{"id":932,"date":"2021-07-13T19:33:46","date_gmt":"2021-07-13T19:33:46","guid":{"rendered":"http:\/\/library.gito.de\/?p=932"},"modified":"2023-08-02T00:50:44","modified_gmt":"2023-08-01T22:50:44","slug":"wi2020-zentrale-tracks-91","status":"publish","type":"post","link":"https:\/\/library.gito.de\/en\/2021\/07\/wi2020-zentrale-tracks-91\/","title":{"rendered":"WI2020 Zentrale Tracks"},"content":{"rendered":"<p><\/p>\n<div id=\"block-library-content\">\n<div class=\"grid-container full\">\n<div class=\"grid-x grid-padding-x\">\n<div class=\"cell content-sep-index-y large-20 medium-20 small-24 columne-3\">\n<div>\n<div class=\"literatur\">\n<p>1. Kersten, H., Reuter, J., Schr\u00f6der, K.-W.: IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz: der Weg zur Zertifizierung. Springer Vieweg, Wiesbaden (2013).<br \/>\n2. ISO\/IEC 27001:2013 Requirements. International Organization for Standardization (2013).<br \/>\n3. Aurigemma, S., Panko, R.: A composite framework for behavioral compliance with information security policies. In: 2012 45th Hawaii International Conference on System Sciences. pp. 3248\u20133257. IEEE (2012).<br \/>\n4. B\u00e9langer, F., Collignon, S., Enget, K., Negangard, E.: Determinants of early conformance with information security policies. Information &amp; Management. 54, 887\u2013901 (2017).<br \/>\n5. Dang-Pham, D., Pittayachawan, S., Bruno, V.: Why employees share information security advice? Exploring the contributing factors and structural patterns of security advice sharing in the workplace. Computers in Human Behavior. 67, 196\u2013206 (2017).<br \/>\n6. Kaur, J., Mustafa, N.: Examining the effects of knowledge, attitude and behaviour on information security awareness: A case on SME. In: 2013 International Conference on Research and Innovation in Information Systems (ICRIIS). pp. 286\u2013290. IEEE (2013).<br \/>\n7. Kirlappos, I., Beautement, A., Sasse, M.A.: \u201cComply or Die\u201d Is Dead: Long Live Security-Aware Principal Agents. In: Adams, A.A., Brenner, M., and Smith, M. (eds.) Financial Cryptography and Data Security. pp. 70\u201382. Springer Berlin Heidelberg (2013).<br \/>\n8. Kolkowska, E., Karlsson, F., Hedstr\u00f6m, K.: Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method. The Journal of Strategic Information Systems. 26, 39\u201357 (2017).<br \/>\n9. Mahfuth, A., Yussof, S., Baker, A.A., Ali, N.: A systematic literature review: Information security culture. In: 2017 International Conference on Research and Innovation in Information Systems (ICRIIS). pp. 1\u20136. IEEE (2017).<br \/>\n10. Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., Zwaans, T.: The human aspects of information security questionnaire (HAIS-Q): two further validation studies. Computers &amp; Security. 66, 40\u201351 (2017).<br \/>\n11. Safa, N.S., Von Solms, R., Furnell, S.: Information security policy compliance model in organizations. Computers &amp; Security. 56, 70\u201382 (2016).<br \/>\n12. Maqousi, A., Balikhina, T., Mackay, M.: An effective method for information security awareness raising initiatives. International Journal of Computer Science &amp; Information Technology. 5, 63 (2013).<br \/>\n13. \u00d6\u011f\u00fct\u00e7\u00fc, G., Testik, \u00d6.M., Chouseinoglou, O.: Analysis of personal information security behavior and awareness. Computers &amp; Security. 56, 83\u201393 (2016).<br \/>\n14. Li, L., He, W., Xu, L., Ivan, A., Anwar, M., Yuan, X.: Does explicit information security policy affect employees\u2019 cyber security behavior? A pilot study. In: 2014 Enterprise Systems Conference. pp. 169\u2013173. IEEE (2014).<br \/>\n15. Tsohou, A., Karyda, M., Kokolakis, S., Kiountouzis, E.: Managing the introduction of information security awareness programmes in organisations. European Journal of Information Systems. 24, 38\u201358 (2015). https:\/\/doi.org\/10.1057\/ejis.2013.27.<br \/>\n16. Ifinedo, P.: Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information &amp; Management. 51, 69\u201379 (2014). https:\/\/doi.org\/10.1016\/j.im.2013.10.001.<br \/>\n17. Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. MIS Quarterly. 34, 523 (2010). https:\/\/doi.org\/10.2307\/25750690.<br \/>\n18. Fagade, T., Tryfonas, T.: Security by compliance? A study of insider threat implications for Nigerian banks. In: International Conference on Human Aspects of Information Security, Privacy, and Trust. pp. 128\u2013139. Springer (2016).<br \/>\n19. Siponen, M.T.: A conceptual foundation for organizational information security awareness. Information Management &amp; Computer Security. 8, 31\u201341 (2000).<br \/>\n20. Bauer, S., Bernroider, E.W.N., Chudzikowski, K.: Prevention is better than cure! Designing information security awareness programs to overcome users\u2019 non-compliance with information security policies in banks. Computers &amp; Security. 68, 145\u2013159 (2017). https:\/\/doi.org\/10.1016\/j.cose.2017.04.009.<br \/>\n21. Topa, I., Karyda, M.: Identifying factors that influence employees\u2019 security behavior for enhancing ISP compliance. In: International Conference on Trust and Privacy in Digital Business. pp. 169\u2013179. Springer (2015).<br \/>\n22. Alotaibi, M., Furnell, S., Clarke, N.: Information security policies: A review of challenges and influencing factors. In: 11th International Conference for Internet Technology and Secured Transactions (2016).<br \/>\n23. Harkins, M.: Managing risk and information security: protect to enable. Springer (2013).<br \/>\n24. Lee, C.H., Geng, X., Raghunathan, S.: Mandatory Standards and Organizational Information Security. Information Systems Research. 27, 70\u201386 (2016). https:\/\/doi.org\/10.1287\/isre.2015.0607.<br \/>\n25. Kolkowska, E., Dhillon, G.: Organizational power and information security rule compliance. Computers &amp; Security. 33, 3\u201311 (2013).<br \/>\n26. Chaudhry, P.E., Chaudhry, S.S., Reese, R., Jones, D.S.: Enterprise information systems security: a conceptual framework. In: Re-Conceptualizing Enterprise Information Systems. pp. 118\u2013128. Springer (2012).<br \/>\n27. Furnell, S.M., Gennatou, M., Dowland, P.S.: A prototype tool for information security awareness and training. Logistics Information Management. 15, 352\u2013357 (2002).<br \/>\n28. Lee, J., Lee, Y.: A holistic model of computer abuse within organizations. Information management &amp; computer security. 10, 57\u201363 (2002).<br \/>\n29. Dang-Pham, D., Pittayachawan, S., Bruno, V.: Exploring behavioral information security networks in an organizational context: An empirical case study. Journal of Information Security and Applications. 34, 46\u201362 (2017). https:\/\/doi.org\/10.1016\/j.jisa.2016.06.002.<br \/>\n30. Hirschi, T.: Causes of delinquency. Routledge (2017).<br \/>\n31. Rogers, R.W.: A Protection Motivation Theory of Fear Appeals and Attitude Change1. The Journal of Psychology. 91, 93\u2013114 (1975). https:\/\/doi.org\/10.1080\/00223980.1975.9915803.<br \/>\n32. Calder, B.J., Staw, B.M.: Self-perception of intrinsic and extrinsic motivation. Journal of Personality and Social Psychology. 31, 599\u2013605 (1975). https:\/\/doi.org\/10.1037\/h0077100.<br \/>\n33. Han, J., Kim, Y.J., Kim, H.: An integrative model of information security policy compliance with psychological contract: Examining a bilateral perspective. Computers &amp; Security. 66, 52\u201365 (2017).<br \/>\n34. Bandura, A.: Self-efficacy mechanism in human agency. American Psychologist. 37, 122\u2013 147 (1982). https:\/\/doi.org\/10.1037\/0003-066X.37.2.122.<br \/>\n35. Compeau, D.R., Higgins, C.A.: Application of Social Cognitive Theory to Training for Computer Skills. Information Systems Research. 6, 118\u2013143 (1995).<br \/>\n36. Scott, J.: Understanding Contemporary Society. Theories of the Present. In: Rational Choice Theory. pp. 126\u2013132 (2000).<br \/>\n37. Beatty, S.E., Homer, P., Kahle, L.A.: The Involvement-Commitment Model: Theory and Implications. Journal of Business Research. 16, 149\u2013167 (1988).<br \/>\n38. Lee, S.M., Lee, S.-G., Yoo, S.: An integrative model of computer abuse based on social control and general deterrence theories. Information &amp; Management. 41, 707\u2013718 (2004).<br \/>\n39. Ajzen, I.: The theory of planned behavior. Organizational Behavior and Human Decision Processes. 50, 179\u2013211 (1991). https:\/\/doi.org\/10.1016\/0749-5978(91)90020-T.<br \/>\n40. Sommestad, T., Hallberg, J.: A review of the theory of planned behaviour in the context of information security policy compliance. In: IFIP International Information Security Conference. pp. 257\u2013271. Springer (2013).<br \/>\n41. Straub, D.W., Welke, R.J.: Coping with Systems Risk: Security Planning Models for Management Decision Making. MIS Quarterly. 22, 441 (1998). https:\/\/doi.org\/10.2307\/249551.<br \/>\n42. Yazdanmehr, A., Wang, J.: Employees\u2019 information security policy compliance: A norm activation perspective. Decision Support Systems. 92, 36\u201346 (2016).<br \/>\n43. Elster, J.: Social Norms and Economic Theory. Journal of Economic Perspectives. 3, 99\u2013 117 (1989). https:\/\/doi.org\/10.1257\/jep.3.4.99.<br \/>\n44. Mayring, P.: Qualitative Inhaltsanalyse. In: Mey, G. and Mruck, K. (eds.) Handbuch Qualitative Forschung in der Psychologie. pp. 601\u2013613. VS Verlag f\u00fcr Sozialwissenschaften, Wiesbaden (2010). https:\/\/doi.org\/10.1007\/978-3-531-92052-8_42.<br \/>\n45. Neuendorf, K.A.: The Content Analysis Guidebook. Sage (2016).<br \/>\n46. Hu, Q., Dinev, T., Hart, P., Cooke, D.: Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture*: Managing Employee Compliance with Information Security Policies. Decision Sciences. 43, 615\u2013660 (2012). https:\/\/doi.org\/10.1111\/j.1540-5915.2012.00361.x.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>1. Kersten, H., Reuter, J., Schr\u00f6der, K.-W.: IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz: der Weg zur Zertifizierung. Springer Vieweg, Wiesbaden (2013). 2. ISO\/IEC 27001:2013 Requirements. International Organization for Standardization (2013). 3. Aurigemma, S., Panko, R.: A composite framework for behavioral compliance with information security policies. In: 2012 45th Hawaii International Conference on System Sciences. pp.&hellip; <a class=\"more-link\" href=\"https:\/\/library.gito.de\/en\/2021\/07\/wi2020-zentrale-tracks-91\/\">Continue reading <span class=\"screen-reader-text\">WI2020 Zentrale Tracks<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[13],"tags":[],"class_list":["post-932","post","type-post","status-publish","format-standard","hentry","category-b","entry"],"acf":[],"_links":{"self":[{"href":"https:\/\/library.gito.de\/en\/wp-json\/wp\/v2\/posts\/932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/library.gito.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/library.gito.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/library.gito.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/library.gito.de\/en\/wp-json\/wp\/v2\/comments?post=932"}],"version-history":[{"count":2,"href":"https:\/\/library.gito.de\/en\/wp-json\/wp\/v2\/posts\/932\/revisions"}],"predecessor-version":[{"id":3801,"href":"https:\/\/library.gito.de\/en\/wp-json\/wp\/v2\/posts\/932\/revisions\/3801"}],"wp:attachment":[{"href":"https:\/\/library.gito.de\/en\/wp-json\/wp\/v2\/media?parent=932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/library.gito.de\/en\/wp-json\/wp\/v2\/categories?post=932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/library.gito.de\/en\/wp-json\/wp\/v2\/tags?post=932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}