Neutralization: New insights into the problem of employee information systems security policy violations M Siponen, A Vance MIS quarterly, 487-502, 2010 | 1514 | 2010 |
New directions on agile methods: a comparative analysis P Abrahamsson, J Warsta, MT Siponen, J Ronkainen 25th International Conference on Software Engineering, 2003. Proceedings …, 2003 | 1209 | 2003 |
Motivating IS security compliance: Insights from habit and protection motivation theory A Vance, M Siponen, S Pahnila Information & management 49 (3-4), 190-198, 2012 | 1160 | 2012 |
A conceptual foundation for organizational information security awareness MT Siponen Information management & computer security 8 (1), 31-41, 2000 | 1105 | 2000 |
Improving employees' compliance through information systems security training: an action research study P Puhakainen, M Siponen MIS quarterly, 757-778, 2010 | 987 | 2010 |
Employees’ adherence to information security policies: An exploratory field study M Siponen, MA Mahmood, S Pahnila Information & management 51 (2), 217-224, 2014 | 860 | 2014 |
Employees' behavior towards IS security policy compliance S Pahnila, M Siponen, A Mahmood 2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007 | 766 | 2007 |
Toward a unified model of information security policy compliance GD Moody, M Siponen, S Pahnila MIS quarterly 42 (1), 285-A22, 2018 | 631 | 2018 |
An enhanced fear appeal rhetorical framework AC Johnston, M Warkentin, M Siponen MIS quarterly 39 (1), 113-134, 2015 | 618 | 2015 |
Information security management standards: Problems and solutions M Siponen, R Willison Information & management 46 (5), 267-270, 2009 | 510 | 2009 |
Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning model PB Lowry, J Zhang, C Wang, M Siponen Information Systems Research 27 (4), 962-986, 2016 | 495 | 2016 |
What levels of moral reasoning and values explain adherence to information security rules? An empirical study L Myyry, M Siponen, S Pahnila, T Vartiainen, A Vance European Journal of Information Systems 18 (2), 126-139, 2009 | 446 | 2009 |
Compliance with information security policies: An empirical investigation M Siponen, S Pahnila, MA Mahmood Computer 43 (2), 64-71, 2010 | 445 | 2010 |
A review of information security issues and respective research contributions MT Siponen, H Oinas-Kukkonen ACM SIGMIS Database: the DATABASE for Advances in Information Systems 38 (1 …, 2007 | 402 | 2007 |
An information security meta‐policy for emergent organizations R Baskerville, M Siponen Logistics information management 15 (5/6), 337-346, 2002 | 335 | 2002 |
Five dimensions of information security awareness MT Siponen SIGCAS Comput. Soc. 31 (2), 24-29, 2001 | 328 | 2001 |
Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work GD Moody, M Siponen Information & Management 50 (6), 322-335, 2013 | 294 | 2013 |
Employees’ adherence to information security policies: an empirical study M Siponen, S Pahnila, A Mahmood New Approaches for Security, Privacy and Trust in Complex Environments …, 2007 | 254 | 2007 |
Toward a new meta-theory for designing information systems (IS) security training approaches M Karjalainen, M Siponen Journal of the Association for Information Systems 12 (8), 3, 2011 | 215 | 2011 |
An analysis of the traditional IS security approaches: implications for research and practice MT Siponen European Journal of Information Systems 14 (3), 303-315, 2005 | 215 | 2005 |