulatory focus theory perspective

F Xu, X Wang, B Xue - Journal of Database Management (JDM), 2019 - igi-global.com
Insider employees have become one of the top security threats to organizations. In order to
mitigate their detrimental security behaviors, it is important to understand the thought …

[PDF][PDF] Technology-Mediated Self-Regulation: An Implication for Preventing Online Gaming Addiction.

ZWY Lee, CMK Cheung, TKH Chan - ICIS, 2016 - core.ac.uk
Self-regulation has assumed an important role in online gaming addiction. Although the role
of self-regulation has received increasing scholarly attention in the past decade, research on …