• Publications
  • Influence
Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations
TLDR
neutralization theory, a theory prominent in Criminology but not yet applied in the context of IS, provides a compelling explanation for IS security policy violations and offers new insight into how employees rationalize this behavior. Expand
  • 692
  • 88
Motivating IS security compliance: Insights from Habit and Protection Motivation Theory
TLDR
An empirical test showed that habitual IS security compliance strongly reinforced the cognitive processes theorized by PMT, as well as employee intention for future compliance. Expand
  • 450
  • 64
  • PDF
Examining Trust in Information Technology Artifacts: The Effects of System Quality and Culture
TLDR
The topic of trust in information technology (IT) artifacts has piqued interest among researchers, but studies of this form of trust are not definitive regarding which factors contribute to it the most. Expand
  • 475
  • 41
IS Security Policy Violations: A Rational Choice Perspective
TLDR
We test a model based on Rational Choice Theory RCT-a prominent criminological theory not yet applied in IS-which explains, in terms of a utilitarian calculation, an individual's decision to commit a violation. Expand
  • 117
  • 20
What levels of moral reasoning and values explain adherence to information security rules? An empirical study
TLDR
It is widely agreed that employee non-adherence to information security policies poses a major problem for organizations. Expand
  • 241
  • 17
  • PDF
Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites
TLDR
We use the associative network model of memory to explain brand knowledge and to show how the mere exposure effect can be leveraged to improve a Web site's brand image. Expand
  • 302
  • 17
  • PDF
Overview and Guidance on Agile Development in Large Organizations
TLDR
A continual debate surrounds the effectiveness of agile software development practices. Expand
  • 113
  • 15
Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers
TLDR
We propose a model based on the elaboration likelihood model (ELM) that explains conditions under which privacy assurance is more or less effective, clarifying the contradictory findings in previous literature. Expand
  • 93
  • 14
  • PDF
Using Accountability to Reduce Access Policy Violations in Information Systems
TLDR
This study presents a new approach for reducing access policy violations, introducing both the theory of accountability and the factorial survey to the information systems field. Expand
  • 150
  • 13
Enhancing Password Security through Interactive Fear Appeals: A Web-Based Field Experiment
TLDR
In this study we examine the influence of interactivity, as well as static and interactive fear appeals, on motivating users to increase the strength of their passwords. Expand
  • 49
  • 10
  • PDF
...
1
2
3
4
5
...