共 72 条
- [1] Al-Khouri A.M., Data ownership: Who owns “my data”?, International Journal of Management & Information Technology, 2, 1, pp. 1-8, (2012)
- [2] Alvesson M., Sandberg J., Generating research questions through problematization, Academy of Management Review, 36, 2, pp. 247-271, (2011)
- [3] Baskerville R.L., Myers M.D., Information systems as a reference discipline, MIS Quarterly, 26, 1, pp. 1-14, (2002)
- [4] Boss S.R., Galletta D.F., Lowry P.B., Moody G.D., Polak P., What do users have to fear? Using fear appeals to engender threats and fear that motivate protective behaviors in users, MIS Quarterly, 39, 4, pp. 837-864, (2015)
- [5] Carrier L.M., Prashler H., Attentional limits in memory retrieval, Journal of Experimental Psychology: Learning Memory and Cognition, 21, 5, pp. 1339-1348, (1995)
- [6] Christian J.S., Ellis A.P.J., The crucial role of turnover intentions in transforming moral disengagement into deviant behavior at work, Journal of Business Ethics, 119, 2, pp. 193-208, (2014)
- [7] Corbin J., Strauss A., Grounded theory method: Procedures, canons, and evaluative criteria, Qualitative Sociology, 13, 1, pp. 3-21, (1990)
- [8] Crossler R.E., Johnston A.C., Lowry P.B., Hu Q., Warkentin M., Baskerville R., Future directions for behavioral information security research, Computers & Security, 32, pp. 90-101, (2013)
- [9] D'arcy J., Herath T., Shoss M.K., Understanding employee responses to stressful information security requirements: A coping perspective, Journal of Management Information Systems, 31, 2, pp. 285-318, (2014)
- [10] Das E.H.H.J., De Wit J.B.F., Stroebe W., Fear appeals motivate acceptance of action recommendations: Evidence for a positive bias in the processing of persuasive messages, Personality and Social Psychology Bulletin, 29, 5, pp. 650-664, (2003)