Forty-five years of celebrity credibility and endorsement literature: Review and learnings

D Halder, D Pradhan, HR Chaudhuri - Journal of Business Research, 2021 - Elsevier
Celebrity credibility constitutes a significant portion of the celebrity brand endorsement
literature. While this field of research is mature with a rich history of 45 years, it lacks a …

Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors

SR Boss, DF Galletta, PB Lowry, GD Moody, P Polak - MIS quarterly, 2015 - JSTOR
Because violations of information security (ISec) and privacy have become ubiquitous in
both personal and work environments, academic attention to ISec and privacy has taken on …

Variables influencing information security policy compliance: A systematic review of quantitative studies

T Sommestad, J Hallberg, K Lundholm… - … & Computer Security, 2014 - emerald.com
Purpose–The purpose of this paper is to identify variables that influence compliance with
information security policies of organizations and to identify how important these variables …

User compensation as a data breach recovery action

S Goode, H Hoehle, V Venkatesh, SA Brown - MIS Quarterly, 2017 - JSTOR
Drawing on expectation confirmation research, we develop hypotheses regarding the effect
of compensation on key customer outcomes following a major data breach and consequent …

Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model

Y Chen, DF Galletta, PB Lowry, X Luo… - Information Systems …, 2021 - pubsonline.informs.org
Organizational information security (ISec) threats have exploded with advances in
globalization and technology. Thus, organizations are scrambling to find both technical and …

[PDF][PDF] Endorser credibility effects on Yemeni male consumer's attitudes towards advertising, brand attitude and purchase intention: The mediating role of attitude …

MAA Sallam, NA Wahid - International Business Research, 2012 - nu.edu.sa
The use of celebrity as spokespeople for companies continues to be a popular method of
advertising. The reason behind the popularity of celebrity advertising is the advertiser's …

Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations

M Siponen, A Vance - European Journal of Information Systems, 2014 - Taylor & Francis
The information systems (IS) field continues to debate the relative importance of rigor and
relevance in its research. While the pursuit of rigor in research is important, we argue that …

Integrating elaboration likelihood model and herd theory in information security message persuasiveness

F Xu, M Warkentin - Computers & Security, 2020 - Elsevier
Determining how to design persuasive information security messages to increase
employees' engagement in protection-motivated behaviors is an important organizational …

Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics

JD Wall, M Warkentin - Information & Management, 2019 - Elsevier
Persuasion is key to encourage compliance with information security policies through fear
appeals, though research has not examined how the perceived quality of their arguments …