[1] |
G.D. Moody, M. Siponen, S. Pahnila, MIS Quart., 42 (March 2018), pp.285-311
|
[2] |
|
[3] |
C. Liu, H. Liang, N. Wang, et al.. Inform. Technol. Peopl., 35 (February 2022), pp. 820-834 DOI: 10.3390/aerospace9120820
|
[4] |
B. Bulgurcu, H. Cavusoglu, I. Benbasat. MIS Quart., 34 (September 2010), pp.523-548 DOI: 10.2307/25750690
|
[5] |
M.D. Workman, W.H. Bommer, D. Straub. Comput. Hum. Behav., 24 (September 2008), pp.2799-2816
URL
|
[6] |
M. Warkentin, R. Willison. Eur. J. Inform. Syst., 18 (April 2009), pp. 101-105 DOI: 10.1057/ejis. 2009.12
|
[7] |
M. Warkentin, D. Straub, K. Malimage. Proc. Annu. Symp. Information Assurance & Secure Knowledge Management, Albany NY (January 2012), pp. 1-8
|
[8] |
I. Kirlappos, A. Beautement, A. Sasse. Proc. Int. Conf. Financial Cryptography and Data Security, Okinawa (April 2013), pp. 70-82 DOI: 10.1007/978-3-642-41320-9_5
|
[9] |
A. Beautement, A. Sasse, M. Vonham. Proc. New Security Paradigms Workshop 2008, California ( January 2008), pp. 47-58 DOI: 10.1145/1595676.1595684
|
[10] |
A. Beautement, A. Sasse. Comput. Fraud Secur., 10 (October 2009), pp.8-12 https://www.sciencedirect.com/science/article/pii/S1361372309701277/pdfft?md5=f275be386c9ef32cc6f11d1e205e1410&pid=1-s2.0-S1361372309701277-main.pdf DOI: 10.1016/s1361-3723(09)70127-7
|
[11] |
K.D. Loch, H.H. Carr, M. Warkentin. MIS Quart., 16 (June 1992), pp.173-186 DOI: 10.2307/249574
|
[12] |
M.A. Mahmood, M. Siponen, D. Straub, H.R. Rao, R. Santanam. MIS Quart., 34 (November 2010), pp.431-433 DOI: 10.2307/25750685
|
[13] |
Cybersecurity Ventures (2018), "2019 official annual cybercrime report", available at: https://www.herjavecgroup.com/wp-content/uploads/2018/12/CV-HG-2019-Official-Annual-Cybercrime-Report.pdf (accessed 12 August 2019).
|
[14] |
J. D'Arcy, T. Herath. Eur.J. Inform. Syst., 20 (November 2011), pp. 643-658 DOI: 10.1057/ejis.2011.23
|
[15] |
|
[16] |
R.E. Crossler, A.C. Johnston, P.B. Lowry, Q. Hu, M. Warkentin, R. Baskerville. Comput. Security, 32 (February 2013), pp.90-101
URL
|
[17] |
K.H. Guo. Comput. Security, 32 (February 2013), pp.242-251
URL
|
[18] |
M. Siponen, M.A. Mahmood, S. Pahnila. Inform. Management, 51 (January 2014), pp.217-224
URL
|
[19] |
J. Shropshire, M. Warkentin, S. Sharma. Comput. Security, 49 (March 2015), pp.177-191
URL
|
[20] |
G.V. Post, A. Kagan. Comput. Security, 26 (May 2007), pp.229-237
URL
|
[21] |
|
[22] |
M.I. Merhi, P. Ahluwalia, Proc. 20th Americas Conf. Information Systems, Savannah (2014), pp. 1-10
|
[23] |
T. Herath, H.R. Rao. Int. J. Bus. Gov. Ethics, 5 (January 2010), pp.2-13
|
[24] |
F. Fang, M. Parameswaran, X. Zhao, A.B. Whinston. Inf. Syst. Front., 16 (July 2012), pp.399-416
|
[25] |
P. Milgrom, B. Holmström. J. Law Econ. Organ., 7 (February 1991), pp.24-52
|
[26] |
C.W. Langfred, N.A. Moye. J. Appl. Psychol., 89 (January 2005), pp.934-945
|
[27] |
|
[28] |
S.J. Behson, E.R. Eddy, S.J. Lorenzet, Curr. Res. Soc. Psychol., 5 (May 2000), pp.170-189
|
[29] |
L.W. Doob. Yale University Press, New Haven, CT (1971)
|
[30] |
J.R. Hackman, G.R. Oldham. Work Redesign (1980)
|
[31] |
S. Narayanan, S. Balasubramanian, J.M. Swaminathan. Manage. Sci., 55 (November 2009), pp. 1861-1876 DOI: 10.1287/mnsc.1090.1057
|
[32] |
|
[33] |
A.M. Grant, Y. Fried, T.L. Juillerat. APA Handbook of Industrial and Organizational Psychology, 1 (January 2009), pp.417-453
|
[34] |
C.S. Wong, M.A. Campion. J. Appl. Psychol., 76 (December 1991), pp.825-837
|
[35] |
M. Galletta, I. Portoghese, A. Battistelli. J. Manag. Res., 3 (February 2011), pp.111-119
|
[36] |
B.J.C. Claessens, W.V. Eerde, C.G. Rutte, R.A. Roe. J. Organ. Behav., 25 (December 2004), pp.937-950
|
[37] |
A. Häfner, A. Stock. J. Psychol. Interdiscipl. Appl., 144 (July 2010), pp. 429-447 DOI: 10. 1080/00223980.2010.496647
|
[38] |
T. Macan. J. Appl. Psychol., 79 (June 1994), pp.381-391
|
[39] |
J.E. McGrath, F. Tschan, American Psychological Association, Washington DC (2004)
|
[40] |
D. Ancona, G.A. Okhuysen, L.A. Perlow. Acad. Manage. Rev., 26 (October 2001), pp.512-529
|
[41] |
K.A. Brekke, S. Kverndokk, K. Nyborg. J. Public. Econ., 87 (December 2000), pp.1967-1983
|
[42] |
K.C. Murdock. RAND J. Econ, 33 (February 2002), pp. 650-671 DOI: 10.2307/3087479
|
[43] |
P. Milgrom, B. Holmström. Econometrica, 55 (February 1987), pp.303-328
|