Changes

Jump to navigation Jump to search
m
Line 26: Line 26:  
== Diagram/schematic of theory ==
 
== Diagram/schematic of theory ==
 
   
 
   
[[File:SOIPSVM_figure1.JPG]]
+
[[File:SOIPSVM_figure1.jpg]]
    
Figure 1. Overview of the selective organizational information privacy and security violations model (SOIPSVM), from Wall, Lowry, and Barlow (2016).
 
Figure 1. Overview of the selective organizational information privacy and security violations model (SOIPSVM), from Wall, Lowry, and Barlow (2016).
Line 35: Line 35:     
== Seminal articles ==
 
== Seminal articles ==
Jeffrey D. Wall, Paul Benjamin Lowry, and Jordan Barlow (2016). “[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2611567 Organizational violations of externally governed privacy and security rules: Explaining and predicting selective violations under conditions of strain and excess],” Journal of the Association for Information Systems (JAIS), vol. 17(1) [in press] (http://aisel.aisnet.org/jais/vol17/iss1/).  
+
Jeffrey D. Wall, Paul Benjamin Lowry, and Jordan Barlow (2016). “[http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2611567 Organizational violations of externally governed privacy and security rules: Explaining and predicting selective violations under conditions of strain and excess],” Journal of the Association for Information Systems (JAIS), vol. 17(1), pp. 39-76 (http://aisel.aisnet.org/jais/vol17/iss1/).
    
== Originating area ==
 
== Originating area ==
73

edits

Navigation menu