Line 36: |
Line 36: |
| | | |
| == Links from this theory to other theories == | | == Links from this theory to other theories == |
− | N/A
| + | [[Social learning theory]] |
| | | |
| == IS articles that use the theory == | | == IS articles that use the theory == |
| + | Theoharidou, M., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2005). The insider threat to information systems and the effectiveness of ISO17799. Computers & Security, 24(6), 472-484. |
| + | |
| Cheng, L., Li, Y., Li, W., Holm, E., & Zhai, Q. (2013). Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39, 447-459. | | Cheng, L., Li, Y., Li, W., Holm, E., & Zhai, Q. (2013). Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39, 447-459. |
| | | |
− | Theoharidou, M., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2005). The insider threat to information systems and the effectiveness of ISO17799. Computers & Security, 24(6), 472-484.
| + | Ifinedo, P. (2014). Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information & Management, 51(1), 69-79 |
| | | |
− | Ifinedo, P. (2014). Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information & Management, 51(1), 69-79
| + | Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. computers & security, 56, 70-82. |
| | | |
| == Contributor(s) == | | == Contributor(s) == |
Line 49: |
Line 51: |
| | | |
| == Date last updated == | | == Date last updated == |
| + | |
| + | 28th February 2017 |