Semantic Filter
show all semantic filters
Found 4 articles
  • Information Security Compliance: A Complete Values View

    2019 | Americas Conference on Information Systems | Citations: 0

    Authors: Torres, Carlos; Crossler, Robert

    Abstract: Cybersecurity threats and Information Security Policy Compliance is an importan ... Expand

    Semantic filters: compliance theory of organizations

    Topics: information security policy compliance security policy information system use social norm self efficacy

    Methods: partial least squares regression survey cross sectional research theoretical contribution theory development

    Theories: compliance theory of organizations

  • Patient Adoption of Smart Cards

    2016 | Americas Conference on Information Systems | Citations: 0

    Authors: Howell, Pamella; Sharman, Raj; Das, Sanjukta; Abdelhamid, Mohamed

    Abstract: This paper adapts the Unified Theory of Acceptance and Use Technology Model (UTA ... Expand

    Semantic filters: compliance theory of organizations

    Topics: smart card social influence data security IT security threat privacy

    Methods: data transformation survey survey design exploratory factor analysis logistic regression

    Theories: unified theory of acceptance and use of technology compliance theory of organizations

  • Campus Emergency Notification Systems: An Examination of Factors Affecting Compliance with Alerts

    2015 | Management Information Systems Quarterly | Citations: 50

    Authors: Han, Wencui; Ada, Serkan; Sharman, Raj; Rao, H. Raghav

    Abstract: The increasing number of campus-related emergency incidents, in combination with ... Expand

    Semantic filters: compliance theory of organizations

    Topics: data quality emergency warning system logistics management anonymity advertising management

    Methods: survey focus group chi squared test data transformation survey design

    Theories: compliance theory of organizations

  • Organizations' Information Security Policy Compliance: Stick or Carrot Approach?

    2012 | Journal of Management Information Systems | Citations: 92

    Authors: Chen, Yan; Ramamurthy, K.; Wen, Kuang-Wei

    Abstract: Companies' information security efforts are often threatened by employee neglige ... Expand

    Semantic filters: compliance theory of organizations

    Topics: security policy IT security information security policy compliance information security policy violation data security

    Methods: experiment latin square design survey parametric test one-way ANOVA

    Theories: compliance theory of organizations