Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "Mikko T. Siponen"
@article{DBLP:journals/compsec/AyaburiALS24, author = {Emmanuel W. Ayaburi and Francis Kofi Andoh{-}Baidoo and Jaeung Lee and Mikko T. Siponen}, title = {Investigating the use of protective technologies after data breach: The roles of psychological distance, technological service type and organizational justice}, journal = {Comput. Secur.}, volume = {143}, pages = {103900}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103900}, doi = {10.1016/J.COSE.2024.103900}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AyaburiALS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WoodsS24, author = {Naomi Woods and Mikko T. Siponen}, title = {How memory anxiety can influence password security behavior}, journal = {Comput. Secur.}, volume = {137}, pages = {103589}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103589}, doi = {10.1016/J.COSE.2023.103589}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WoodsS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XieSLMZ24, author = {Yitian Xie and Mikko T. Siponen and Gabriella Laatikainen and Gregory D. Moody and Xiaosong Zheng}, title = {Testing the dominant mediator in {EPPM:} An empirical study on household anti-malware software users}, journal = {Comput. Secur.}, volume = {140}, pages = {103776}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103776}, doi = {10.1016/J.COSE.2024.103776}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XieSLMZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/EbotST24, author = {Alain Claude Tambe Ebot and Mikko T. Siponen and Volkan Topalli}, title = {Towards a cybercontextual transmission model for online scamming}, journal = {Eur. J. Inf. Syst.}, volume = {33}, number = {4}, pages = {571--596}, year = {2024}, url = {https://doi.org/10.1080/0960085x.2023.2210772}, doi = {10.1080/0960085X.2023.2210772}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejis/EbotST24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/SiponenKX24, author = {Mikko T. Siponen and Tuula Klaavuniemi and Quan Xiao}, title = {Splitting versus lumping: narrowing a theory's scope may increase its value}, journal = {Eur. J. Inf. Syst.}, volume = {33}, number = {4}, pages = {561--570}, year = {2024}, url = {https://doi.org/10.1080/0960085x.2023.2208380}, doi = {10.1080/0960085X.2023.2208380}, timestamp = {Fri, 16 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejis/SiponenKX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/AndohBaidooOASG24, author = {Francis Kofi Andoh{-}Baidoo and Martin Otu Offei and Emmanuel W. Ayaburi and Mikko T. Siponen and Pavel Gladyshev}, title = {How Do Real Cybercrime Syndicates Operate?: The Case of Online Romance Fraud Syndicates}, journal = {{IEEE} Secur. Priv.}, volume = {22}, number = {4}, pages = {124--128}, year = {2024}, url = {https://doi.org/10.1109/MSEC.2024.3401288}, doi = {10.1109/MSEC.2024.3401288}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/AndohBaidooOASG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/ShaikhS24, author = {Faheem Ahmed Shaikh and Mikko T. Siponen}, title = {Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions}, journal = {Inf. Syst. Frontiers}, volume = {26}, number = {3}, pages = {1109--1120}, year = {2024}, url = {https://doi.org/10.1007/s10796-023-10404-7}, doi = {10.1007/S10796-023-10404-7}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/ShaikhS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/ZhaoJS24, author = {Weijie Zhao and Allen C. Johnston and Mikko T. Siponen}, editor = {Michelle Carter and Kelly J. Fadel and Thomas O. Meservy and Deborah J. Armstrong and Amit Deokar and Matthew L. Jensen}, title = {Intuition or Analysis? Investigation of Employees' Cognitive Mode of Information Security Policy Compliance}, booktitle = {30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, {AMCIS} 2024, Salt Lake City, UT, USA, August 15-17, 2024}, publisher = {Association for Information Systems}, year = {2024}, url = {https://aisel.aisnet.org/amcis2024/security/security/23}, timestamp = {Mon, 22 Jul 2024 14:42:57 +0200}, biburl = {https://dblp.org/rec/conf/amcis/ZhaoJS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/Siponen24, author = {Mikko T. Siponen}, editor = {Tung X. Bui}, title = {Stage Theorizing in Behavioral Information Systems Security Research}, booktitle = {57th Hawaii International Conference on System Sciences, {HICSS} 2024, Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January 3-6, 2024}, pages = {4724--4733}, publisher = {ScholarSpace}, year = {2024}, url = {https://hdl.handle.net/10125/106952}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/Siponen24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/MaoSN23, author = {Mingsong Mao and Mikko T. Siponen and Marco Nathan}, title = {Popperian Falsificationism in {IS:} Major Confusions and Harmful Influences}, journal = {Commun. Assoc. Inf. Syst.}, volume = {53}, pages = {34}, year = {2023}, url = {https://aisel.aisnet.org/cais/vol53/iss1/34}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cais/MaoSN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/SiponenRLHL23, author = {Mikko T. Siponen and Mikko R{\"{o}}nkk{\"{o}} and Fufan Liu and Steffi Haag and Gabriella Laatikainen}, title = {Protection Motivation Theory in Information Security Behavior Research: Reconsidering the Fundamentals}, journal = {Commun. Assoc. Inf. Syst.}, volume = {53}, pages = {47}, year = {2023}, url = {https://aisel.aisnet.org/cais/vol53/iss1/47}, timestamp = {Mon, 01 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cais/SiponenRLHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JohnstonGBCSWS23, author = {Allen C. Johnston and Paul Michael Di Gangi and France B{\'{e}}langer and Robert E. Crossler and Mikko T. Siponen and Merrill Warkentin and Tripti Singh}, title = {Seeking rhetorical validity in fear appeal research: An application of rhetorical theory}, journal = {Comput. Secur.}, volume = {125}, pages = {103020}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103020}, doi = {10.1016/J.COSE.2022.103020}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/JohnstonGBCSWS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShaikhS23, author = {Faheem Ahmed Shaikh and Mikko T. Siponen}, title = {Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity}, journal = {Comput. Secur.}, volume = {124}, pages = {102974}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102974}, doi = {10.1016/J.COSE.2022.102974}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShaikhS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/JiangST23, author = {Hemin Jiang and Mikko T. Siponen and Aggeliki Tsohou}, title = {Personal use of technology at work: a literature review and a theoretical model for understanding how it affects employee job performance}, journal = {Eur. J. Inf. Syst.}, volume = {32}, number = {2}, pages = {331--345}, year = {2023}, url = {https://doi.org/10.1080/0960085x.2021.1963193}, doi = {10.1080/0960085X.2021.1963193}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejis/JiangST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/ShaoJSCH23, author = {Xiuyan Shao and Hemin Jiang and Mikko T. Siponen and Cong Cao and Xiaohua Huang}, title = {"Unus pro omnibus, omnes pro uno": understanding unauthorised file sharing in online communities from a public goods contribution perspective}, journal = {Internet Res.}, volume = {33}, number = {3}, pages = {1114--1133}, year = {2023}, url = {https://doi.org/10.1108/INTR-11-2021-0808}, doi = {10.1108/INTR-11-2021-0808}, timestamp = {Tue, 11 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/intr/ShaoJSCH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/PaananenS23, author = {Hanna Paananen and Mikko T. Siponen}, editor = {Rahul De' and Souren Paul and Suprateek Sarker and Virpi Kristiina Tuunainen and Walter D. Fern{\'{a}}ndez and Joe Nandhakumar and Radhika Santhanam}, title = {Organization Members Developing Information Security Policies: a Case Study}, booktitle = {Proceedings of the 44th International Conference on Information Systems, {ICIS} 2023, Rising Like a Phoenix: Emerging from the Pandemic and Reshaping Human Endeavors with Digital Technologies, Hyderrabad, India, December 10-13, 2023}, publisher = {Association for Information Systems}, year = {2023}, url = {https://aisel.aisnet.org/icis2023/cyber\_security/cyber\_security/14}, timestamp = {Mon, 22 Jul 2024 11:13:28 +0200}, biburl = {https://dblp.org/rec/conf/icis/PaananenS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pacis/2023, editor = {Patrick Chau and Jack Jing and Mikko T. Siponen and Andrew Burton{-}Jones and Chuan{-}Hoo Tan and Bo Sophia Xiao}, title = {27th Pacific Asia Conference on Information Systems, {PACIS} 2023, Nanchang, China, July 9-12, 2023}, year = {2023}, url = {http://aisel.aisnet.org/pacis2023/}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pacis/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/behaviourIT/XinSC22, author = {Tong Xin and Mikko T. Siponen and Sihua Chen}, title = {Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats}, journal = {Behav. Inf. Technol.}, volume = {41}, number = {13}, pages = {2835--2859}, year = {2022}, url = {https://doi.org/10.1080/0144929x.2021.1954242}, doi = {10.1080/0144929X.2021.1954242}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/behaviourIT/XinSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/SiponenSV22, author = {Mikko T. Siponen and Wael Soliman and Anthony Vance}, title = {Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions}, journal = {Data Base}, volume = {53}, number = {1}, pages = {25--60}, year = {2022}, url = {https://doi.org/10.1145/3514097.3514101}, doi = {10.1145/3514097.3514101}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/SiponenSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/XieSMZ22, author = {Yitian Xie and Mikko T. Siponen and Greg D. Moody and Xiaosong Zheng}, title = {Discovering the interplay between defensive avoidance and continued use intention of anti-malware software among experienced home users: {A} moderated mediation model}, journal = {Inf. Manag.}, volume = {59}, number = {2}, pages = {103586}, year = {2022}, url = {https://doi.org/10.1016/j.im.2021.103586}, doi = {10.1016/J.IM.2021.103586}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/XieSMZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LiXS22, author = {Ying Li and Tong Xin and Mikko T. Siponen}, title = {Citizens' Cybersecurity Behavior: Some Major Challenges}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {1}, pages = {54--61}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2021.3117371}, doi = {10.1109/MSEC.2021.3117371}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/LiXS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/XiaoSZLCM22, author = {Quan Xiao and Mikko T. Siponen and Xing Zhang and Fucai Lu and Sihua Chen and Mingsong Mao}, title = {Impacts of platform design on consumer commitment and online review intention: does use context matter in dual-platform e-commerce?}, journal = {Internet Res.}, volume = {32}, number = {5}, pages = {1496--1531}, year = {2022}, url = {https://doi.org/10.1108/INTR-03-2021-0152}, doi = {10.1108/INTR-03-2021-0152}, timestamp = {Wed, 26 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/intr/XiaoSZLCM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/SolimanS22, author = {Wael Soliman and Mikko T. Siponen}, title = {What Do We Really Mean by Rigor in Information Systems Research?}, booktitle = {55th Hawaii International Conference on System Sciences, {HICSS} 2022, Virtual Event / Maui, Hawaii, USA, January 4-7, 2022}, pages = {1--10}, publisher = {ScholarSpace}, year = {2022}, url = {http://hdl.handle.net/10125/80137}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/SolimanS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/HaagSL21, author = {Steffi Haag and Mikko T. Siponen and Fufan Liu}, title = {Protection Motivation Theory in Information Systems Security Research: {A} Review of the Past and a Road Map for the Future}, journal = {Data Base}, volume = {52}, number = {2}, pages = {25--67}, year = {2021}, url = {https://doi.org/10.1145/3462766.3462770}, doi = {10.1145/3462766.3462770}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/db/HaagSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/SiponenSH21, author = {Mikko T. Siponen and Wael Soliman and Philipp Holtkamp}, title = {Research Perspectives: Reconsidering the Role of Research Method Guidelines for Interpretive, Mixed Methods, and Design Science Research}, journal = {J. Assoc. Inf. Syst.}, volume = {22}, number = {4}, pages = {1}, year = {2021}, url = {https://aisel.aisnet.org/jais/vol22/iss4/1}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/SiponenSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/ChenXHMSQX21, author = {Sihua Chen and Hua Xiao and Wei He and Jian Mou and Mikko T. Siponen and Han Qiu and Feng Xu}, title = {Determinants of Individual Knowledge Innovation Behavior: {A} Perspective of Emotion, Knowledge Sharing, and Trust}, journal = {J. Organ. End User Comput.}, volume = {33}, number = {6}, pages = {1--24}, year = {2021}, url = {https://doi.org/10.4018/joeuc.20211101.oa27}, doi = {10.4018/JOEUC.20211101.OA27}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joeuc/ChenXHMSQX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/misq/SanyalMS21, author = {Pallab Sanyal and Nirup M. Menon and Mikko T. Siponen}, title = {An Empirical Examination of the Economics of Mobile Application Security}, journal = {{MIS} Q.}, volume = {45}, number = {4}, pages = {2235--2260}, year = {2021}, url = {https://doi.org/10.25300/misq/2021/15315}, doi = {10.25300/MISQ/2021/15315}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/misq/SanyalMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/EjiguSA21, author = {Kibrom Tadesse Ejigu and Mikko T. Siponen and Tilahun Muluneh Arage}, editor = {Yolande E. Chan and Maric Boudreau and Benoit Aubert and Guy Par{\'{e}} and Wynne Chin}, title = {Investigating the Impact of Organizational Culture on Information Security Policy Compliance: The Case of Ethiopia}, booktitle = {27th Americas Conference on Information Systems, {AMCIS} 2021, Virtual Conference, August 9-13, 2021}, publisher = {Association for Information Systems}, year = {2021}, url = {https://aisel.aisnet.org/amcis2021/info\_security/info\_security/10}, timestamp = {Mon, 30 Aug 2021 12:04:20 +0200}, biburl = {https://dblp.org/rec/conf/amcis/EjiguSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desrist/SiponenK21, author = {Mikko T. Siponen and Tuula Klaavuniemi}, editor = {Leona Chandra Kruse and Stefan Seidel and Geir Inge Hausvik}, title = {The Primary Scientific Contribution is Hardly a Theory in Design Science Research}, booktitle = {The Next Wave of Sociotechnical Design - 16th International Conference on Design Science Research in Information Systems and Technology, {DESRIST} 2021, Kristiansand, Norway, August 4-6, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12807}, pages = {137--146}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-82405-1\_16}, doi = {10.1007/978-3-030-82405-1\_16}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desrist/SiponenK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/EjiguSM21, author = {Kibrom Ejigu and Mikko T. Siponen and Tilahun Muluneh}, editor = {Doug Vogel and Kathy Ning Shen and Pan Shan Ling and M. N. Ravishankar and Jacky Xi Zhang}, title = {Influence of Organizational Culture on Employees Information Security Policy Compliance in Ethiopian Companies}, booktitle = {25th Pacific Asia Conference on Information Systems, {PACIS} 2021, Virtual Event / Dubai, UAE, July 12-14, 2021}, pages = {158}, year = {2021}, url = {https://aisel.aisnet.org/pacis2021/158}, timestamp = {Tue, 20 Sep 2022 19:48:12 +0200}, biburl = {https://dblp.org/rec/conf/pacis/EjiguSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KarjalainenSS20, author = {Mari Karjalainen and Mikko T. Siponen and Suprateek Sarker}, title = {Toward a stage theory of the development of employees' information security behavior}, journal = {Comput. Secur.}, volume = {93}, pages = {101782}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101782}, doi = {10.1016/J.COSE.2020.101782}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KarjalainenSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PaananenLS20, author = {Hanna Paananen and Michael Lapke and Mikko T. Siponen}, title = {State of the art in information security policy development}, journal = {Comput. Secur.}, volume = {88}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101608}, doi = {10.1016/J.COSE.2019.101608}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PaananenLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShaoSL20, author = {Xiuyan Shao and Mikko T. Siponen and Fufan Liu}, title = {Shall we follow? Impact of reputation concern on information security managers' investment decisions}, journal = {Comput. Secur.}, volume = {97}, pages = {101961}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101961}, doi = {10.1016/J.COSE.2020.101961}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShaoSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SiponenPV20, author = {Mikko T. Siponen and Petri Puhakainen and Anthony Vance}, title = {Can individuals' neutralization techniques be overcome? {A} field experiment on password policy}, journal = {Comput. Secur.}, volume = {88}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101617}, doi = {10.1016/J.COSE.2019.101617}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SiponenPV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/MenonS20, author = {Nirup M. Menon and Mikko T. Siponen}, title = {Executives' Commitment to Information Security: Interaction between the Preferred Subordinate Influence Approach {(PSIA)} and Proposal Characteristics}, journal = {Data Base}, volume = {51}, number = {2}, pages = {36--53}, year = {2020}, url = {https://doi.org/10.1145/3400043.3400047}, doi = {10.1145/3400043.3400047}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/MenonS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/VanceSS20, author = {Anthony Vance and Mikko T. Siponen and Detmar W. Straub}, title = {Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures}, journal = {Inf. Manag.}, volume = {57}, number = {4}, pages = {103212}, year = {2020}, url = {https://doi.org/10.1016/j.im.2019.103212}, doi = {10.1016/J.IM.2019.103212}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/VanceSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iando/SiponenK20, author = {Mikko T. Siponen and Tuula Klaavuniemi}, title = {Why is the hypothetico-deductive {(H-D)} method in information systems not an {H-D} method?}, journal = {Inf. Organ.}, volume = {30}, number = {1}, pages = {100287}, year = {2020}, url = {https://doi.org/10.1016/j.infoandorg.2020.100287}, doi = {10.1016/J.INFOANDORG.2020.100287}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iando/SiponenK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/JiangTSL20, author = {Hemin Jiang and Aggeliki Tsohou and Mikko T. Siponen and Ying Li}, title = {Examining the side effects of organizational Internet monitoring on employees}, journal = {Internet Res.}, volume = {30}, number = {6}, pages = {1613--1630}, year = {2020}, url = {https://doi.org/10.1108/INTR-08-2019-0360}, doi = {10.1108/INTR-08-2019-0360}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/intr/JiangTSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/SiponenT20, author = {Mikko T. Siponen and Aggeliki Tsohou}, title = {Demystifying the Influential {IS} Legends of Positivism: Response to Lee's Commentary}, journal = {J. Assoc. Inf. Syst.}, volume = {21}, number = {6}, pages = {1}, year = {2020}, url = {https://doi.org/10.17705/1jais.00650}, doi = {10.17705/1JAIS.00650}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/SiponenT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/SiponenKN20, author = {Mikko T. Siponen and Tuula Klaavuniemi and Marco Nathan}, title = {Mechanistic Explanations and Deliberate Misrepresentations}, booktitle = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020, Maui, Hawaii, USA, January 7-10, 2020}, pages = {1--10}, publisher = {ScholarSpace}, year = {2020}, url = {https://hdl.handle.net/10125/64441}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/SiponenKN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/behaviourIT/LiZS19, author = {Ying Li and Nan (Andy) Zhang and Mikko T. Siponen}, title = {Keeping secure to the end: a long-term perspective to understand employees' consequence-delayed information security violation}, journal = {Behav. Inf. Technol.}, volume = {38}, number = {5}, pages = {435--453}, year = {2019}, url = {https://doi.org/10.1080/0144929X.2018.1539519}, doi = {10.1080/0144929X.2018.1539519}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/behaviourIT/LiZS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsj/JohnstonWDS19, author = {Allen C. Johnston and Merrill Warkentin and Alan R. Dennis and Mikko T. Siponen}, title = {Speak their Language: Designing Effective Messages to Improve Employees' Information Security Decision Making}, journal = {Decis. Sci.}, volume = {50}, number = {2}, pages = {245--284}, year = {2019}, url = {https://doi.org/10.1111/deci.12328}, doi = {10.1111/DECI.12328}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dsj/JohnstonWDS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/WoodsS19, author = {Naomi Woods and Mikko T. Siponen}, title = {Improving password memorability, while not inconveniencing the user}, journal = {Int. J. Hum. Comput. Stud.}, volume = {128}, pages = {61--71}, year = {2019}, url = {https://doi.org/10.1016/j.ijhcs.2019.02.003}, doi = {10.1016/J.IJHCS.2019.02.003}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/WoodsS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isr/KarjalainenSS19, author = {Mari Karjalainen and Suprateek Sarker and Mikko T. Siponen}, title = {Toward a Theory of Information Systems Security Behaviors of Organizational Employees: {A} Dialectical Process Perspective}, journal = {Inf. Syst. Res.}, volume = {30}, number = {2}, pages = {687--704}, year = {2019}, url = {https://doi.org/10.1287/isre.2018.0827}, doi = {10.1287/ISRE.2018.0827}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isr/KarjalainenSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/JiangST19, author = {Hemin Jiang and Mikko T. Siponen and Aggeliki Tsohou}, editor = {Jan vom Brocke and Shirley Gregor and Oliver M{\"{u}}ller}, title = {A field Experiment for Understanding the Unintended Impact of Internet Monitoring on Employees: Policy Satisfaction, Organizational Citizenship behaviour and Work Motivation}, booktitle = {27th European Conference on Information Systems - Information Systems for a Sharing Society, {ECIS} 2019, Stockholm and Uppsala, Sweden, June 8-14, 2019}, year = {2019}, url = {https://aisel.aisnet.org/ecis2019\_rp/107}, timestamp = {Wed, 05 Jun 2019 13:01:12 +0200}, biburl = {https://dblp.org/rec/conf/ecis/JiangST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/MohammadnazarGS19, author = {Hojat Mohammadnazar and Hadi Ghanbari and Mikko T. Siponen}, editor = {Jan vom Brocke and Shirley Gregor and Oliver M{\"{u}}ller}, title = {Moral sensitivity in Information Security Dilemmas}, booktitle = {27th European Conference on Information Systems - Information Systems for a Sharing Society, {ECIS} 2019, Stockholm and Uppsala, Sweden, June 8-14, 2019}, year = {2019}, url = {https://aisel.aisnet.org/ecis2019\_rip/44}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecis/MohammadnazarGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/HoltkampSS19, author = {Philipp Holtkamp and Wael Soliman and Mikko T. Siponen}, editor = {Tung Bui}, title = {Reconsidering the Role of Research Method Guidelines for Qualitative, Mixed-methods, and Design Science Research}, booktitle = {52nd Hawaii International Conference on System Sciences, {HICSS} 2019, Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019}, pages = {1--10}, publisher = {ScholarSpace}, year = {2019}, url = {https://hdl.handle.net/10125/60062}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/HoltkampSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/ShaoSP19, author = {Xiuyan Shao and Mikko T. Siponen and Seppo Pahnila}, editor = {Tung Bui}, title = {To Calculate or To Follow Others: How Do Information Security Managers Make Investment Decisions?}, booktitle = {52nd Hawaii International Conference on System Sciences, {HICSS} 2019, Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019}, pages = {1--10}, publisher = {ScholarSpace}, year = {2019}, url = {https://hdl.handle.net/10125/59926}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/ShaoSP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/SiponenK19, author = {Mikko T. Siponen and Tuula Klaavuniemi}, editor = {Tung Bui}, title = {Narrowing the Theory's or Study's Scope May Increase Practical Relevance}, booktitle = {52nd Hawaii International Conference on System Sciences, {HICSS} 2019, Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019}, pages = {1--10}, publisher = {ScholarSpace}, year = {2019}, url = {https://hdl.handle.net/10125/60060}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/SiponenK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/SiponenK19, author = {Mikko T. Siponen and Tuula Klaavuniemi}, editor = {Helmut Krcmar and Jane Fedorowicz and Wai Fong Boh and Jan Marco Leimeister and Sunil Wattal}, title = {How and Why 'Theory' Is Often Misunderstood in Information Systems Literature}, booktitle = {Proceedings of the 40th International Conference on Information Systems, {ICIS} 2019, Munich, Germany, December 15-18, 2019}, publisher = {Association for Information Systems}, year = {2019}, url = {https://aisel.aisnet.org/icis2019/research\_methods/research\_methods/3}, timestamp = {Tue, 10 Dec 2019 12:03:30 +0100}, biburl = {https://dblp.org/rec/conf/icis/SiponenK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-10913, author = {Pekka Abrahamsson and Nilay V. Oza and Mikko T. Siponen}, title = {Agile Software Development Method, {A} Comparative Review1}, journal = {CoRR}, volume = {abs/1903.10913}, year = {2019}, url = {http://arxiv.org/abs/1903.10913}, eprinttype = {arXiv}, eprint = {1903.10913}, timestamp = {Tue, 02 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-10913.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-07946, author = {Ville Vakkuri and Kai{-}Kristian Kemell and Joni Kultanen and Mikko T. Siponen and Pekka Abrahamsson}, title = {Ethically Aligned Design of Autonomous Systems: Industry viewpoint and an empirical study}, journal = {CoRR}, volume = {abs/1906.07946}, year = {2019}, url = {http://arxiv.org/abs/1906.07946}, eprinttype = {arXiv}, eprint = {1906.07946}, timestamp = {Mon, 24 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-07946.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/GhanbariVS18, author = {Hadi Ghanbari and Tero Vartiainen and Mikko T. Siponen}, title = {Omission of Quality Software Development Practices: {A} Systematic Literature Review}, journal = {{ACM} Comput. Surv.}, volume = {51}, number = {2}, pages = {38:1--38:27}, year = {2018}, url = {https://doi.org/10.1145/3177746}, doi = {10.1145/3177746}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/GhanbariVS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/WoodsS18, author = {Naomi Woods and Mikko T. Siponen}, title = {Too many passwords? How understanding our memory can increase password memorability}, journal = {Int. J. Hum. Comput. Stud.}, volume = {111}, pages = {36--48}, year = {2018}, url = {https://doi.org/10.1016/j.ijhcs.2017.11.002}, doi = {10.1016/J.IJHCS.2017.11.002}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/WoodsS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/SiponenB18, author = {Mikko T. Siponen and Richard L. Baskerville}, title = {Intervention Effect Rates as a Path to Research Relevance: Information Systems Security Example}, journal = {J. Assoc. Inf. Syst.}, volume = {19}, number = {4}, pages = {4}, year = {2018}, url = {https://doi.org/10.17705/1jais.00491}, doi = {10.17705/1JAIS.00491}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/SiponenB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/SiponenT18, author = {Mikko T. Siponen and Aggeliki Tsohou}, title = {Demystifying the Influential {IS} Legends of Positivism}, journal = {J. Assoc. Inf. Syst.}, volume = {19}, number = {7}, pages = {5}, year = {2018}, url = {https://aisel.aisnet.org/jais/vol19/iss7/5}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/SiponenT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jeric/TaipalusSV18, author = {Toni Taipalus and Mikko T. Siponen and Tero Vartiainen}, title = {Errors and Complications in {SQL} Query Formulation}, journal = {{ACM} Trans. Comput. Educ.}, volume = {18}, number = {3}, pages = {15:1--15:29}, year = {2018}, url = {https://doi.org/10.1145/3231712}, doi = {10.1145/3231712}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jeric/TaipalusSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/misq/MoodySP18, author = {Gregory D. Moody and Mikko T. Siponen and Seppo Pahnila}, title = {Toward a Unified Model of Information Security Policy Compliance}, journal = {{MIS} Q.}, volume = {42}, number = {1}, year = {2018}, url = {https://doi.org/10.25300/misq/2018/13853}, doi = {10.25300/MISQ/2018/13853}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/misq/MoodySP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/KinnunenS18, author = {Hanna Kinnunen and Mikko T. Siponen}, editor = {Masaaki Hirano and Michael D. Myers and Kyoichi Kijima and Motonari Tanabu and Dai Senoo}, title = {Developing Organization-Specific Information Security Policies}, booktitle = {22nd Pacific Asia Conference on Information Systems, {PACIS} 2018, Yokohama, Japan, June 26-30, 2018}, pages = {244}, year = {2018}, url = {https://aisel.aisnet.org/pacis2018/244}, timestamp = {Wed, 07 Nov 2018 09:42:06 +0100}, biburl = {https://dblp.org/rec/conf/pacis/KinnunenS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/SiponenK18, author = {Mikko T. Siponen and Tuula Klaavuniemi}, editor = {Masaaki Hirano and Michael D. Myers and Kyoichi Kijima and Motonari Tanabu and Dai Senoo}, title = {Updating the Philosophy of Middle-Range Theories: Implications for {IS}}, booktitle = {22nd Pacific Asia Conference on Information Systems, {PACIS} 2018, Yokohama, Japan, June 26-30, 2018}, pages = {128}, year = {2018}, url = {https://aisel.aisnet.org/pacis2018/128}, timestamp = {Wed, 07 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pacis/SiponenK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/ChatterjeeSS17, author = {Sutirtha Chatterjee and Suprateek Sarker and Mikko T. Siponen}, title = {How Do Mobile ICTs Enable Organizational Fluidity: Toward a Theoretical Framework}, journal = {Inf. Manag.}, volume = {54}, number = {1}, pages = {1--13}, year = {2017}, url = {https://doi.org/10.1016/j.im.2016.03.007}, doi = {10.1016/J.IM.2016.03.007}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/ChatterjeeSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/KhansaKSK17, author = {Lara Khansa and Jungwon Kuem and Mikko T. Siponen and Sung S. Kim}, title = {To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls}, journal = {J. Manag. Inf. Syst.}, volume = {34}, number = {1}, pages = {141--176}, year = {2017}, url = {https://doi.org/10.1080/07421222.2017.1297173}, doi = {10.1080/07421222.2017.1297173}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/KhansaKSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmis/KuemRSK17, author = {Jungwon Kuem and Soumya Ray and Mikko T. Siponen and Sung S. Kim}, title = {What Leads to Prosocial Behaviors on Social Networking Services: {A} Tripartite Model}, journal = {J. Manag. Inf. Syst.}, volume = {34}, number = {1}, pages = {40--70}, year = {2017}, url = {https://doi.org/10.1080/07421222.2017.1296744}, doi = {10.1080/07421222.2017.1296744}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmis/KuemRSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isr/LowryZWS16, author = {Paul Benjamin Lowry and Jun Zhang and Chuang Wang and Mikko T. Siponen}, title = {Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model}, journal = {Inf. Syst. Res.}, volume = {27}, number = {4}, pages = {962--986}, year = {2016}, url = {https://doi.org/10.1287/isre.2016.0671}, doi = {10.1287/ISRE.2016.0671}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isr/LowryZWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/misq/JohnstonWS15, author = {Allen C. Johnston and Merrill Warkentin and Mikko T. Siponen}, title = {An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric}, journal = {{MIS} Q.}, volume = {39}, number = {1}, pages = {113--134}, year = {2015}, url = {https://doi.org/10.25300/misq/2015/39.1.06}, doi = {10.25300/MISQ/2015/39.1.06}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/misq/JohnstonWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/SiponenV14, author = {Mikko T. Siponen and Anthony Vance}, title = {Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations}, journal = {Eur. J. Inf. Syst.}, volume = {23}, number = {3}, pages = {289--305}, year = {2014}, url = {https://doi.org/10.1057/ejis.2012.59}, doi = {10.1057/EJIS.2012.59}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/SiponenV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/SiponenMP14, author = {Mikko T. Siponen and M. Adam Mahmood and Seppo Pahnila}, title = {Employees' adherence to information security policies: An exploratory field study}, journal = {Inf. Manag.}, volume = {51}, number = {2}, pages = {217--224}, year = {2014}, url = {https://doi.org/10.1016/j.im.2013.08.006}, doi = {10.1016/J.IM.2013.08.006}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/SiponenMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/KuemS14, author = {Jungwon Kuem and Mikko T. Siponen}, title = {Short-Time Non-work-related Computing and Creative Performance}, booktitle = {47th Hawaii International Conference on System Sciences, {HICSS} 2014, Waikoloa, HI, USA, January 6-9, 2014}, pages = {3215--3223}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HICSS.2014.398}, doi = {10.1109/HICSS.2014.398}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/KuemS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/EbotS14, author = {Alain Claude Tambe Ebot and Mikko T. Siponen}, editor = {Michael D. Myers and Detmar W. Straub}, title = {Toward a Rational Choice Process Theory of Internet Scamming: The Offender's Perspective}, booktitle = {Proceedings of the International Conference on Information Systems - Building a Better World through Information Systems, {ICIS} 2014, Auckland, New Zealand, December 14-17, 2014}, publisher = {Association for Information Systems}, year = {2014}, url = {http://aisel.aisnet.org/icis2014/proceedings/GeneralIS/16}, timestamp = {Tue, 24 Mar 2015 08:43:46 +0100}, biburl = {https://dblp.org/rec/conf/icis/EbotS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/MoodyS13, author = {Gregory D. Moody and Mikko T. Siponen}, title = {Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work}, journal = {Inf. Manag.}, volume = {50}, number = {6}, pages = {322--335}, year = {2013}, url = {https://doi.org/10.1016/j.im.2013.04.005}, doi = {10.1016/J.IM.2013.04.005}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/MoodyS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/LeiviskaS13, author = {Katja Leivisk{\"{a}} and Mikko T. Siponen}, title = {Understanding Why {IS} Students Drop Out: Toward {A} Process Theory}, booktitle = {21st European Conference on Information Systems, {ECIS} 2013, Utrecht, The Netherlands, June 5-8, 2013}, pages = {62}, year = {2013}, url = {http://aisel.aisnet.org/ecis2013\_cr/62}, timestamp = {Mon, 05 Dec 2016 15:14:00 +0100}, biburl = {https://dblp.org/rec/conf/ecis/LeiviskaS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/KarjalainenSPS13, author = {Mari Karjalainen and Mikko T. Siponen and Petri Puhakainen and Suprateek Sarker}, editor = {Jae{-}Nam Lee and Ji{-}Ye Mao and James Y. L. Thong}, title = {One Size Does Not Fit All: Different Cultures Require Different Information Systems Security Interventions}, booktitle = {17th Pacific Asia Conference on Information Systems, {PACIS} 2013, Jeju Island, Korea, June 18-22, 2013}, pages = {98}, year = {2013}, url = {http://aisel.aisnet.org/pacis2013/98}, timestamp = {Tue, 08 Apr 2014 14:41:43 +0200}, biburl = {https://dblp.org/rec/conf/pacis/KarjalainenSPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/PahnilaKS13, author = {Seppo Pahnila and Mari Karjalainen and Mikko T. Siponen}, editor = {Jae{-}Nam Lee and Ji{-}Ye Mao and James Y. L. Thong}, title = {Information Security Behavior: Towards Multi-Stage Models}, booktitle = {17th Pacific Asia Conference on Information Systems, {PACIS} 2013, Jeju Island, Korea, June 18-22, 2013}, pages = {102}, year = {2013}, url = {http://aisel.aisnet.org/pacis2013/102}, timestamp = {Tue, 08 Apr 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pacis/PahnilaKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/SiponenVW12, author = {Mikko T. Siponen and Anthony Vance and Robert Willison}, title = {New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs}, journal = {Inf. Manag.}, volume = {49}, number = {7-8}, pages = {334--341}, year = {2012}, url = {https://doi.org/10.1016/j.im.2012.06.004}, doi = {10.1016/J.IM.2012.06.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/SiponenVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/VanceSP12, author = {Anthony Vance and Mikko T. Siponen and Seppo Pahnila}, title = {Motivating {IS} security compliance: Insights from Habit and Protection Motivation Theory}, journal = {Inf. Manag.}, volume = {49}, number = {3-4}, pages = {190--198}, year = {2012}, url = {https://doi.org/10.1016/j.im.2012.04.002}, doi = {10.1016/J.IM.2012.04.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/VanceSP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocec/MahmoodSLV12, author = {Mo Adam Mahmood and Mikko T. Siponen and Francisco J. L{\'{o}}pez and Anthony Vance}, title = {Measuring Electronic Commerce Technology-Enabled Business Value: An Empirical Investigation}, journal = {J. Organ. Comput. Electron. Commer.}, volume = {22}, number = {3}, pages = {256--279}, year = {2012}, url = {https://doi.org/10.1080/10919392.2012.696947}, doi = {10.1080/10919392.2012.696947}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jocec/MahmoodSLV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/VanceS12, author = {Anthony Vance and Mikko T. Siponen}, title = {{IS} Security Policy Violations: {A} Rational Choice Perspective}, journal = {J. Organ. End User Comput.}, volume = {24}, number = {1}, pages = {21--41}, year = {2012}, url = {https://doi.org/10.4018/joeuc.2012010102}, doi = {10.4018/JOEUC.2012010102}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joeuc/VanceS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/LowryRMS12, author = {Paul Benjamin Lowry and Kamel Rouibah and Greg D. Moody and Mikko T. Siponen}, editor = {Shan L. Pan and Tru H. Cao}, title = {Towards {A} Cross-Cultural Model Of Online Whistle-Blowing Systems Use}, booktitle = {16th Pacific Asia Conference on Information Systems, {PACIS} 2012, Ho Chi Minh City, Vietnam, 11-15 July 2012}, pages = {147}, year = {2012}, url = {http://aisel.aisnet.org/pacis2012/147}, timestamp = {Wed, 30 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pacis/LowryRMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/VartiainenS12, author = {Tero Vartiainen and Mikko T. Siponen}, editor = {Shan L. Pan and Tru H. Cao}, title = {What Makes Information System Developers Produce Defective Information Systems For Their Clients?}, booktitle = {16th Pacific Asia Conference on Information Systems, {PACIS} 2012, Ho Chi Minh City, Vietnam, 11-15 July 2012}, pages = {107}, year = {2012}, url = {http://aisel.aisnet.org/pacis2012/107}, timestamp = {Wed, 30 Jan 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pacis/VartiainenS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/KarjalainenS11, author = {Mari Karjalainen and Mikko T. Siponen}, title = {Toward a New Meta-Theory for Designing Information Systems {(IS)} Security Training Approaches}, journal = {J. Assoc. Inf. Syst.}, volume = {12}, number = {8}, pages = {3}, year = {2011}, url = {https://doi.org/10.17705/1jais.00274}, doi = {10.17705/1JAIS.00274}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/KarjalainenS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisedu/VartiainenSM11, author = {Tero Vartiainen and Mikko T. Siponen and Liisa Myyry}, title = {The Effects of Teaching the Universality Thesis on Students' Integrative Complexity of Thought}, journal = {J. Inf. Syst. Educ.}, volume = {22}, number = {3}, pages = {261}, year = {2011}, url = {https://jise.org/Volume22/n3/JISEv22n3p261.html}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisedu/VartiainenSM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pajais/PahnilaSZ11, author = {Seppo Pahnila and Mikko T. Siponen and Xiaosong Zheng}, title = {Integrating Habit into {UTAUT:} The Chinese eBay Case}, journal = {Pac. Asia J. Assoc. Inf. Syst.}, volume = {3}, number = {2}, pages = {2}, year = {2011}, url = {https://aisel.aisnet.org/pajais/vol3/iss2/2}, timestamp = {Thu, 24 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pajais/PahnilaSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/LiS11, author = {Ying Li and Mikko T. Siponen}, editor = {Peter B. Seddon and Shirley Gregor}, title = {A Call For Research On Home Users' Information Security Behaviour}, booktitle = {Pacific Asia Conference on Information Systems, {PACIS} 2011: Quality Research in Pacific Asia, Brisbane, Queensland, Australia, 7-11 July 2011}, pages = {112}, publisher = {Queensland University of Technology}, year = {2011}, url = {http://aisel.aisnet.org/pacis2011/112}, timestamp = {Wed, 12 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pacis/LiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/VartiainenSM11, author = {Tero Vartiainen and Mikko T. Siponen and Gregory D. Moody}, editor = {Peter B. Seddon and Shirley Gregor}, title = {Gray-Area Phenomenon In Information Systems Development: {A} Call For Research}, booktitle = {Pacific Asia Conference on Information Systems, {PACIS} 2011: Quality Research in Pacific Asia, Brisbane, Queensland, Australia, 7-11 July 2011}, pages = {198}, publisher = {Queensland University of Technology}, year = {2011}, url = {http://aisel.aisnet.org/pacis2011/198}, timestamp = {Wed, 30 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pacis/VartiainenSM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SiponenPM10, author = {Mikko T. Siponen and Seppo Pahnila and M. Adam Mahmood}, title = {Compliance with Information Security Policies: An Empirical Investigation}, journal = {Computer}, volume = {43}, number = {2}, pages = {64--71}, year = {2010}, url = {https://doi.org/10.1109/MC.2010.35}, doi = {10.1109/MC.2010.35}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/SiponenPM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisedu/VartiainenS10, author = {Tero Vartiainen and Mikko T. Siponen}, title = {On {IS} Students' Intentions to Use Theories of Ethics in Resolving Moral Conflicts}, journal = {J. Inf. Syst. Educ.}, volume = {21}, number = {1}, pages = {33--42}, year = {2010}, url = {https://jise.org/Volume21/n1/JISEv21n1p33.html}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisedu/VartiainenS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/misq/PuhakainenS10, author = {Petri Puhakainen and Mikko T. Siponen}, title = {Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study}, journal = {{MIS} Q.}, volume = {34}, number = {4}, pages = {757--778}, year = {2010}, url = {http://misq.org/improving-employees-compliance-through-information-systems-security-training-an-action-research-study.html}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/misq/PuhakainenS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/misq/SipponenV10, author = {Mikko T. Siponen and Anthony Vance}, title = {Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations}, journal = {{MIS} Q.}, volume = {34}, number = {3}, pages = {487--502}, year = {2010}, url = {http://misq.org/neutralization-new-insights-into-the-problem-of-employee-systems-security-policy-violations.html}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/misq/SipponenV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigcas/LeiviskaS10, author = {Katja Leivisk{\"{a}} and Mikko T. Siponen}, title = {Attitudes of sixth form female students toward the {IT} field}, journal = {{SIGCAS} Comput. Soc.}, volume = {40}, number = {1}, pages = {34--49}, year = {2010}, url = {https://doi.org/10.1145/1750888.1750893}, doi = {10.1145/1750888.1750893}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigcas/LeiviskaS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/PahnilaS10, author = {Seppo Pahnila and Mikko T. Siponen}, title = {Implementation Intentions Explain How a Behavior Becomes Habitual: The Use of Online Newspapers}, booktitle = {43rd Hawaii International International Conference on Systems Science {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI, {USA}}, pages = {1--11}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HICSS.2010.222}, doi = {10.1109/HICSS.2010.222}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/PahnilaS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/SiponenVW10, author = {Mikko T. Siponen and Anthony Vance and Robert Willison}, title = {New Insights for an Old Problem: Explaining Software Piracy through Neutralization Theory}, booktitle = {43rd Hawaii International International Conference on Systems Science {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI, {USA}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HICSS.2010.287}, doi = {10.1109/HICSS.2010.287}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/SiponenVW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/AbrahamssonOS10, author = {Pekka Abrahamsson and Nilay V. Oza and Mikko T. Siponen}, editor = {Torgeir Dings{\o}yr and Tore Dyb{\aa} and Nils Brede Moe}, title = {Agile Software Development Methods: {A} Comparative Review\({}^{\mbox{1}}\)}, booktitle = {Agile Software Development - Current Research and Future Directions}, pages = {31--59}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12575-1\_3}, doi = {10.1007/978-3-642-12575-1\_3}, timestamp = {Fri, 27 Mar 2020 08:31:58 +0100}, biburl = {https://dblp.org/rec/books/daglib/p/AbrahamssonOS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/SiponenMP09, author = {Mikko T. Siponen and M. Adam Mahmood and Seppo Pahnila}, title = {Technical opinion - Are employees putting your company at risk by not following information security policies?}, journal = {Commun. {ACM}}, volume = {52}, number = {12}, pages = {145--147}, year = {2009}, url = {https://doi.org/10.1145/1610252.1610289}, doi = {10.1145/1610252.1610289}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/SiponenMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/WillisonS09, author = {Robert Willison and Mikko T. Siponen}, title = {Overcoming the insider: reducing employee computer crime through Situational Crime Prevention}, journal = {Commun. {ACM}}, volume = {52}, number = {9}, pages = {133--137}, year = {2009}, url = {https://doi.org/10.1145/1562164.1562198}, doi = {10.1145/1562164.1562198}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/WillisonS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/MyyrySPVV09, author = {Liisa Myyry and Mikko T. Siponen and Seppo Pahnila and Tero Vartiainen and Anthony Vance}, title = {What levels of moral reasoning and values explain adherence to information security rules? An empirical study}, journal = {Eur. J. Inf. Syst.}, volume = {18}, number = {2}, pages = {126--139}, year = {2009}, url = {https://doi.org/10.1057/ejis.2009.10}, doi = {10.1057/EJIS.2009.10}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/MyyrySPVV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/SiponenW09, author = {Mikko T. Siponen and Robert Willison}, title = {Information security management standards: Problems and solutions}, journal = {Inf. Manag.}, volume = {46}, number = {5}, pages = {267--270}, year = {2009}, url = {https://doi.org/10.1016/j.im.2008.12.007}, doi = {10.1016/J.IM.2008.12.007}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/SiponenW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/SiponenH08, author = {Mikko T. Siponen and Juhani Heikka}, title = {Do secure information system design methods provide adequate modeling support?}, journal = {Inf. Softw. Technol.}, volume = {50}, number = {9-10}, pages = {1035--1053}, year = {2008}, url = {https://doi.org/10.1016/j.infsof.2007.10.011}, doi = {10.1016/J.INFSOF.2007.10.011}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/infsof/SiponenH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/WillisonS08, author = {Robert Willison and Mikko T. Siponen}, title = {Software Piracy: Original Insights from a Criminological Perspective}, booktitle = {41st Hawaii International International Conference on Systems Science {(HICSS-41} 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, {USA}}, pages = {266}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HICSS.2008.407}, doi = {10.1109/HICSS.2008.407}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/WillisonS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/SiponenWB08, author = {Mikko T. Siponen and Robert Willison and Richard L. Baskerville}, title = {Power and Practice in Information Systems Security Research}, booktitle = {Proceedings of the International Conference on Information Systems, {ICIS} 2008, Paris, France, December 14-17, 2008}, pages = {26}, publisher = {Association for Information Systems}, year = {2008}, url = {http://aisel.aisnet.org/icis2008/26}, timestamp = {Wed, 30 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icis/SiponenWB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/db/SiponenO07, author = {Mikko T. Siponen and Harri Oinas{-}Kukkonen}, title = {A review of information security issues and respective research contributions}, journal = {Data Base}, volume = {38}, number = {1}, pages = {60--80}, year = {2007}, url = {https://doi.org/10.1145/1216218.1216224}, doi = {10.1145/1216218.1216224}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/db/SiponenO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigcas/SiponenV07, author = {Mikko T. Siponen and Tero Vartiainen}, title = {Unauthorized copying of software: an empirical study of reasons for and against}, journal = {{SIGCAS} Comput. Soc.}, volume = {37}, number = {1}, pages = {30--43}, year = {2007}, url = {https://doi.org/10.1145/1273353.1273357}, doi = {10.1145/1273353.1273357}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigcas/SiponenV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/SiponenW07, author = {Mikko T. Siponen and Robert Willison}, editor = {Hubert {\"{O}}sterle and Joachim Schelp and Robert Winter}, title = {A Critical Assessment of {IS} Security Research between 1990-2004}, booktitle = {Proceedings of the Fifteenth European Conference on Information Systems, {ECIS} 2007, St. Gallen, Switzerland, 2007}, pages = {1551--1559}, publisher = {University of St. Gallen}, year = {2007}, url = {http://aisel.aisnet.org/ecis2007/190}, timestamp = {Wed, 24 Jul 2019 16:44:05 +0200}, biburl = {https://dblp.org/rec/conf/ecis/SiponenW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/PahnilaSM07, author = {Seppo Pahnila and Mikko T. Siponen and M. Adam Mahmood}, title = {Employees' Behavior towards {IS} Security Policy Compliance}, booktitle = {40th Hawaii International International Conference on Systems Science {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, {USA}}, pages = {156}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/HICSS.2007.206}, doi = {10.1109/HICSS.2007.206}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/PahnilaSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/PahnilaSM07, author = {Seppo Pahnila and Mikko T. Siponen and M. Adam Mahmood}, title = {Which Factors Explain Employees' Adherence to Information Security Policies? An Empirical Study}, booktitle = {Pacific Asia Conference on Information Systems, {PACIS} 2007, Auckland, New Zealand, July 4-6, 2007}, pages = {73}, publisher = {AISeL}, year = {2007}, url = {http://aisel.aisnet.org/pacis2007/73}, timestamp = {Thu, 01 Mar 2012 19:18:51 +0100}, biburl = {https://dblp.org/rec/conf/pacis/PahnilaSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/SiponenPM07, author = {Mikko T. Siponen and Seppo Pahnila and M. Adam Mahmood}, editor = {Hein S. Venter and Mariki M. Eloff and Les Labuschagne and Jan H. P. Eloff and Rossouw von Solms}, title = {Employees' Adherence to Information Security Policies: An Empirical Study}, booktitle = {New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the {IFIP} {TC-11} 22nd International Information Security Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa}, series = {{IFIP}}, volume = {232}, pages = {133--144}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-72367-9\_12}, doi = {10.1007/978-0-387-72367-9\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/SiponenPM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/behaviourIT/JokelaSHE06, author = {Timo Jokela and Mikko T. Siponen and Naotake Hirasawa and Jonathan Earthy}, title = {A survey of usability capability maturity models: implications for practice and research}, journal = {Behav. Inf. Technol.}, volume = {25}, number = {3}, pages = {263--282}, year = {2006}, url = {https://doi.org/10.1080/01449290500168079}, doi = {10.1080/01449290500168079}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/behaviourIT/JokelaSHE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Siponen06, author = {Mikko T. Siponen}, title = {Information security standards focus on the existence of process, not its content}, journal = {Commun. {ACM}}, volume = {49}, number = {8}, pages = {97--100}, year = {2006}, url = {https://doi.org/10.1145/1145287.1145316}, doi = {10.1145/1145287.1145316}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Siponen06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Siponen06, author = {Mikko T. Siponen}, title = {Secure-system design methods: evolution and future directions}, journal = {{IT} Prof.}, volume = {8}, number = {3}, pages = {40--44}, year = {2006}, url = {https://doi.org/10.1109/MITP.2006.73}, doi = {10.1109/MITP.2006.73}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Siponen06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/HeikkaBS06, author = {Juhani Heikka and Richard L. Baskerville and Mikko T. Siponen}, title = {A Design Theory for Secure Information Systems Design Methods}, journal = {J. Assoc. Inf. Syst.}, volume = {7}, number = {11}, pages = {31}, year = {2006}, url = {https://doi.org/10.17705/1jais.00107}, doi = {10.17705/1JAIS.00107}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/HeikkaBS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jais/Siponen06, author = {Mikko T. Siponen}, title = {Six Design Theories for {IS} Security Policies and Guidelines}, journal = {J. Assoc. Inf. Syst.}, volume = {7}, number = {7}, pages = {19}, year = {2006}, url = {https://doi.org/10.17705/1jais.00095}, doi = {10.17705/1JAIS.00095}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jais/Siponen06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigcas/Siponen06, author = {Mikko T. Siponen}, title = {A justification for software rights}, journal = {{SIGCAS} Comput. Soc.}, volume = {36}, number = {3}, pages = {11--20}, year = {2006}, url = {https://doi.org/10.1145/1195716.1195718}, doi = {10.1145/1195716.1195718}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigcas/Siponen06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/LeiviskaS06, author = {Katja Leivisk{\"{a}} and Mikko T. Siponen}, editor = {Jan Ljungberg and Magnus Andersson}, title = {Attitudes of sixth form female students towards the {IT} field}, booktitle = {Proceedings of the Fourteenth European Conference on Information Systems, {ECIS} 2006, G{\"{o}}teborg, Sweden, 2006}, pages = {859--872}, year = {2006}, url = {http://aisel.aisnet.org/ecis2006/187}, timestamp = {Mon, 05 Dec 2016 15:14:00 +0100}, biburl = {https://dblp.org/rec/conf/ecis/LeiviskaS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/DhillonSS06, author = {Gurpreet Dhillon and Mikko T. Siponen and Raj Sharman}, title = {Minitrack Introduction}, booktitle = {39th Hawaii International International Conference on Systems Science {(HICSS-39} 2006), {CD-ROM} / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/HICSS.2006.302}, doi = {10.1109/HICSS.2006.302}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/DhillonSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/SiponenS06, author = {Mikko T. Siponen and Carl Stucke}, title = {Effective Anti-Spam Strategies in Companies: An International Study}, booktitle = {39th Hawaii International International Conference on Systems Science {(HICSS-39} 2006), {CD-ROM} / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/HICSS.2006.140}, doi = {10.1109/HICSS.2006.140}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/SiponenS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/HeikkaS06, author = {Juhani Heikka and Mikko T. Siponen}, title = {Abuse Cases Revised: An Action Research Experience}, booktitle = {Pacific Asia Conference on Information Systems, {PACIS} 2006, Kuala Lumpur, Malaysia, July 6-9, 2006}, pages = {46}, publisher = {AISeL}, year = {2006}, url = {http://aisel.aisnet.org/pacis2006/46}, timestamp = {Thu, 01 Mar 2012 19:27:42 +0100}, biburl = {https://dblp.org/rec/conf/pacis/HeikkaS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/MettovaaraSL06, author = {Vesa Mettovaara and Mikko T. Siponen and Jari A. Lehto}, title = {Collaboration in Software Development: Lesson Learned from Two Large Multinational Organizations}, booktitle = {Pacific Asia Conference on Information Systems, {PACIS} 2006, Kuala Lumpur, Malaysia, July 6-9, 2006}, pages = {103}, publisher = {AISeL}, year = {2006}, url = {http://aisel.aisnet.org/pacis2006/103}, timestamp = {Thu, 01 Mar 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pacis/MettovaaraSL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/SiponenPM06, author = {Mikko T. Siponen and Seppo Pahnila and M. Adam Mahmood}, title = {A New Model for Understanding Users' {IS} Security Compliance}, booktitle = {Pacific Asia Conference on Information Systems, {PACIS} 2006, Kuala Lumpur, Malaysia, July 6-9, 2006}, pages = {48}, publisher = {AISeL}, year = {2006}, url = {http://aisel.aisnet.org/pacis2006/48}, timestamp = {Thu, 01 Mar 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pacis/SiponenPM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/behaviourIT/SiponenV05, author = {Mikko T. Siponen and Tero Vartiainen}, title = {Attitudes to and factors affecting unauthorized copying of computer software in Finland}, journal = {Behav. Inf. Technol.}, volume = {24}, number = {4}, pages = {249--257}, year = {2005}, url = {https://doi.org/10.1080/01449290512331321857}, doi = {10.1080/01449290512331321857}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/behaviourIT/SiponenV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/Siponen05, author = {Mikko T. Siponen}, title = {An analysis of the traditional {IS} security approaches: implications for research and practice}, journal = {Eur. J. Inf. Syst.}, volume = {14}, number = {3}, pages = {303--315}, year = {2005}, url = {https://doi.org/10.1057/palgrave.ejis.3000537}, doi = {10.1057/PALGRAVE.EJIS.3000537}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/Siponen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iando/Siponen05, author = {Mikko T. Siponen}, title = {Analysis of modern {IS} security development approaches: towards the next generation of social and adaptable {ISS} methods}, journal = {Inf. Organ.}, volume = {15}, number = {4}, pages = {339--375}, year = {2005}, url = {https://doi.org/10.1016/j.infoandorg.2004.11.001}, doi = {10.1016/J.INFOANDORG.2004.11.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iando/Siponen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Siponen05, author = {Mikko T. Siponen}, title = {Unauthorized Copying of Software: What is Wrong with the Nonexclusive Argument?}, journal = {{IT} Prof.}, volume = {7}, number = {5}, pages = {49--51}, year = {2005}, url = {https://doi.org/10.1109/MITP.2005.127}, doi = {10.1109/MITP.2005.127}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Siponen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/DhillonSS05, author = {Gurpreet Dhillon and Mikko T. Siponen and Raj Sharman}, title = {Mini Track: 'Information Systems Security Management'}, booktitle = {38th Hawaii International Conference on System Sciences {(HICSS-38} 2005), {CD-ROM} / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/HICSS.2005.414}, doi = {10.1109/HICSS.2005.414}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/DhillonSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/SiponenBK05, author = {Mikko T. Siponen and Richard L. Baskerville and Tapio Kuivalainen}, title = {Integrating Security into Agile Development Methods}, booktitle = {38th Hawaii International Conference on System Sciences {(HICSS-38} 2005), {CD-ROM} / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/HICSS.2005.329}, doi = {10.1109/HICSS.2005.329}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/SiponenBK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isj/SiponenV04, author = {Mikko T. Siponen and Tero Vartiainen}, title = {Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice}, journal = {Inf. Syst. J.}, volume = {14}, number = {4}, pages = {387--407}, year = {2004}, url = {https://doi.org/10.1111/j.1365-2575.2004.00179.x}, doi = {10.1111/J.1365-2575.2004.00179.X}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isj/SiponenV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigcas/Siponen04, author = {Mikko T. Siponen}, title = {A justification for software rights}, journal = {{SIGCAS} Comput. Soc.}, volume = {34}, number = {3}, pages = {3}, year = {2004}, url = {https://doi.org/10.1145/1111635.1111638}, doi = {10.1145/1111635.1111638}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigcas/Siponen04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/SiponenD04, author = {Mikko T. Siponen and Gurpreet Dhillon}, title = {Information Systems Security Management: Minitrack Introduction}, booktitle = {37th Hawaii International Conference on System Sciences {(HICSS-37} 2004), {CD-ROM} / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, {USA}}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/HICSS.2004.1265442}, doi = {10.1109/HICSS.2004.1265442}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/SiponenD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/VartiainenS04, author = {Tero Vartiainen and Mikko T. Siponen}, title = {Defects, Usefulness and Usability of Ethics Theories in {IS} Ethics Education}, booktitle = {{ICEIS} 2004, Proceedings of the 6th International Conference on Enterprise Information Systems, Porto, Portugal, April 14-17, 2004}, pages = {179--186}, year = {2004}, timestamp = {Thu, 02 Feb 2017 12:56:49 +0100}, biburl = {https://dblp.org/rec/conf/iceis/VartiainenS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/VartiainenS03, author = {Tero Vartiainen and Mikko T. Siponen}, editor = {Claudio U. Ciborra and Riccardo Mercurio and Marco de Marco and Marcello Martinez and Andrea Carignani}, title = {Universality thesis in {IS} ethics education - an empirical study}, booktitle = {Proceedings of the 11th European Conference on Information Systems, {ECIS} 2003, Naples, Italy 16-21 June 2003}, pages = {2036--2043}, year = {2003}, timestamp = {Mon, 05 Dec 2016 15:14:00 +0100}, biburl = {https://dblp.org/rec/conf/ecis/VartiainenS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/AbrahamssonWSR03, author = {Pekka Abrahamsson and Juhani Warsta and Mikko T. Siponen and Jussi Ronkainen}, editor = {Lori A. Clarke and Laurie Dillon and Walter F. Tichy}, title = {New Directions on Agile Methods: {A} Comparative Analysis}, booktitle = {Proceedings of the 25th International Conference on Software Engineering, May 3-10, 2003, Portland, Oregon, {USA}}, pages = {244--254}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ICSE.2003.1201204}, doi = {10.1109/ICSE.2003.1201204}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/AbrahamssonWSR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/Siponen03, author = {Mikko T. Siponen}, title = {Information Security Management Standards: Problems and Solutions}, booktitle = {The Seventh Pacific Asia Conference on Information Systems, {PACIS} 2003, Adelaide, Australia, July 10-13, 2003}, pages = {105}, publisher = {AISeL}, year = {2003}, url = {http://aisel.aisnet.org/pacis2003/105}, timestamp = {Sat, 03 Mar 2012 13:29:57 +0100}, biburl = {https://dblp.org/rec/conf/pacis/Siponen03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Siponen03, author = {Mikko T. Siponen}, editor = {Dimitris Gritzalis and Sabrina De Capitani di Vimercati and Pierangela Samarati and Sokratis K. Katsikas}, title = {New Directions on {IS} Security Methods}, booktitle = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\) International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece}, series = {{IFIP} Conference Proceedings}, volume = {250}, pages = {325--336}, publisher = {Kluwer}, year = {2003}, timestamp = {Fri, 25 Apr 2003 10:12:34 +0200}, biburl = {https://dblp.org/rec/conf/sec/Siponen03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Siponen02, author = {Mikko T. Siponen}, title = {Designing secure information systems and software:critical evaluation of the existing approaches and a new paradigm}, school = {University of Oulu, Finland}, year = {2002}, url = {http://urn.fi/urn:isbn:9514267907}, urn = {urn:isbn:9514267907}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Siponen02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ajis/Siponen02, author = {Mikko T. Siponen}, title = {Database Security and the Problem of Polyinstantiation: a moral scrutiny}, journal = {Australas. J. Inf. Syst.}, volume = {10}, number = {1}, year = {2002}, url = {http://journal.acs.org.au/index.php/ajis/article/view/169}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ajis/Siponen02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/SiponenV02, author = {Mikko T. Siponen and Tero Vartiainen}, title = {Teaching End-User Ethics: Issues and a Solution Based on Universalizability}, journal = {Commun. Assoc. Inf. Syst.}, volume = {8}, pages = {29}, year = {2002}, url = {https://doi.org/10.17705/1cais.00829}, doi = {10.17705/1CAIS.00829}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cais/SiponenV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Siponen02, author = {Mikko T. Siponen}, title = {Towards maturity of information security maturity criteria: six lessons learned from software maturity criteria}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {5}, pages = {210--224}, year = {2002}, url = {https://doi.org/10.1108/09685220210446560}, doi = {10.1108/09685220210446560}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Siponen02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Siponen02, author = {Mikko T. Siponen}, editor = {Adeeb Ghonaimy and Mahmoud T. El{-}Hadidi and Heba Kamal Aslan}, title = {Maturity Criteria for Developing Secure {IS} and {SW:} Limits, and Prospects}, booktitle = {Security in the Information Society: Visions and Perspectives, {IFIP} {TC11} 17\({}^{\mbox{th}}\) International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt}, series = {{IFIP} Conference Proceedings}, volume = {214}, pages = {91--108}, publisher = {Kluwer}, year = {2002}, timestamp = {Fri, 11 Feb 2005 12:53:42 +0100}, biburl = {https://dblp.org/rec/conf/sec/Siponen02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ais/Siponen01, author = {Mikko T. Siponen}, title = {The relevance of software rights: An anthology of the divergence of sociopolitical doctrines}, journal = {{AI} Soc.}, volume = {15}, number = {1-2}, pages = {128--148}, year = {2001}, url = {https://doi.org/10.1007/BF01205743}, doi = {10.1007/BF01205743}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ais/Siponen01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/irmj/Siponen01, author = {Mikko T. Siponen}, title = {On the Role of Human Mortality in Information System Security: From the Problems of Descriptivism to Non-Descriptive Foundations}, journal = {Inf. Resour. Manag. J.}, volume = {14}, number = {4}, pages = {15--23}, year = {2001}, url = {https://doi.org/10.4018/irmj.2001100102}, doi = {10.4018/IRMJ.2001100102}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/irmj/Siponen01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigcas/Siponen01, author = {Mikko T. Siponen}, title = {Five dimensions of information security awareness}, journal = {{SIGCAS} Comput. Soc.}, volume = {31}, number = {2}, pages = {24--29}, year = {2001}, url = {https://doi.org/10.1145/503345.503348}, doi = {10.1145/503345.503348}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigcas/Siponen01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/SiponenV01, author = {Mikko T. Siponen and Tero Vartiainen}, title = {End-User Ethics Teaching: Issues and a Solution based on Universalization}, booktitle = {34th Annual Hawaii International Conference on System Sciences (HICSS-34), January 3-6, 2001, Maui, Hawaii, {USA}}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/HICSS.2001.927151}, doi = {10.1109/HICSS.2001.927151}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/SiponenV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-1/SiponenB01, author = {Mikko T. Siponen and Richard L. Baskerville}, editor = {Jan H. P. Eloff and Les Labuschagne and Rossouw von Solms and Gurpreet Dhillon}, title = {A New Paradigm for Adding Security Into {IS} Development Methods}, booktitle = {Advances in Information Security Management {\&} Small Systems Security, {IFIP} {TC11} {WG11.1/WG11.2} Eigth Annual Working Conference on Information Security Management {\&} Small Systems Security, September 27-28, 2001, Las Vegas, Nevada, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {200}, pages = {99--112}, publisher = {Kluwer}, year = {2001}, timestamp = {Wed, 30 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-1/SiponenB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Siponen01, author = {Mikko T. Siponen}, editor = {Michel Dupuy and Pierre Paradinas}, title = {A Paradigmatic Analysis of Conventional Approaches for Developing and Managing Secure {IS}}, booktitle = {Trusted Information: The New Decade Challenge, {IFIP} {TC11} Sixteenth Annual Working Conference on Information Security (IFIP/Sec'01), June 11-13, 2001, Paris, France}, series = {{IFIP} Conference Proceedings}, volume = {193}, pages = {437--452}, publisher = {Kluwer}, year = {2001}, url = {https://doi.org/10.1007/0-306-46998-7\_30}, doi = {10.1007/0-306-46998-7\_30}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/Siponen01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Siponen00, author = {Mikko T. Siponen}, title = {A conceptual foundation for organizational information security awareness}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {1}, pages = {31--41}, year = {2000}, url = {https://doi.org/10.1108/09685220010371394}, doi = {10.1108/09685220010371394}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Siponen00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Siponen00a, author = {Mikko T. Siponen}, title = {Critical analysis of different approaches to minimizing user-related faults in information systems security: implications for research and practice}, journal = {Inf. Manag. Comput. Secur.}, volume = {8}, number = {5}, pages = {197--209}, year = {2000}, url = {https://doi.org/10.1108/09685220010353178}, doi = {10.1108/09685220010353178}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Siponen00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Siponen00, author = {Mikko T. Siponen}, editor = {Sihan Qing and Jan H. P. Eloff}, title = {Policies for Construction of Information Systems' Security Guidelines: Five Approaches}, booktitle = {Information Security for Global Information Infrastructures, {IFIP} {TC11} Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China}, series = {{IFIP} Conference Proceedings}, volume = {175}, pages = {111--120}, publisher = {Kluwer}, year = {2000}, timestamp = {Fri, 26 Jul 2002 13:04:43 +0200}, biburl = {https://dblp.org/rec/conf/sec/Siponen00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Siponen00a, author = {Mikko T. Siponen}, editor = {Sihan Qing and Jan H. P. Eloff}, title = {On the Role of Human Morality in Information System Security: The Problems of Descriptivism and Non-descriptive Foundations}, booktitle = {Information Security for Global Information Infrastructures, {IFIP} {TC11} Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China}, series = {{IFIP} Conference Proceedings}, volume = {175}, pages = {401--410}, publisher = {Kluwer}, year = {2000}, timestamp = {Thu, 03 Jan 2002 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/Siponen00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/SiponenK98, author = {Mikko T. Siponen and Jorma Kajava}, title = {Ontology of Organizational {IT} Security Awareness - From Theoretical Foundations to Practical Framework}, booktitle = {7th Workshop on Enabling Technologies {(WETICE} '98), Infrastructure for Collaborative Enterprises, June 17-19, 1998, Palo Alto, CAUSA, Proceedings}, pages = {327--333}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/ENABL.1998.725713}, doi = {10.1109/ENABL.1998.725713}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/SiponenK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.