Changes

Jump to navigation Jump to search
190 bytes added ,  11:34, 1 March 2017
Line 36: Line 36:     
== Links from this theory to other theories ==
 
== Links from this theory to other theories ==
N/A
+
[[Social learning theory]]
    
== IS articles that use the theory ==
 
== IS articles that use the theory ==
 +
Theoharidou, M., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2005). The insider threat to information systems and the effectiveness of ISO17799. Computers & Security, 24(6), 472-484.
 +
 
Cheng, L., Li, Y., Li, W., Holm, E., & Zhai, Q. (2013). Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39, 447-459.
 
Cheng, L., Li, Y., Li, W., Holm, E., & Zhai, Q. (2013). Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39, 447-459.
   −
Theoharidou, M., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2005). The insider threat to information systems and the effectiveness of ISO17799. Computers & Security, 24(6), 472-484.
+
Ifinedo, P. (2014). Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information & Management, 51(1), 69-79
   −
Ifinedo, P. (2014). Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information & Management, 51(1), 69-79
+
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. computers & security, 56, 70-82.
    
== Contributor(s) ==
 
== Contributor(s) ==
Line 49: Line 51:     
== Date last updated ==
 
== Date last updated ==
 +
 +
28th February 2017
13

edits

Navigation menu