Citation Impact
Citing Papers
A Crawler-based Study of Spyware on the Web
2005
Fear Appeals and Information Security Behaviors: An Empirical Study1
2010 Standout
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness1
2010 Standout
Motivating IS security compliance: Insights from Habit and Protection Motivation Theory
2012 Standout
Recalculation of the Critical Values for Lawshe’s Content Validity Ratio
2012 Standout
Protection motivation and deterrence: a framework for security policy compliance in organisations
2009 Standout
Perceived value for customers in information sharing services
2011
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
2011 Standout
Beyond Deterrence: An Expanded View of Employee Computer Abuse1
2013 Standout
Information technology security management concerns in global financial services institutions
2009
How gamification marketing activities motivate desirable consumer behaviors: Focusing on the role of brand love
2018 Standout
Detection and analysis of drive-by-download attacks and malicious JavaScript code
2010 Standout
Generational differences in soft knowledge situations: status, need for recognition, workplace commitment and idealism
2008
Generational differences in the workplace: A review of the evidence and directions for future research
2013 Standout
Works of Mark B. Schmidt being referenced
Personality and IT security: An application of the five-factor model
2006
E-commerce security threats: awareness, trust and practice
2008
A Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness
2008
Spyware
2005
Busting the ghost in the machine
2005