Journal of Management Information Systems
Keyword: information security
Keyword Index
List of articles:
Yue, Wei T
and
Çakanyildirim, Metin
Intrusion Prevention in Information Systems: Reactive and Proactive Responses
Journal of Management Information Systems
Vol. 24 No. 1 2007
pp. 329-353
Johnson, M Eric
Information Risk of Inadvertent Disclosure: An Analysis of File-Sharing Risk in the Financial Supply Chain
Journal of Management Information Systems
Vol. 25 No. 2 2008
pp. 97-123
Png, Ivan P L,
Chen-Yu, Wang,
and
Qiu-Hong, Wang
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence
Journal of Management Information Systems
Vol. 25 No. 2 2008
pp. 125-144
Png, Ivan P L
and
Wang, Qiu-Hong
Information Security: Facilitating User Precautions Vis-Ã -Vis Enforcement Against Attackers
Journal of Management Information Systems
Vol. 26 No. 2 2009
pp. 97-121
Cremonini, Marco
and
Nizovtsev, Dmitri
Risks and Benefits of Signaling Information System Characteristics to Strategic Attackers
Journal of Management Information Systems
Vol. 26 No. 3 2009
pp. 241-274
Hui, Kai-Lung,
Hui, Wendy,
and
Yue, Wei T
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
Journal of Management Information Systems
Vol. 29 No. 3 2012
pp. 117-156
Vance, Anthony,
Lowry, Paul Benjamin,
and
Eggett, Dennis
Using Accountability to Reduce Access Policy Violations in Information Systems
Journal of Management Information Systems
Vol. 29 No. 4 2013
pp. 263-290
Zhao, Xia,
Xue, Ling,
and
Whinston, Andrew B
Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements
Journal of Management Information Systems
Vol. 30 No. 1 2013
pp. 123-152
D’Arcy, John,
Herath, Tejaswini,
and
Shoss, Mindy K
Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective
Journal of Management Information Systems
Vol. 31 No. 2 2014
pp. 285-318
Hu, Qing,
West, Robert,
and
Smarandescu, Laura
The Role of Self-Control in Information Security Violations: Insights from a Cognitive Neuroscience Perspective
Journal of Management Information Systems
Vol. 31 No. 4 2015
pp. 6-48
Sen, Ravi
and
Borle, Sharad
Estimating the Contextual Risk of Data Breach: An Empirical Approach
Journal of Management Information Systems
Vol. 32 No. 2 2015
pp. 314-341
Posey, Clay,
Roberts, Tom L,
and
Lowry, Paul Benjamin
The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets
Journal of Management Information Systems
Vol. 32 No. 4 2015
pp. 179-214
Wolff, Josephine
Perverse Effects in Defense of Computer Systems: When More Is Less
Journal of Management Information Systems
Vol. 33 No. 2 2016
pp. 597-620
Jensen, Matthew L,
Dinger, Michael,
Wright, Ryan T,
and
Thatcher, Jason Bennett
Training to Mitigate Phishing Attacks Using Mindfulness Techniques
Journal of Management Information Systems
Vol. 34 No. 2 2017
pp. 597-626
Anderson, Chad,
Baskerville, Richard L,
and
Kaul, Mala
Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information
Journal of Management Information Systems
Vol. 34 No. 4 2017
pp. 1082-1112
Menard, Philip,
Bott, Gregory J,
and
Crossler, Robert E
User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory
Journal of Management Information Systems
Vol. 34 No. 4 2017
pp. 1203-1230
Liu, Che-Wei,
Huang, Peng,
and
Lucas, Henry C
Centralized IT Decision Making and Cybersecurity Breaches: Evidence from U.S. Higher Education Institutions
Journal of Management Information Systems
Vol. 37 No. 3 2020
pp. 758-787
Ng, Ka Chung,
Zhang, Xiaojun,
Thong, James Y L,
and
Tam, Kar Yan
Protecting Against Threats to Information Security: An Attitudinal Ambivalence Perspective
Journal of Management Information Systems
Vol. 38 No. 3 2021
pp. 732-764
Wang, Qian,
Ngai, Eric W T,
Pienta, Daniel,
and
Thatcher, Jason Bennett
Information Technology Innovativeness and Data-Breach Risk: A Longitudinal Study
Journal of Management Information Systems
Vol. 40 No. 4 2023
pp. 1139-1170