A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings

J D'arcy, T Herath - European journal of information systems, 2011 - Taylor & Francis
Deterrence theory is one of the most widely applied theories in information systems (IS)
security research, particularly within behavioral IS security studies. Based on the rational …

Personal information privacy and emerging technologies

S Conger, JH Pratt, KD Loch - Information Systems Journal, 2013 - Wiley Online Library
This research presents a model of personal information privacy (PIP) that includes not only
transactional data gathering, but also interorganisational data sharing. Emerging …

Examining gender differences in people's information-sharing decisions on social networking sites

X Lin, X Wang - International Journal of Information Management, 2020 - Elsevier
Abstract Information systems research provides increasing evidence that women and men
differ in their use of information technology. However, research has not sufficiently explained …

Continuities and extensions of ethical climate theory: A meta-analytic review

KD Martin, JB Cullen - Journal of business ethics, 2006 - Springer
Using traditional meta-analytic techniques, we compile relevant research to enhance
conceptual appreciation of ethical climate theory (ECT) as it has been studied in the …

[图书][B] Cybercrime and digital forensics: An introduction

TJ Holt, AM Bossler, KC Seigfried-Spellar - 2022 - taylorfrancis.com
This book offers a comprehensive and integrative introduction to cybercrime. It provides an
authoritative synthesis of the disparate literature on the various types of cybercrime, the …

[PDF][PDF] The Ten Commandments of Ethical Medical AI.

H Müller, MT Mayrhofer, EB Van Veen, A Holzinger - Computer, 2021 - academia.edu
ARTIFICIAL INTELLIGENCE/MACHINE LEARNING achieving human-level competence at
solving tasks across many domains in medicine. AI solutions based on deep learning have …

Analysis of end user security behaviors

JM Stanton, KR Stam, P Mastrangelo, J Jolton - Computers & security, 2005 - Elsevier
Many information security specialists believe that promoting good end user behaviors and
constraining bad end user behaviors provide one important method for making information …

Theory of planned behavior and ethics theory in digital piracy: An integrated model

C Yoon - Journal of business ethics, 2011 - Springer
Since digital piracy has posed a significant threat to the development of the software industry
and the growth of the digital media industry, it has, for the last decade, held considerable …

Self-efficacy in information security: Its influence on end users' information security practice behavior

HS Rhee, C Kim, YU Ryu - Computers & security, 2009 - Elsevier
The ultimate success of information security depends on appropriate information security
practice behaviors by the end users. Based on social cognitive theory, this study models and …

Software piracy in the workplace: A model and empirical test

AG Peace, DF Galletta, JYL Thong - Journal of Management …, 2003 - Taylor & Francis
Theft of software and other intellectual property has become one of the most visible
problems in computing today. This paper details the development and empirical validation of …