Security lapses and the omission of information security measures: A threat control model and empirical test
Michael Workman; William, H. Bommer; Detmar Straub
Computers in Human Behavior 24(6): 2799-2816
2008
ISSN/ISBN: 0747-5632
DOI: 10.1016/j.chb.2008.04.005
Accession: 063716339
PDF emailed within 0-6 h: $19.90
Related References
Workman, M; Bommer, W H.; Straub, D 2009: The amplification effects of procedural justice on a threat control model of information systems security behaviours Behaviour and Information Technology 28(6): 563-575Hong, K.S.; Chi, Y.P.; Chao, L.R.; Tang, J.H. 2006: An empirical study of information security policy on information security elevation in Taiwan Information Management and Computer Security 14(2-3): 104-115
Shahri, A.B.; Ismail, Z.; Mohanna, S. 2016: The Impact of the Security Competency on "Self-Efficacy in Information Security" for Effective Health Information Security in Iran Journal of Medical Systems 40(11): 241
Voss, M.D.; Whipple, J.M.; Closs, D.J. 2009: The Role of Strategic Security: Internal and External Security Measures with Security Performance Implications Transportation Journal 48(2): 5-23
Ohara, H. 1996: From defensive security to offensive security : current status and future issues of information system security Ntt Review 8(1): 18-23
Christopher, K. Penny 2007: Greening the security council: climate change as an emerging threat to international peace and security International Environmental Agreements: Politics, Law and Economics 7(1): 35-71
Peters, S 2004: Coercive western energy security strategies: resource wars as a new threat to global security Geopolitics 9(1): 187-212
Chang, K.-H. 2014: Security threat assessment of an Internet security system using attack tree and vague sets Thescientificworldjournal 2014: 506714
Chen, L.; Xie, Z.; Zhen, J.; Dong, K. 2022: The Impact of Challenge Information Security Stress on Information Security Policy Compliance: the Mediating Roles of Emotions Psychology Research and Behavior Management 15: 1177-1191
Kim, Y-Woon.; Cho, N.; Jang, H-Jung. 2018: Trends in Research on the Security of Medical Information in Korea: Focused on Information Privacy Security in Hospitals Healthcare Informatics Research 24(1): 61-68
Anderson, J.G.; Brann, M. 2000: Security of medical information: the threat from within M.D. Computing: Computers in Medical Practice 17(2): 15-17
Sinyolo, S.; Mudhara, M.; Wale, E. 2014: Water security and rural household food security: empirical evidence from the Mzinyathi district in South Africa Food Security 6(4): 483-499
Kessler, S.R.; Pindek, S.; Kleinman, G.; Andel, S.A.; Spector, P.E. 2020: Information security climate and the assessment of information security risk among healthcare employees Health Informatics Journal 26(1): 461-473
Vayrynen, R. 1985: The European Cooperation and Security Process Security Dilemmas and Confidence-Building Measures Security Dialogue 16(4): 349-361
Bussolini, J 2011: Los Alamos as Laboratory for Domestic Security Measures: Nuclear Age Battlefield Transformations and the Ongoing Permutations of Security Geopolitics 16(2): 329-358
Issa, K.; Pierce, T.P.; Gwam, C.; Festa, A.; Scillia, A.J.; Mont, M.A. 2018: Detection of total hip arthroplasties at airport security checkpoints - how do updated security measures affect patients? Hip International: the Journal of Clinical and Experimental Research on Hip Pathology and Therapy 28(2): 122-124
Cox, A.; Connolly, S.; Currall, J. 2001: Raising information security awareness in the academic setting : Information security Vine. very Informal Newsletter on Library Automation (123): 11-16
Issa, K.; Pierce, T.P.; Gwam, C.; Goljan, P.; Festa, A.; Scillia, A.J.; Mont, M.A. 2017: Detection of Total Knee Arthroplasties at Airport Security Checkpoints: How Do Updated Security Measures Affect Patients? Journal of Knee Surgery 30(6): 532-534
Li, A.; Hu, Q.; Liu, J.; Pan, Y. 2016: Resistance and Security Index of Networks: Structural Information Perspective of Network Security Scientific Reports 6: 26810
Chen, Y.M.; Kao, Y.W. 2006: Information Flow Query and Verification for Security Policy of Security-Enhanced Linux Lect. Notes Comput. Sci: 389-404