default search action
Mario Silic
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j16]Mario Silic, Paul Benjamin Lowry:
Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes. Inf. Syst. Frontiers 23(2): 329-341 (2021) - 2020
- [j15]Mario Silic, Paul Benjamin Lowry:
Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance. J. Manag. Inf. Syst. 37(1): 129-161 (2020)
2010 – 2019
- 2019
- [j14]Mario Silic:
Critical impact of organizational and individual inertia in explaining non-compliant security behavior in the Shadow IT context. Comput. Secur. 80: 108-119 (2019) - 2018
- [j13]Mario Silic, Jordan B. Barlow, Andrea Back:
Evaluating the Role of Trust in Adoption: A Conceptual Replication in the Context of Open Source Systems. AIS Trans. Replication Res. 4: 1 (2018) - [j12]Riccardo Rialti, Giacomo Marzi, Mario Silic, Cristiano Ciappei:
Ambidextrous organization and agility in big data era: The role of business process management systems. Bus. Process. Manag. J. 24(5): 1091-1109 (2018) - [c14]Mario Silic, Mato Njavro, Dario Silic, Goran Oblakovic:
Health Belief Model and Organizational Employee Computer Abuse. HCI (23) 2018: 187-205 - 2017
- [j11]Mario Silic, Jordan B. Barlow, Andrea Back:
A new perspective on neutralization and deterrence: Predicting shadow IT usage. Inf. Manag. 54(8): 1023-1037 (2017) - [j10]Mario Silic, Andrea Back:
Open Source Software Adoption: Lessons from Linux in Munich. IT Prof. 19(1): 42-47 (2017) - [c13]Mario Silic, Mato Njavro, Goran Oblakovic:
Understanding Color Risk Appropriateness: Influence of Color on a User's Decision to Comply with the IT Security Policy - Evidence from the U.S. and India. HCI (24) 2017: 412-423 - [c12]Mario Silic, Andrea Back:
Deterrent Effects of Warnings on User's Behavior in Preventing Malicious Software Use. HICSS 2017: 1-10 - [c11]Mario Silic, Andrea Back:
Impact of Gamification on User's Knowledge-Sharing Practices: Relationships between Work Motivation, Performance Expectancy and Work Engagement. HICSS 2017: 1-10 - [c10]Mario Silic, Dianne Cyr, Andrea Back, Adrian Holzer:
Effects of Color Appeal, Perceived Risk and Culture on User's Decision in Presence of Warning Banner Message. HICSS 2017: 1-10 - 2016
- [j9]Mario Silic, Andrea Back:
The dark side of social networking sites: Understanding phishing risks. Comput. Hum. Behav. 60: 35-43 (2016) - [j8]Mario Silic, Dario Silic, Goran Oblakovic:
Influence of Shadow IT on Innovation in Organizations. Complex Syst. Informatics Model. Q. 8: 68-80 (2016) - [j7]Mario Silic, Andrea Back:
The Influence of Risk Factors in Decision-Making Process for Open Source Software Adoption. Int. J. Inf. Technol. Decis. Mak. 15(1): 151-186 (2016) - [j6]Mario Silic, Andrea Back:
What are the Keys to a Successful Mobile Payment System? Case of Cytizi: Mobile Payment System. J. Glob. Inf. Manag. 24(3): 1-20 (2016) - [c9]Mario Silic, Dario Silic, Goran Oblakovic:
Shadow IT: Steroids for Innovation. CAiSE Forum 2016: 113-120 - [c8]Mario Silic:
Understanding Colour Impact on Warning Messages: Evidence from US and India. CHI Extended Abstracts 2016: 2954-2960 - [c7]Mario Silic, Dianne Cyr:
Colour Arousal Effect on Users' Decision-Making Processes in the Warning Message Context. HCI (22) 2016: 99-109 - [c6]Mario Silic, Dario Silic, Goran Oblakovic:
Restrictive Deterrence: Impact of Warning Banner Messages on Repeated Low-trust Software Use. ICEIS (2) 2016: 435-442 - 2015
- [j5]Mario Silic, Andrea Back, Dario Silic:
Taxonomy of technological risks of open source software in the enterprise adoption context. Inf. Comput. Secur. 23(5): 570-583 (2015) - [c5]Mario Silic, Andrea Back, Dario Silic:
Atos - Towards Zero Email Company. ECIS 2015 - [c4]Mario Silic, Andrea Back:
Identification and Importance of the Technological Risks of Open Source Software in the Enterprise Adoption Context. Wirtschaftsinformatik 2015: 1163-1176 - 2014
- [j4]Mario Silic, Andrea Back:
Shadow IT - A view from behind the curtain. Comput. Secur. 45: 274-283 (2014) - [j3]Mario Silic, Andrea Back, Thomas Sammer:
Employee Acceptance and Use of Unified Communications and Collaboration in a Cross-Cultural Environment. Int. J. e Collab. 10(2): 1-19 (2014) - [j2]Mario Silic, Andrea Back:
Information security: Critical review and future directions for research. Inf. Manag. Comput. Secur. 22(3): 279-308 (2014) - [c3]Mario Silic, Andrea Back, Christian Ruf:
Mobile contactless payments adoption challenge in the complex network actor ecosystem. Bled eConference 2014: 33 - 2013
- [j1]Mario Silic:
Dual-use open source security software in organizations - Dilemma: Help or hinder? Comput. Secur. 39: 386-395 (2013) - [c2]Mario Silic, Andrea Back:
Organizational Culture Impact on Acceptance and Use of Unified Communications & Collaboration Technology in Organizations. Bled eConference 2013: 28 - [c1]Mario Silic, Andrea Back:
Information Security and Open Source Dual Use Security Software: Trust Paradox. OSS 2013: 194-206
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint