Access the full text.
Sign up today, get DeepDyve free for 14 days.
Anne Sørebø, Øystein Sørebø, M. Sein (2007)
The Influence of User Involvement and Personal Innovativeness on User BehaviorWorld Academy of Science, Engineering and Technology, International Journal of Social, Behavioral, Educational, Economic, Business and Industrial Engineering, 1
T. Moore, D. Pym, C. Ioannidis (2014)
Economics of Information Security and Privacy
S. Asongu (2013)
Fighting Corruption in Africa: Do Existing Corruption-Control Levels Matter?LSN: Comparative Law (Topic)
Kayhan Tajeddini
International Journal of Hospitality Management Exploring the Antecedents of Effectiveness and Efficiency
Michael Conover, B. Gonçalves, A. Flammini, F. Menczer (2012)
Partisan asymmetries in online political activityEPJ Data Science, 1
(2016)
Financing SMEs and Entrepreneurs
A. Rodríguez‐Pose, Callum Wilkie (2018)
Innovating in Less Developed Regions: What Drives Patenting in the Lagging Regions of Europe and North AmericaCEPR Discussion Paper Series
M. Domino, Stephen Wingreen, J. Blanton (2014)
Social Cognitive Theory: The Antecedents and Effects of Ethical Climate Fit on Organizational Attitudes of Corporate Accounting Professionals—A Reflection of Client Narcissism and Fraud Attitude RiskJournal of Business Ethics, 131
Michael Erbschloe (2019)
Social Engineering
A. Hikmany (2012)
Land Planning Authorities and Sustainable Tourism in ZanzibarSRPN: Sustainable Development (Topic)
J. Lewis, A. Weigert (1985)
Trust as a Social RealitySocial Forces, 63
J. Grant (2006)
Understanding and treating kleptomania: new models and new treatments.The Israel journal of psychiatry and related sciences, 43 2
C. Bryan, J. Butner, Sungchoon Sinclair, Annabelle Bryan, C. Hesse, Andree Rose (2018)
Predictors of Emerging Suicide Death Among Military Personnel on Social Media NetworksSuicide and Life‐Threatening Behavior, 48
Vanessa Tchamyou, S. Asongu (2016)
Information Sharing and Financial Sector Development in AfricaJournal of African Business, 18
Konstantina Spanaki, Zeynep Gürgüç, C. Mulligan, Emil Lupu (2019)
Organizational cloud security and control: a proactive approachInf. Technol. People, 32
V. Venkatesh, Susan Brown, Hillol Bala (2013)
Bridging the Qualitative-Quantitative Divide: Guidelines for Conducting Mixed Methods Research in Information SystemsMIS Q., 37
International Journal of Advance Research and Innovative Ideas in Education, 2
Ulf Elg, Kayhan Tajeddini (2015)
Enhancing organizational performance of international SMEs through inter-firm marketing collaborations.
Kuan-Yu Lin, Hsi-Peng Lu (2011)
Why people use social networking sites: An empirical study integrating network externalities and motivation theoryComput. Hum. Behav., 27
R. Goodman (1997)
The Strengths and Difficulties Questionnaire: a research note.Journal of child psychology and psychiatry, and allied disciplines, 38 5
Mary Cameron (1964)
The booster and the snitch : department store shopliftingAmerican Sociological Review, 29
Krithika Randhawa, Ralf Wilden, Jan Hohberger (2016)
A bibliometric review of open innovation: setting a research agendaJournal of Product Innovation Management, 33
Austin Blum, B. Odlaug, S. Redden, J. Grant (2018)
Stealing behavior and impulsivity in individuals with kleptomania who have been arrested for shoplifting.Comprehensive psychiatry, 80
Information Technology and Quantitative Management, 122
Zeynep Tufekci, Christopher Wilson (2012)
Social Media and the Decision to Participate in Political Protest: Observations From Tahrir SquareJournal of Communication, 62
J. Holste, D. Fields (2010)
Trust and tacit knowledge sharing and useJ. Knowl. Manag., 14
P. Diehl (1992)
Research Methods for Business and Management
I. Chaston, G. Scott (2012)
Entrepreneurship and open innovation in an emerging economyManagement Decision, 50
Kem Zhang, M. Benyoucef (2016)
Consumer behavior in social commerce: A literature reviewDecis. Support Syst., 86
K. Eisenhardt, Melissa Graebner (2007)
Theory Building From Cases: Opportunities And ChallengesAcademy of Management Journal, 50
Oyelami Olusegun, Norafida Ithnin (2013)
People Are the Answer to Security: Establishing a Sustainable Information Security Awareness Training (ISAT) Program in OrganizationArXiv, abs/1309.0188
A. Kaplan, M. Haenlein (2010)
Users of the world, unite! The challenges and opportunities of Social MediaBusiness Horizons, 53
A. Riege (2007)
Actions to overcome knowledge transfer barriers in MNCsJ. Knowl. Manag., 11
Y. Lee, R. Kauffman, Ryan Sougstad (2011)
Profit-maximizing firm investments in customer information securityDecis. Support Syst., 51
E. Tseng, R. Yazdanifard (2015)
Mobility – The Revolutionary Change to Customer’s Shopping Experience in Retailing
Hyeun-Suk Rhee, Cheongtag Kim, Young Ryu (2009)
Self-efficacy in information security: Its influence on end users' information security practice behaviorComput. Secur., 28
Michael Stankosky (2005)
Creating the discipline of knowledge management : the latest in university research
Ying-Wei Shih, Ya-Ling Wu, Yi-Shun Wang, Chiung-Liang Chen (2017)
Investigating the post-adoption stage of Voice over Internet Protocol (VoIP) telephony diffusion: A use-diffusion approachInf. Technol. People, 30
S. Asongu (2012)
How has Mobile Phone Penetration Stimulated Financial Development in Africa?Journal of African Business, 14
A. Alhogail (2015)
Design and validation of information security culture frameworkComput. Hum. Behav., 49
(2003)
A critical look at a regulation of cybercrime-a comparative analysis with suggestions for legal policy
Q. Cheng, Tim Li, Chi-Leung Kwok, T. Zhu, P. Yip (2017)
Assessing Suicide Risk and Emotional Distress in Chinese Social Media: A Text Mining and Machine Learning StudyJournal of Medical Internet Research, 19
Robert Bond, Christopher Fariss, Jason Jones, Adam Kramer, Cameron Marlow, Jaime Settle, J. Fowler (2012)
A 61-million-person experiment in social influence and political mobilizationNature, 489
Ehinome Ikhalia (2017)
A malware threat avoidance model for online social network users
(2017)
The authors found that security systems, security education and security visibility decrease instances of non-compliance
Andrea Caragliu, C. Bo, P. Nijkamp (2011)
Smart Cities in EuropeJournal of Urban Technology, 18
A. Cox, Dena Cox, Ronald Anderson, G. Moschis (1993)
Research note: Social influences on adolescent shoplifting—Theory, evidence, and implications for the retail industryJournal of Retailing, 69
S. Diffley, J. Kearns, William Bennett, P. Kawalek (2011)
Consumer Behaviour in Social Networking Sites: Implications for MarketersIrish Journal of Management, 30
A. Bossler, T. Holt (2009)
On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities TheoryInternational Journal of Cyber Criminology, 3
Hugo Jankowitz (1988)
Detecting Plagiarism in Student Pascal ProgramsComput. J., 31
Jeffrey May, G. Dhillon (2010)
A Holistic Approach for Enriching Information Security Analysis and Security Policy Formation
M. Rogers (2018)
Cyber terrorismRoutledge Handbook Of Terrorism And Counterterrorism
K. Thomson, R. Solms, L. Louw (2006)
Cultivating an organizational information security cultureComputer Fraud & Security, 2006
H. Hirtenlehner, Beth Hardie (2016)
On the Conditional Relevance of Controls: An Application of Situational Action Theory to ShopliftingDeviant Behavior, 37
Keld Laursen, A. Salter (2006)
Open for innovation: the role of openness in explaining innovation performance among U.K. manufacturing firmsSouthern Medical Journal, 27
David Maimon, Eric Louderback (2019)
Cyber-Dependent Crimes: An Interdisciplinary ReviewAnnual Review of Criminology
Sungho Kwon, Sangsoo Jang, Jaeill Lee, Sangkyun Kim (2007)
Common defects in information security management system of Korean companiesJ. Syst. Softw., 80
Moses Muthinja, Chimwemwe Chipeta (2018)
What Drives Financial Innovations in Kenya’s Commercial Banks? An Empirical Study on Firm and Macro-Level Drivers of Branchless BankingJournal of African Business, 19
K. Thomas (1992)
Conflict and negotiation processes in organizations.
Khaled Mansoori, S. Jawahitha, A. Tchantchane (2018)
Investigating Emirati citizens' adoption of e-government services in Abu Dhabi using modified UTAUT modelInf. Technol. People, 31
(2011)
Smart cities: introducing the IBM city operations and management solutions
Minwoo Lee, Linda Lowry, J. Delconte (2015)
Social Media in Tourism Research: A Literature Review
Rajiv Aricat (2015)
Is (the study of) mobile phones old wine in a new bottle? A polemic on communication-based acculturation researchInf. Technol. People, 28
V. Venkatesh (2000)
Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance ModelInf. Syst. Res., 11
(2009)
Information technology: security techniques: information security management: monitoring, measurement, analysis and evaluation
D. Farrington (1999)
Measuring, Explaining and Preventing Shoplifting: A Review of British ResearchSecurity Journal, 12
R. Bagozzi, Y. Yi (1998)
ON THE EVALUATION OF STRUCTURE EQUATION MODELS, 16
Qualitative Research in Sports Management
V. Venkatesh, J. Thong, F. Chan, P. Hu (2016)
Managing Citizens' Uncertainty in E-Government Services: The Mediating and Moderating Roles of Transparency and TrustInf. Syst. Res., 27
A. Klimburg (2011)
Mobilising Cyber PowerSurvival, 53
(2012)
ANN based scheme to predict number of zombies involved in a DDoS attack
I. Ajzen, M. Fishbein (1980)
Understanding Attitudes and Predicting Social Behavior
Ruey-Shun Chen, Chia-Ming Sun, M. Helms, W. Jih (2008)
Aligning information technology and business strategy with a dynamic capabilities perspective: A longitudinal study of a Taiwanese Semiconductor CompanyInt. J. Inf. Manag., 28
W. Cram, J. Proudfoot, J. D'Arcy (2017)
Organizational information security policies: a review and research frameworkEuropean Journal of Information Systems, 26
Youngok Kim, S. Lui (2015)
The impacts of external network and business group on innovation: Do the types of innovation matter?Journal of Business Research, 68
Moira Burke, R. Kraut (2014)
Growing closer on facebook: changes in tie strength through social network site useProceedings of the SIGCHI Conference on Human Factors in Computing Systems
(2012)
The importance of organisational learning for organisational sustainability
N. Doherty, Sharul Tajuddin (2018)
Towards a user-centric theory of value-driven information security complianceInf. Technol. People, 31
Ehinome Ikhalia, Dr Serrano, Dr Bell, Johannes Arreymbi (2017)
DEVELOPING AND IMPLEMENTING TTAT-MIP FOR THE AVOIDANCE OF MALWARE THREATS THROUGH ONLINE SOCIAL NETWORKS
Oasis Kodila‐Tedika (2018)
Natural resource governance: does social media matter?Mineral Economics, 34
S. Hinduja (2004)
Perceptions of local and state law enforcement concerning the role of computer crime investigative teamsPolicing-an International Journal of Police Strategies & Management, 27
(1994)
Qualitative Data Analysis: A Sourcebook
K. Parsons, Agata McCormac, M. Butavicius, M. Pattinson, C. Jerram (2014)
Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)Comput. Secur., 42
B. Potdar, J. Guthrie, J. Gnoth (2018)
Encouraging shoplifting prevention with quality relationships: A theory of planned behaviour perspectiveInternational Journal of Retail & Distribution Management, 46
R. Volkema, T. Bergmann (1995)
Conflict styles as indicators of behavioral patterns in interpersonal conflictsJournal of Social Psychology, 135
(1979)
Shoplifting, the Crime Everybody Pays for, Elsevier/Nelson Books
(2018)
2018), this paper contributes to IS literature on IT business value by theorizing and demonstrating how investment in organizational information security practices
Computer Ethics at ETSU
S. Roth, Peter Schmutz, Stefan Pauwels, Javier Bargas-Avila, K. Opwis (2010)
Mental models for web objects: Where do users expect to find the most frequent objects in online shops, news portals, and company web pages?Interact. Comput., 22
Journal of Frauds
Timothy Hinkin (1995)
A Review of Scale Development Practices in the Study of OrganizationsJournal of Management, 21
Patrick Mikalef, I. Pappas, M. Giannakos (2016)
Consumer Intentions on Social Media: A fsQCA Analysis of Motivations
(2011)
Cyber security: understanding cyber crimes, computer forensics and legal perspectives
J. Gliem, R. Gliem (2003)
Calculating, Interpreting, And Reporting Cronbach’s Alpha Reliability Coefficient For Likert-Type Scales
F. Gibb, S. Buchanan (2006)
A framework for business continuity managementInt. J. Inf. Manag., 26
H. Venter, J. Eloff (2003)
A taxonomy for information security technologiesComput. Secur., 22
ITIL® managing digital information assets
Kim-Kwang Choo (2011)
The cyber threat landscape: Challenges and future research directionsComput. Secur., 30
Christopher Mallett (2015)
The incarceration of seriously traumatised adolescents in the USA: limited progress and significant harm.Criminal behaviour and mental health : CBMH, 25 1
Directory of companies and establishments of Cantabria
B. Sharma, M. Singh, Neha (2012)
Knowledge Sharing Barriers: An Approach of Interpretive Structural Modeling
M. Ali (2015)
Determinants of Preventing Cyber Crime: a Survey ResearchInternational Journal of Management Science and Business Administration, 2
Joshua Adams (1996)
Controlling Cyberspace: Applying the Computer Fraud and Abuse Act to the InternetSanta Clara High Technology Law Journal, 12
Guanhua Yan, Guanling Chen, S. Eidenbenz, Nan Li (2011)
Malware propagation in online social networks: nature, dynamics, and defense implications
D. Gefen (2000)
E-commerce: the role of familiarity and trustManagement Science
D. Tassel (1970)
Computer crime
R. Rao, Piyali Mandal, Rishab Gupta, Prashanth Ramshankar, A. Mishra, A. Ambekar, Sonali Jhanjee, A. Dhawan (2016)
Factors Affecting Drug Use During Incarceration: A Cross-Sectional Study of Opioid-Dependent Persons from India.Journal of substance abuse treatment, 61
Jong-gon Yang, Kyong-Su Kang, Yung-Mok Yu (2016)
A Study on Vendor Managed Inventory to Apply Technology Acceptance Model, 21
(2010)
Qualitative Interview Design: A Practical Guide for Novice InvestigatorsThe Qualitative Report, 15
V. Venkatesh, Michael Morris, G. Davis, Fred Davis (2003)
User Acceptance of Information Technology: Toward a Unified ViewInstitutions & Transition Economics: Microeconomic Issues eJournal
M. Siponen (2000)
A conceptual foundation for organizational information security awarenessInf. Manag. Comput. Secur., 8
Rhiannon Lewis (2018)
Literature review on children and young people demonstrating technology-assisted harmful sexual behaviorAggression and Violent Behavior, 40
Tracy Mcdonald, M. Siegall (1992)
The Effects of Technological Self-Efficacy and Job Focus on Job Performance, Attitudes, and Withdrawal BehaviorsThe Journal of Psychology, 126
Hee Jiow (2013)
Cyber Crime in Singapore: An Analysis of Regulation Based on Lessig's Four Modalities of Constraint1International Journal of Cyber Criminology, 7
Kalsom Salleh (2010)
Tacit Knowledge and Accountants: Knowledge Sharing Model2010 Second International Conference on Computer Engineering and Applications, 2
(2014)
Students awareness on cybercrime in Perambalur district
S. Kim, M. Eastin (2011)
Hedonic Tendencies and the Online Consumer: An Investigation of the Online Shopping ProcessJournal of Internet Commerce, 10
Gifty Aggarwal (2015)
General Awareness on Cyber Crime
International Journal of Industrial and Manufacturing Engineering, 1
Zeus Trojan malware threat | Zbot and other names | Kaspersky lab UK
J. Fereday, E. Muir‐Cochrane (2006)
Demonstrating Rigor Using Thematic Analysis: A Hybrid Approach of Inductive and Deductive Coding and Theme DevelopmentInternational Journal of Qualitative Methods, 5
V. Parida, M. Westerberg, Johan Frishammar (2012)
Inbound Open Innovation Activities in High‐Tech SMEs: The Impact on Innovation PerformanceJournal of Small Business Management, 50
Cristian Vaccari, A. Valeriani, Pablo Barberá, Richard Bonneau, J. Jost, Jonathan Nagler, Joshua Tucker (2013)
Social media and political communication: A survey of Twitter users during the 2013 Italian general election, 43
A. Alexiev, H. Volberda, F. Bosch (2016)
Interorganizational collaboration and firm innovativeness: Unpacking the role of the organizational environmentJournal of Business Research, 69
V. Santos, A. Soares, J. Carvalho (2012)
Knowledge Sharing Barriers in Complex Research and Development Projects: an Exploratory Study on the Perceptions of Project ManagersKnowledge and Process Management, 19
Denis Vuckovac, Pascal Fritzen, K. Fuchs, A. Ilic (2017)
From Shopping Aids to Fully Autonomous Mobile Self-checkouts - A Field Study in RetailWirtschaftsinformatik und Angewandte Informatik
C. Holsapple, Anita Lee-Post (2006)
Defining, Assessing, and Promoting E‐Learning Success: An Information Systems Perspective*Decision Sciences Journal of Innovative Education, 4
David Preston, Elena Karahanna (2009)
Antecedents of IS Strategic Alignment: A Nomological NetworkInf. Syst. Res., 20
(1979)
Juvenile Delinquency and its Origins
P. Narayan, Sagarika Mishra, S. Narayan (2011)
Do market capitalization and stocks traded converge? New global evidenceFuel and Energy Abstracts
Gerald Carlino (2011)
Three keys to the city: resources, agglomeration economies, and sortingThe Business Review
M. Koetter, J. Kolari (2008)
Testing the quiet life of U.S. banks with adjusted Lerner indices
M. Siponen, R. Willison (2009)
Information security management standards: Problems and solutions
G. Dhillon, J. Backhouse (2001)
Current directions in IS security research: towards socio‐organizational perspectivesInformation Systems Journal, 11
V. Venkatesh, J. Thong, Xin Xu (2012)
Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of TechnologyBehavioral Marketing eJournal
Kenneth Hyde (2000)
Recognising deductive processes in qualitative researchQualitative Market Research: An International Journal, 3
Manmohan Chaturvedi, Abhishek Singh, Manmohan Gupta, Jaijit Bhattacharya (2014)
Analyses of issues of information security in Indian contextTransforming Government: People, Process and Policy, 8
M. Workman (2007)
Gaining Access with Social Engineering: An Empirical Study of the ThreatInformation Systems Security, 16
M. Alryalat, N. Rana, G. Sahu, Yogesh Dwivedi, Mina Tajvidi (2017)
Use of Social Media in Citizen-Centric Electronic Government Services: A Literature AnalysisInt. J. Electron. Gov. Res., 13
T. Clausen, Einar Rasmussen (2011)
Open innovation policy through intermediaries: the industry incubator programme in NorwayTechnology Analysis & Strategic Management, 23
S. Asongu, Oasis Kodila‐Tedika (2013)
Fighting African Conflicts and Crimes: Which Governance Tools Matter?African Law eJournal
Michael Humbani, M. Wiese (2018)
A Cashless Society for All: Determining Consumers’ Readiness to Adopt Mobile Payment ServicesJournal of African Business, 19
C. Barroso, G. Carrion, J. Roldán (2010)
Applying Maximum Likelihood and PLS on Different Sample Sizes: Studies on SERVQUAL Model and Employee Behavior Model
P. Wikström (2006)
The Explanation of Crime: Individuals, settings, and acts of crime: situational mechanisms and the explanation of crime
M. Davids (1999)
HOW TO AVOID THE 10 BIGGEST MISTAKES IN CRMJournal of Business Strategy, 20
T. Fernandes, R. Pedroso (2017)
The effect of self-checkout quality on customer satisfaction and repatronage in a retail contextService Business, 11
E. Albrechtsen, J. Hovden (2010)
Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention studyComput. Secur., 29
Alan Burns, Clay Posey, J. Courtney, T. Roberts, Prabhashi Nanayakkara (2017)
Organizational information security as a complex adaptive system: insights from three agent-based modelsInformation Systems Frontiers, 19
M. Fishbein, I. Ajzen (1977)
Belief, Attitude, Intention, and Behavior: An Introduction to Theory and ResearchContemporary Sociology, 6
A. Amrollahi, Bruce Rowlands (2017)
Collaborative open strategic planning: a method and case studyInf. Technol. People, 30
Serge Egelman, L. Cranor, Jason Hong (2008)
You've been warned: an empirical study of the effectiveness of web browser phishing warningsProceedings of the SIGCHI Conference on Human Factors in Computing Systems
D. Lacey (2010)
Understanding and transforming organizational security cultureInf. Manag. Comput. Secur., 18
R. Bouncken, S. Kraus (2013)
Innovation in knowledge-intensive industries: The double-edged sword of coopetitionJournal of Business Research, 66
K. Ajide, I. Raheem, S. Asongu (2019)
Dollarization and the “unbundling” of globalization in sub-Saharan AfricaResearch in International Business and Finance
Information Technology & People, 25
S. Bakry (2004)
Development of e‐government: a STOPE viewInternational Journal of Network Management, 14
L. Tagliabue, M. Buzzetti, B. Arosio (2012)
Energy Saving Through the Sun: Analysis of Visual Comfort and Energy Consumption in Office Space☆Energy Procedia, 30
Steffen Hantke (1999)
Serial Killers: Death and Life in America's Wound CultureThe Journal of American Culture, 22
Joseph Hair, C. Ringle, M. Sarstedt (2011)
PLS-SEM: Indeed a Silver BulletJournal of Marketing Theory and Practice, 19
Aniello Castiglione, F. Colace, V. Moscato, F. Palmieri (2017)
CHIS: A big data infrastructure to manage digital cultural itemsFuture Gener. Comput. Syst., 86
Kyung-shick Choi (2008)
Computer Crime Victimization and Integrated Theory: An Empirical AssessmentInternational Journal of Cyber Criminology, 2
Basel Committee on Banking Supervision an Explanatory Note on the Basel Ii Irb Risk Weight Functions
Michael Williams, Yogesh Dwivedi, Banita Lal, A. Schwarz (2009)
Contemporary trends and issues in IT adoption and diffusion researchJournal of Information Technology, 24
S. Iyengar, G. Sood, Yphtach Lelkes (2012)
Affect, Not Ideology A Social Identity Perspective on PolarizationPublic Opinion Quarterly, 76
Anneke Zuiderwijk, M. Janssen, Yogesh Dwivedi (2015)
Acceptance and use predictors of open data technologies: Drawing upon the unified theory of acceptance and use of technologyGov. Inf. Q., 32
Huapu Lu (2020)
Seoul, KoreaEco-Cities and Green Transport
G. Lauritzen (2017)
The Role of Innovation Intermediaries in Firm‐Innovation Community Collaboration: Navigating the Membership ParadoxJournal of Product Innovation Management, 34
Matthias Brecht, Thomas Nowey (2012)
A Closer Look at Information Security Costs
Camilla Schippa (2011)
The Global Peace Index
Ron Henderson, Megan Divett (2003)
Perceived usefulness, ease of use and electronic supermarket useInt. J. Hum. Comput. Stud., 59
Aparna Gosavi (2018)
Can Mobile Money Help Firms Mitigate the Problem of Access to Finance in Eastern sub-Saharan Africa?Journal of African Business, 19
Ulf Elg (2002)
Inter-firm Market Orientation: Its Significance and Antecedents in Distribution NetworksJournal of Marketing Management, 18
Y. Cheung, R. Powell (2012)
Anybody can do Value at Risk: A Teaching Study using Parametric Computation and Monte Carlo SimulationThe Australasian Accounting Business and Finance Journal, 6
A. Olashore, O. Akanni, Odunayo Olashore (2017)
Associate Factors of Delinquency Among Incarcerated Male Juveniles in a Borstal Institution in NigeriaInternational Journal of Forensic Mental Health, 16
Nader Safa, R. Solms (2016)
An information security knowledge sharing model in organizationsComput. Hum. Behav., 57
Judit Sánchez, Yolanda Sánchez, Daniel Collado-Ruiz, David Cebrian-Tarrason (2013)
Knowledge Creating and Sharing Corporate Culture FrameworkProcedia - Social and Behavioral Sciences, 74
S. Asongu, Jacinta Nwachukwu, Aqsa Aziz (2016)
Determinants of Mobile Phone Penetration: Panel Threshold Evidence from Sub-Saharan AfricaJournal of Global Information Technology Management, 21
S. Asongu, Oasis Kodila‐Tedika (2015)
Trade, Aid and TerrorERN: Other Econometrics: Applied Econometric Modeling in International Economics (Topic)
Peter Atrill, E. McLaney (2004)
Accounting and Finance for non-specialists
G. Johns (2006)
The Essential Impact of Context on Organizational BehaviorAcademy of Management Review, 31
Antonios Kaniadakis (2012)
ERP implementation as a broad socio-economic phenomenon: The Agora of Techno-Organisational ChangeInf. Technol. People, 25
Beibei Dong, K. Evans, Shaoming Zou (2008)
The effects of customer participation in co-created service recoveryJournal of the Academy of Marketing Science, 36
Gregory Moody, M. Siponen, Seppo Pahnila (2018)
Toward a Unified Model of Information Security Policy ComplianceMIS Q., 42
M. Siponen, M. Mahmood, Seppo Pahnila (2014)
Employees' adherence to information security policies: An exploratory field studyInf. Manag., 51
(2017)
How to report cybercrimes in Indian territory
(1989)
Criminology Lessons, Anderson, Cincinnati
M. Avais, A. Wassan, H. Narejo, Jameel Khan (2014)
Awareness Regarding Cyber Victimization Among Students of University of Sindh, JamshoroInternational journal of Asian social science, 4
K. Bader, Ellen Enkel (2014)
Understanding a firm's choice for openness: strategy as determinantInt. J. Technol. Manag., 66
Sheshadri Chatterjee, A. Kar (2015)
Smart Cities in developing economies: A literature review and policy insights2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)
Jason Jones, Jaime Settle, Robert Bond, Christopher Fariss, Cameron Marlow, J. Fowler (2013)
Inferring Tie Strength from Online Directed BehaviorPLoS ONE, 8
Fred Davis (1989)
Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information TechnologyMIS Q., 13
R. Hoyle (1995)
The structural equation modeling approach: Basic concepts and fundamental issues.
Jilong Xue, Zhi Yang, Xiaoyong Yang, Xiao Wang, Lijiang Chen, Yafei Dai (2013)
VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network SybilsIEEE Transactions on Dependable and Secure Computing, 13
Greg Gogolin, James Jones (2010)
Law Enforcement's Ability to Deal with Digital Crime and the Implications for BusinessInformation Security Journal: A Global Perspective, 19
J. Tobin (1958)
Estimation of Relationships for Limited Dependent VariablesEconometrica, 26
Rodney Joffee (2010)
Cybercrime: the global epidemic at your network doorNetw. Secur., 2010
N. Kock, G. Lynn (2012)
Lateral Collinearity and Misleading Results in Variance-Based SEM: An Illustration and RecommendationsEconometrics: Multiple Equation Models eJournal
Sangkyun Kim, Choom Leem, H. Lee (2005)
An evaluation methodology of enterprise security management systems, 11
Z. Soomro, M. Shah, J. Ahmed (2016)
Information security management needs more holistic approach: A literature reviewInt. J. Inf. Manag., 36
S. McClurg (2006)
The Electoral Relevance of Political Talk: Examining Disagreement and Expertise Effects in Social Networks on Political ParticipationAmerican Journal of Political Science, 50
(2012)
Ethics and cybercrime in India
Information Technology & People, 8
Rebecca Naylor, Cait Lamberton, P. West (2012)
Beyond the “Like” Button: The Impact of Mere Virtual Presence on Brand Evaluations and Purchase Intentions in Social Media SettingsJournal of Marketing, 76
Vassilios Aggelidis, P. Chatzoglou (2009)
Using a modified technology acceptance model in hospitalsInternational journal of medical informatics, 78 2
S. Phillips, A. Alexander, G. Shaw (2005)
Consumer Misbehavior: The Rise of Self-Service Grocery Retailing and Shoplifting in the United Kingdom c. 1950-1970Journal of Macromarketing, 25
A. Freytag, J. Krüger, Daniel Meierrieks, F. Schneider (2011)
The Origins of Terrorism - Cross-Country Estimates on Socio-Economic Determinants of Terrorism
Information Technology & People, 22
H. Chesbrough (2003)
The Era of Open InnovationMIT Sloan Management Review, 44
M. Khan, Soo-kyun Kim, K. Alghathbar (2011)
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'Comput. Commun., 34
Aaron Bangor, P. Kortum, James Miller (2008)
An Empirical Evaluation of the System Usability ScaleInternational Journal of Human–Computer Interaction, 24
C. Fornell, D. Larcker (1981)
Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and StatisticsJournal of Marketing Research, 18
Ronald Fullerton, Girish Punj (1993)
Choosing to Misbehave: a Structural Model of Aberrant Consumer BehaviorAdvances in Consumer Research, 20
Shu-Chuan Chu, Yoojung Kim (2011)
Determinants of consumer engagement in electronic word-of-mouth (eWOM) in social networking sitesInternational Journal of Advertising, 30
O. Zakaria (2006)
Internalisation of Information Security Culture amongst Employees through Basic Security Knowledge
(2015)
The roles of legitimacy concerns, authenticity and income level in international supermarkets
R. Solms, J. Niekerk (2013)
From information security to cyber securityComput. Secur., 38
J. Spender, V. Corvello, M. Grimaldi, Pierluigi Rippa (2017)
Startups and open innovation: a review of the literatureEuropean Journal of Innovation Management, 20
J. Smith, D. Barclay (1997)
The Effects of Organizational Differences and Trust on the Effectiveness of Selling Partner RelationshipsJournal of Marketing, 61
O. Dahlbäck (1998)
Analyzing the Relationships between Individual Criminal Behavior and the Severity and Probability of PunishmentQuality and Quantity, 32
J. Gros (2003)
Trouble in Paradise. Crime and Collapsed States in the Age of GlobalizationBritish Journal of Criminology, 43
Daniela Werthes, René Mauer, Malte Brettel (2018)
Cultural and creative entrepreneurs: understanding the role of entrepreneurial identityInternational Journal of Entrepreneurial Behaviour & Research, 24
Philippe Dupuy (2009)
Pure Indicator of Risk AppetiteCapital Markets: Asset Pricing & Valuation
Richard Moore (1984)
Shoplifting in Middle America: Patterns and Motivational CorrelatesInternational Journal of Offender Therapy and Comparative Criminology, 28
H. Chesbrough, M. Appleyard (2007)
Open Innovation and StrategyCalifornia Management Review, 50
Steve Sheng, Bryant Magnien, P. Kumaraguru, A. Acquisti, L. Cranor, Jason Hong, Elizabeth Ferrall-Nunge (2007)
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish
Joseph Hair, M. Sarstedt, C. Ringle, Jeanette Mena (2012)
An assessment of the use of partial least squares structural equation modeling in marketing researchJournal of the Academy of Marketing Science, 40
(2014)
Awareness training and education have positive impact on employee attitude and behavior toward information security policy
R. Carson, Yixiao Sun (2005)
The Tobit Model With a Non-Zero ThresholdWiley-Blackwell: Econometrics Journal
R. Shaw, Charlie Chen, Albert Harris, Hui-Jou Huang (2009)
The impact of information richness on information security awareness training effectivenessComput. Educ., 52
Wesley Cohen, Daniel Levinthal (1990)
ABSORPTIVE CAPACITY: A NEW PERSPECTIVE ON LEARNING AND INNOVATIONAdministrative Science Quarterly, 35
A. Alalwan, N. Rana, Yogesh Dwivedi, R. Algharabat (2017)
Social media in marketing: A review and analysis of the existing literatureTelematics Informatics, 34
Esko Penttinen, M. Rossi, V. Tuunainen (2010)
Mobile Games: Analyzing the Needs and Values of the ConsumersThe Journal of Information Technology Theory and Application, 11
International Journal of Educational and Pedagogical Sciences, 3
Chin-Cheh Yi, Peiwen Liao, Chin-Feng Huang, I-Hui Hwang (2009)
Acceptance of Mobile Learning: a Respecification and Validation of Information System Success.World Academy of Science, Engineering and Technology, International Journal of Social, Behavioral, Educational, Economic, Business and Industrial Engineering, 3
S. Jajodia, Noseong Park, Fabio Pierazzi, Andrea Pugliese, Edoardo Serra, Gerardo Simari, V. Subrahmanian (2017)
A Probabilistic Logic of Cyber DeceptionIEEE Transactions on Information Forensics and Security, 12
Chun-Hsien Wang, Ching-hsing Chang, G. Shen (2015)
The effect of inbound open innovation on firm performance: Evidence from high-tech industryTechnological Forecasting and Social Change, 99
S.S. Raghav (2012)
Cyber security in India’s counter terrorism strategy
V. Venkatesh, Susan Brown (2001)
A Longitudinal Investigation of Personal Computers in Homes: Adoption Determinants and Emerging ChallengesMIS Q., 25
Dena Cox, A. Cox, G. Moschis (1990)
When Consumer Behavior Goes Bad: An Investigation of Adolescent ShopliftingJournal of Consumer Research, 17
Sally Dunlop, B. Freeman, Sandra Jones (2016)
Marketing to Youth in the Digital Age: The Promotion of Unhealthy Products and Health Promoting Behaviours on Social MediaMedia and Communication, 4
Modeling the impact of cyber risk for major Dutch organizations
Sheshadri Chatterjee, A. Kar, M. Gupta (2018)
Success of IoT in Smart Cities of India: An empirical analysisGov. Inf. Q., 35
Jorge Cruz-González, P. López-Sáez, J. Navas-López, Miriam Delgado-Verde (2015)
Open search strategies and firm performance: The different moderating role of technological environmental dynamismTechnovation, 35
(2015)
Global cost of conflict reaches $14.3tn, says report
Rupesh Gupta (2014)
The Pattern of Urban Land-use ChangesEnvironment and Urbanization Asia, 5
Hongyu Gao, Jun Hu, Tuo Huang, Jingnan Wang, Yan Chen (2011)
Security Issues in Online Social NetworksIEEE Internet Computing, 15
M. Bogers, A. Zobel, Allan Afuah, E. Almirall, Sabine Brunswicker, Linus Dahlander, L. Frederiksen, A. Gawer, Marc Gruber, Stefan Haefliger, J. Hagedoorn, D. Hilgers, Keld Laursen, M. Magnusson, A. Majchrzak, Ian McCarthy, K. Moeslein, S. Nambisan, F. Piller, Agnieszka Radziwon, C. Rossi‐Lamastra, J. Sims, Anne Wal (2016)
The open innovation research landscape: established perspectives and emerging themes across different levels of analysisIndustry and Innovation, 24
(2018)
Shoplifting statistics
Lawrence Gordon, Martin Loeb (2002)
The economics of information security investment
(2003)
Teaching mixed methods research: practices, dilemmas, and challenges
M. Riccardi, R. Pietro, Marta Palanques, J. Vila (2013)
Titans' revenge: Detecting Zeus via its own flawsComput. Networks, 57
E. Chew, Marianne Swanson, Kevin Stine, Nadya Bartol, Anthony Brown, Will Robinson (2008)
Performance Measurement Guide for Information Security
Jennifer Brundidge (2010)
Encountering "Difference" in the contemporary public sphere: The contribution of the internet to the heterogeneity of political discussion networksJournal of Communication, 60
E. Guba, Y. Lincoln (1994)
Competing paradigms in qualitative research.
Daniel Feledi, Stefan Fenz, Lukas Lechner (2013)
Toward web-based information security knowledge sharingInf. Secur. Tech. Rep., 17
P. Pavlou, Mendel Fygenson (2006)
Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior
T. Aven (2013)
On the Meaning and Use of the Risk Appetite ConceptRisk Analysis, 33
M. Gul, S. Patidar (2015)
Understanding the energy consumption and occupancy of a multi-purpose academic buildingEnergy and Buildings, 87
Luisa Blanco, Robin Grier (2009)
Long Live Democracy: The Determinants of Political Instability in Latin AmericaThe Journal of Development Studies, 45
R. Marcella (2003)
Managing in the Next SocietyJ. Documentation, 59
Xiaolin Zheng, Shuai Zhu, Zhangxi Lin (2013)
Capturing the essence of word-of-mouth for social commerce: Assessing the quality of online e-commerce reviews by a semi-supervised approachDecis. Support Syst., 56
(2018)
Science, research and innovation performance of the EU 2018: strengthening the Foundations for 'Europe's future
Mark Correia, C. Bowling (1999)
Veering Toward Digital Disorder: Computer-Related Crime and Law Enforcement PreparednessPolice Quarterly, 2
S. Moitra (2005)
Developing Policies for CybercrimeEuropean Journal of Crime, Criminal Law and Criminal Justice, 13
David Edelman (2010)
Branding in The Digital Age You're Spending Your Money In All the Wrong PlacesHarvard Business Review, 88
Lisa Steelman, Leah Wolfeld (2018)
The Manager as Coach: The Role of Feedback OrientationJournal of Business and Psychology, 33
Nader Safa, R. Solms, L. Futcher (2016)
Human aspects of information security in organisationsComputer Fraud & Security, 2016
J. Pagett (2010)
Improving residual risk management through the use of security metrics
C. Jha, S. Sarangi (2017)
Does social media reduce corruption?Inf. Econ. Policy, 39
(2017)
Shoplifting and other fraud cost retailers nearly $50 billion last year
Archana Narahari, V. Shah (2016)
Cyber Crime and Security – A Study on Awareness among Young Netizens of Anand (Gujarat State, India)International Journal of Advance Research and Innovative Ideas in Education, 2
Tony Stephanou, R. Dagada (2009)
The Impact of Information Security Awareness Training on Information Security Behaviour: The Case for Further Research
Weiyin Hong, F. Chan, J. Thong, Lewis Chasalow, G. Dhillon (2014)
A Framework and Guidelines for Context-Specific Theorizing in Information Systems ResearchInformation Systems: Behavioral & Social Methods eJournal
H. Issahaku, B. Abu, P. Nkegbe (2018)
Does the Use of Mobile Phones by Smallholder Maize Farmers Affect Productivity in Ghana?Journal of African Business, 19
Y. Yamato, Yoshifumi Fukumoto, Hiroki Kumazaki (2017)
Security camera movie and ERP data matching system to prevent theft2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC)
(2017)
The impact of gender and culture on networking and value creation: an exploratory study in Turkey and MENA region
Ginger Rosenkrans (2009)
The Creativeness and Effectiveness of Online Interactive Rich Media AdvertisingJournal of Interactive Advertising, 9
Sang Lee, Sang-Gun Lee, Sangjin Yoo (2004)
An integrative model of computer abuse based on social control and general deterrence theoriesInf. Manag., 41
S. Covey, Rebecca Merrill (2008)
The Speed of Trust: The One Thing that Changes Everything
A. Segars, V. Grover (1993)
Re-examining perceived ease of use and usefulnessManagement Information Systems Quarterly, 17
S. Kharat (2017)
Cyber Crime – A Threat to Persons, Property, Government and Societies
K. Okada, Sovannroeun Samreth (2012)
The effect of foreign aid on corruption: A quantile regression approach
(2009)
The Moderating Effect of Individual Predispositions
Sherrilyn Billger, R. Goel (2009)
Do existing corruption levels matter in controlling corruption? ☆ ☆☆: Cross-country quantile regression estimatesJournal of Development Economics, 90
Dennis Gioia, Kevin Corley, A. Hamilton (2013)
Seeking Qualitative Rigor in Inductive ResearchOrganizational Research Methods, 16
John Aloysius, Hartmut Hoehle, V. Venkatesh (2016)
Exploiting Big Data for Customer and Retailer Benefits: A Study of Emerging Mobile Checkout ScenariosSSRN Electronic Journal
M. Shareef, Vinod Kumar, U. Kumar, Yogesh Dwivedi (2011)
e-Government Adoption Model (GAM): Differing service maturity levelsGov. Inf. Q., 28
H. Saini, Yerra Rao, T. Panda (2012)
Cyber-Crimes and their Impacts : A Review 1
R. King, Pradeep Racherla, Victoria Bush (2014)
What We Know and Don't Know about Online Word-of-Mouth: A Review and Synthesis of the LiteratureJournal of Interactive Marketing, 28
S. Kim (2005)
The Role of Trust in the Modern Administrative StateAdministration & Society, 37
Tanya Golash‐Boza (2016)
The Parallels between Mass Incarceration and Mass Deportation: An Intersectional Analysis of State RepressionJournal of World-Systems Research, 22
Mattias Elg, Jon Engström, Lars Witell, B. Poksinska (2012)
Co‐creation and learning in health‐care service developmentJournal of Service Management, 23
M. Alomari, P. Woods, K. Sandhu (2012)
Predictors for E-government Adoption in Jordan: Deployment of an Empirical Evaluation Based on a Citizen-centric ApproachInf. Technol. People, 25
R. Hanna, Andrew Rohm, Victoria Crittenden (2011)
We're all connected: The power of the social media ecosystemBusiness Horizons, 54
Paul Hunton (2011)
The stages of cybercrime investigations: Bridging the gap between technology examination and law enforcement investigationComput. Law Secur. Rev., 27
S. Asongu, Sara Roux (2016)
Enhancing ICT for Inclusive Human Development in Sub-Saharan AfricaAARN: Human Borders - Animals
M. Faghani, H. Saidi (2009)
Malware propagation in Online Social Networks2009 4th International Conference on Malicious and Unwanted Software (MALWARE)
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, Ben Zhao (2010)
Detecting and characterizing social spam campaigns
Ross Brown, C. Mason (2014)
Inside the high-tech black box: A critique of technology entrepreneurship policyTechnovation, 34
Vanessa Tchamyou (2019)
The Role of Information Sharing in Modulating the Effect of Financial Access on InequalityJournal of African Business, 20
S. Roper, Jun Du, J. Love (2006)
The innovation value chain
S. Choi, J. Martins, Igor Bernik (2018)
Information security: Listening to the perspective of organisational insidersJournal of Information Science, 44
Rachna Dhamija, J. Tygar, Marti Hearst (2006)
Why phishing worksProceedings of the SIGCHI Conference on Human Factors in Computing Systems
Rebecca Sayles (2014)
Get Your FACTAs Straight: The Application of FACTA's Truncation Provision to Online TransactionsSt. John’s Law Review, 86
Jean Kjellstrand (2017)
Building a Tailored, Multilevel Prevention Strategy to Support Children and Families Affected by Parental IncarcerationSmith College Studies in Social Work, 87
JoAnn Ray (1987)
Every Twelfth Shopper: Who Shoplifts and Why?Families in Society: The Journal of Contemporary Social Services, 68
R. Bouncken, Viktor Fredrich (2016)
Learning in coopetition: Alliance orientation, network size, and firm typesJournal of Business Research, 69
Yu-Hsiu Hung, Hsueh-Yi Lai (2015)
Effects of Facebook Like and Conflicting Aggregate Rating and Customer Comment on Purchase Intentions
Christy Cheung, Matthew Lee (2012)
What drives consumers to spread electronic word of mouth in online consumer-opinion platformsDecis. Support Syst., 53
Inho Hwang, Daejin Kim, Taeha Kim, Sanghyun Kim (2017)
Why not comply with information security? An empirical approach for the causes of non-complianceOnline Inf. Rev., 41
R. Haghighat (2007)
The Development of the Brief Social Desirability Scale (BSDS)Europe’s Journal of Psychology, 3
D. Straub (1990)
Effective IS Security: An Empirical StudyInf. Syst. Res., 1
A. Andrés (2006)
Software piracy and income inequalityApplied Economics Letters, 13
K. Eisenhardt (1989)
Building theories from case study researchSTUDI ORGANIZZATIVI
D. Andrew, P. Pedersen, C. McEvoy (2011)
Research Methods and Design in Sport Management
P. Trott, Dap Hartmann (2009)
WHY 'OPEN INNOVATION' IS OLD WINE IN NEW BOTTLESInternational Journal of Innovation Management, 13
Shalini Chandra, S. Srivastava, Y. Theng (2010)
Evaluating the Role of Trust in Consumer Adoption of Mobile Payment Systems: An Empirical AnalysisCommun. Assoc. Inf. Syst., 27
Sanjay Sisodiya, Jeannie Johnson, Yany Grégoire (2013)
Inbound open innovation for enhanced performance: Enablers and opportunitiesIndustrial Marketing Management, 42
M. Borg (1992)
Conflict management in the modern world-systemSociological Forum, 7
available at: www.stern
D. Gibson (2006)
The Relationship Between Serial Murder and the American Tourism IndustryJournal of Travel & Tourism Marketing, 20
(2016)
Self-service checkouts turn honest shoppers into thieves, warn criminologists
F. Aloul (2011)
The Need for Effective Information Security AwarenessJournal of Advances in Information Technology, 3
Leonard Gordon, Martin Loeb, W. Lucyshyn, Ransom Richardson (2004)
CSI/FBI Computer Crime and Security Survey
George Bongomin, Joseph Ntayi, J. Munene, Charles Malinga (2018)
Mobile Money and Financial Inclusion in Sub-Saharan Africa: the Moderating Role of Social NetworksJournal of African Business, 19
Partnering for cyber resilience, towards the quantification of cyber threats
J. Nzié, J. Bidogeza, Nkwah Ngum (2018)
Mobile Phone Use, Transaction Costs, and Price: Evidence from Rural Vegetable Farmers in CameroonJournal of African Business, 19
Anne-Sophie Fernandez, F. Roy, Devi Gnyawali (2014)
Sources and management of tension in co-opetition case evidence from telecommunications satellites manufacturing in EuropeIndustrial Marketing Management, 43
(2017)
Report: video surveillance shows UCLA players stealing from 3 stores
Guido Rößling, Marius Müller (2009)
Social engineering: a serious underestimated problemProceedings of the 14th annual ACM SIGCSE conference on Innovation and technology in computer science education
Eric Gilbert, Karrie Karahalios (2009)
Predicting tie strength with social mediaProceedings of the SIGCHI Conference on Human Factors in Computing Systems
Insu Cho, Heejun Park, Joseph Kim (2015)
The relationship between motivation and information sharing about products and services on FacebookBehaviour & Information Technology, 34
Aniruddhsinh Parmar, Kuntal Patel (2016)
Critical Study and Analysis of Cyber Law Awareness Among the Netizens
R. Burns, Keith Whitworth, Carol Thompson (2004)
Assessing law enforcement preparedness to address Internet fraudJournal of Criminal Justice, 32
S. Asongu, Jacinta Nwachukwu (2017)
Comparative Human Development Thresholds for Absolute and Relative Pro-Poor Mobile Banking in Developing CountriesSustainability & Economics eJournal
J. Grant, Suck-Won Kim (2002)
An open-label study of naltrexone in the treatment of kleptomania.The Journal of clinical psychiatry, 63 4
S. Asongu (2018)
Persistence in Incarcerations: Global Comparative EvidencePolitical Economy - Development: Public Service Delivery eJournal
S. Asongu (2012)
Financial Development Dynamic Thresholds of Financial Globalization: Evidence from AfricaDevelopment Economics: Regional & Country Studies eJournal
Surbhi Gupta, Abhishek Singhal, Akanksha Kapoor (2016)
A literature survey on social engineering attacks: Phishing attack2016 International Conference on Computing, Communication and Automation (ICCCA)
A. Obuh, I. Babatope (2011)
Cybercrime Regulation: The Nigerian Situation
Vanessa Tchamyou (2017)
The Role of Knowledge Economy in African BusinessJournal of the Knowledge Economy, 8
Rima Ariss (2010)
On the implications of market power in banking: Evidence from developing countriesJournal of Banking and Finance, 34
Shuili Du, Goksel Yalcinkaya, Ludwig Bstieler (2016)
Sustainability, Social Media Driven Open Innovation, and New Product Development Performance*Journal of Product Innovation Management, 33
Stephan Wagner, N. Neshat (2010)
Assessing the vulnerability of supply chains using graph theoryInternational Journal of Production Economics, 126
David Wall (2007)
Cybercrime: The Transformation of Crime in the Information Age
Oasis Kodila‐Tedika, S. Asongu (2015)
The Effect of Intelligence on Financial Development: A Cross-Country ComparisonBehavioral & Experimental Economics eJournal
Kathleen Beegle, L. Christiaensen, A. Dabalen, Isis Gaddis (2016)
Poverty in a Rising Africa
Therese Krasnovsky, R. Lane (1998)
Shoplifting: A review of the literatureAggression and Violent Behavior, 3
Tatbeeq Raza-Ullah, M. Bengtsson, S. Kock (2014)
The coopetition paradox and tension in coopetition at multiple levelsIndustrial Marketing Management, 43
M. Knudsen, T. Mortensen (2011)
Some immediate – but negative – effects of openness on product development performanceTechnovation, 31
Diana Mutz (2006)
Hearing the Other Side: Deliberative versus Participatory Democracy
Sangseo Park, T. Ruighaver (2008)
Strategic Approach to Information Security in Organizations2008 International Conference on Information Science and Security (ICISS 2008)
Risk taxonomy
J. Brooke (1996)
SUS: A 'Quick and Dirty' Usability Scale
M. Robertson, Geraldine Hammersley (2000)
Knowledge management practices within a knowledge‐intensive firm: the significance of the people management dimensionJournal of European Industrial Training, 24
Li-tze Hu, P. Bentler (1999)
Cutoff criteria for fit indexes in covariance structure analysis : Conventional criteria versus new alternativesStructural Equation Modeling, 6
T. Rietveld, R. Hout (2015)
The paired t test and beyond: Recommendations for testing the central tendencies of two paired samples in research on speech, language and hearing pathology.Journal of communication disorders, 69
Mayanka Chhonkera, Deepak Vermaa, Arpan Karb (2018)
Information Technology and Quantitative Management ( ITQM 2017 ) Review of Technology Adoption frameworks in Mobile Commerce
incent Dutota, Franç Bergeronb, Louis Raymondc (2014)
nformation management for the internationalization of SMEs : An xploratory study based on a strategic alignment perspective
David Kreps, Kai Kimppa (2015)
Theorising Web 3.0: ICTs in a changing societyInf. Technol. People, 28
D. Straub, R. Welke (1998)
Coping With Systems Risk: Security Planning Models for Management Decision MakingMIS Q., 22
R. Bagozzi (1982)
A Field Investigation of Causal Relations among Cognitions, Affect, Intentions, and BehaviorJournal of Marketing Research, 19
M. Wolfinbarger, M. Gilly (2001)
Shopping Online for Freedom, Control, and FunCalifornia Management Review, 43
Diana Mutz (2002)
Cross-cutting Social Networks: Testing Democratic Theory in PracticeAmerican Political Science Review, 96
Journal of Science and Technology Policy Management, 9
Kawal Kapoor, K. Tamilmani, N. Rana, Pushp Patil, Yogesh Dwivedi, Sridhar Nerur (2018)
Advances in Social Media Research: Past, Present and FutureInformation Systems Frontiers, 20
J. Abor, M. Amidu, H. Issahaku (2018)
Mobile Telephony, Financial Inclusion and Inclusive GrowthJournal of African Business, 19
S. Asongu, Jacinta Nwachukwu (2017)
Openness, ICT and Entrepreneurship in Sub-Saharan AfricaDevelopment Economics: Macroeconomic Issues in Developing Economies eJournal
Lawrence Gordon, Martin Loeb (2006)
Economic aspects of information security: An emerging field of researchInformation Systems Frontiers, 8
O. Vins, M. Koetter (2008)
The Quiet Life Hypothesis in Banking - Evidence from German Savings Banks
S. Chang, C. Ho (2006)
Organizational factors to the effectiveness of implementing information security managementInd. Manag. Data Syst., 106
Kenneth Knapp, T. Marshall, R. Rainer, F. Ford (2007)
Information Security Effectiveness: Conceptualization and Validation of a TheoryInt. J. Inf. Secur. Priv., 1
N. Gcaza, R. Solms, M. Grobler, J. Vuuren (2017)
A general morphological analysis: delineating a cyber-security cultureInf. Comput. Secur., 25
M. Siponen, Seppo Pahnila, M. Mahmood (2010)
Compliance with Information Security Policies: An Empirical InvestigationComputer, 43
(2017)
Annual retail theft survey
W. Mazurczyk, K. Szczypiorski, Zoran Duric, Dengpan Ye (2016)
CybercrimeHEADline, 33
Marcie Goodman, S. Brenner (2002)
The Emerging Consensus on Criminal Conduct in CyberspaceInt. J. Law Inf. Technol., 10
Huigang Liang, Yajiong Xue (2010)
Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance PerspectiveJ. Assoc. Inf. Syst., 11
Stephen Newman (1986)
Strong Democracy: Participatory Politics for a New AgeTelos, 1986
Tzameret Rubin, T. Aas, A. Stead (2015)
Knowledge flow in Technological Business Incubators: Evidence from Australia and IsraelTechnovation, 41
Bistra Nikiforova (2013)
Social media in travel, tourism and hospitality: theory, practice and casesJournal of Tourism History, 5
S. Asongu, Agyenim Boateng (2018)
Introduction to Special Issue: Mobile Technologies and Inclusive Development in AfricaJournal of African Business, 19
Pietro Ortoleva, E. Snowberg (2013)
Overconfidence in Political BehaviorERN: Models of Political Processes: Rent-Seeking
Lorenzo Massa, Christopher Tucci, Allan Afuah (2017)
A Critical Assessment of Business Model ResearchThe Academy of Management Annals, 11
M. Turner, B. Kitchenham, P. Brereton, S. Charters, D. Budgen (2010)
Does the technology acceptance model predict actual use? A systematic literature reviewInf. Softw. Technol., 52
Diego Comin, B. Hobijn (2006)
An Exploration of Technology DiffusionEconomic Growth
D. D'Amico, Claudia Williamson (2015)
Do legal origins affect cross-country incarceration rates?Journal of Comparative Economics, 43
Ellen Enkel, O. Gassmann, H. Chesbrough (2009)
Open R&D and Open Innovation: Exploring the PhenomenonNew Institutional Economics
Sheshadri Chatterjee, A. Kar (2017)
Effects of successful adoption of information technology enabled services in proposed smart cities of India, 9
Montfort Mlachila, René Tapsoba, S. Tapsoba (2014)
A Quality of Growth Index for Developing Countries: A ProposalSocial Indicators Research, 134
T. Lennerfors, Per Fors, J. Rooijen (2015)
ICT and environmental sustainability in a changing society: The view of ecological World Systems TheoryInf. Technol. People, 28
Nader Safa, Mehdi Sookhak, R. Solms, S. Furnell, N. Ghani, T. Herawan (2015)
Information security conscious care behaviour formation in organizationsComput. Secur., 53
(2012)
Qualitative inquiry & choosing among five approaches
A. Tatnall (2015)
Computer education and societal change: History of early courses in computing in universities and schools in VictoriaInf. Technol. People, 28
W. Rutten, Joyce Blaas-Franken, H. Martin (2016)
The impact of (low) trust on knowledge sharingJ. Knowl. Manag., 20
(2001)
Peer influence was found to be a determinant for shoplifters
C. Jha, Oasis Kodila‐Tedika (2020)
Does Social Media Promote Democracy? Some Empirical Evidence
J. Bergh, Stijn Viaene (2015)
Key Challenges for the Smart City: Turning Ambition into Reality2015 48th Hawaii International Conference on System Sciences
Hsinchun Chen, D. Zeng, H. Atabakhsh, Wojciech Wyzga, Jennifer Schroeder (2003)
COPLINK: managing law enforcement data and knowledgeCommun. ACM, 46
Jose Benitez-Amado, Gautam Ray, J. Henseler (2018)
Impact of Information Technology Infrastructure Flexibility on Mergers and AcquisitionsMIS Q., 42
J. Hagen, E. Albrechtsen, J. Hovden (2008)
Implementation and effectiveness of organizational information security measuresInf. Manag. Comput. Secur., 16
Yogesh Dwivedi, N. Rana, M. Janssen, Banita Lal, Michael Williams, Marc Clement (2017)
An empirical validation of a unified model of electronic government adoption (UMEGA)Gov. Inf. Q., 34
Janne Lahtiranta, J. Koskinen, Sari Knaapi-Junnila, M. Nurminen (2015)
Sensemaking in the personal health spaceInf. Technol. People, 28
J. Sánchez, Alejandro Cañas, J. Novak, Eds, Katrin Soika, P. Reiska, R. Mikser (2010)
THE IMPORTANCE OF ANIMATION AS A VISUAL METHOD IN LEARNING CHEMISTRY
S. Hove, Bente Anda (2005)
Experiences from conducting semi-structured interviews in empirical software engineering research11th IEEE International Software Metrics Symposium (METRICS'05)
Vasilios Katos, P. Bednar (2008)
A cyber-crime investigation frameworkComput. Stand. Interfaces, 30
Sang Kim, Hyunsun Park (2013)
Effects of various characteristics of social commerce (s-commerce) on consumers' trust and trust performanceInt. J. Inf. Manag., 33
R. Koenker, G. Bassett (2007)
Regression Quantiles
Pablo Barberá, Gonzalo Rivero (2015)
Understanding the Political Representativeness of Twitter UsersSocial Science Computer Review, 33
W. Flores, E. Antonsen, M. Ekstedt (2014)
Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national cultureComput. Secur., 43
F. Zhao, A. Scavarda, Marie-France Waxin (2012)
Key issues and challenges in e-government development: An integrative case study of the number one eCity in the Arab WorldInf. Technol. People, 25
B. Fogg (2008)
Mass Interpersonal Persuasion: An Early View of a New Phenomenon
Gregory Fisher, Eric Fang (2018)
Customer-driven innovation: a conceptual typology, review of theoretical perspectives, and future research directions
(2001)
2016; Yang et al., 2016), including shoplifting (Tonglet
(2010)
Structural equation modeling in information system research using partial least squares
D. Black (1990)
The Elementary Forms of Conflict Management
Journal of Computer-Mediated Communication, 13
Shumaila Yousafzai, G. Foxall, J. Pallister (2010)
Explaining Internet Banking Behavior: Theory of Reasoned Action, Theory of Planned Behavior, or Technology Acceptance Model?Journal of Applied Social Psychology, 40
R. Werlinger, K. Hawkey, K. Beznosov (2009)
An integrated view of human, organizational, and technological challenges of IT security managementInf. Manag. Comput. Secur., 17
E. Abelson (1992)
When Ladies Go A-Thieving: Middle-Class Shoplifters in the Victorian Department Store
(2016)
Towards measuring and mitigating social engineering software attacks
S. Philippsohn (2001)
Special Features: Trends In Cybercrime - An Overview Of Current Financial Crimes On The InternetComputers & Security, 20
C. Cooper, Luo Lu (2016)
Presenteeism as a global phenomenon: unraveling the psychosocial mechanisms from the perspective of social cognitive theory, 23
2016 financial industry cybersecurity report
(2001)
Consumer misbehavior: an exploratory study of shoplifting
H. Boateng, Diyawu Adam, A. Okoe, T. Anning-Dorson (2016)
Assessing the determinants of internet banking adoption intentions: A social cognitive theory perspectiveComput. Hum. Behav., 65
N. Arachchilage, S. Love (2014)
Security awareness of computer users: A phishing threat avoidance perspectiveComput. Hum. Behav., 38
(2012)
Smart city framework: a systematic process for enabling smart connected communities
V. Venkatesh, Fred Davis (2000)
A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field StudiesManagement Science, 46
Emmeline Taylor (2016)
Supermarket self-checkouts and retail theft: The curious case of the SWIPERSCriminology & Criminal Justice, 16
(2011)
A Frame Works for ICT Policy: Government, Social and Legal Issues
B. Tether (2002)
Who co-operates for innovation, and why: An empirical analysisResearch Policy, 31
M. Sheehan (2016)
Leadership Style and Behaviour, Employee Knowledge- Sharing and Innovation Probability
Sheshadri Chatterjee, A. Kar, M. Gupta (2018)
Alignment of IT Authority and Citizens of Proposed Smart Cities in India: System Security and Privacy PerspectiveGlobal Journal of Flexible Systems Management, 19
Katja Hutter, Julia Hautz, Severin Dennhardt, J. Füller (2013)
The Impact of User Interactions in Social Media on Brand Awareness and Purchase Intention: The Case of MINI on FacebookJournal of Product & Brand Management, 22
Sarv Devaraj, Ming Fan, R. Kohli (2002)
Antecedents of B2C Channel Satisfaction and Preference: Validating e-Commerce MetricsInf. Syst. Res., 13
Atif Ahmad, R. Bosua, Rens Scheepers (2014)
Protecting organizational competitive advantage: A knowledge leakage perspectiveComput. Secur., 42
A. Akinwale (2011)
Integrating the traditional and the modern conflict management strategies in NigeriaAfrican Journal on Conflict Resolution, 10
Donghee Shin (2013)
User experience in social commerce: in friends we trustBehaviour & Information Technology, 32
Linus Wilson, B. Moody, Alexander Groh, Qingxiong Ma, Mark Schmidt, J. Pearson (2009)
An Integrated Framework for Information Security Management, 30
J. Robinson, Eleanor Bailey, S. Hetrick, Steve Paix, Matt O'Donnell, Georgina Cox, M. Ftanou, Jaelea Skehan (2017)
Developing Social Media-Based Suicide Prevention Messages in Partnership With Young People: Exploratory StudyJMIR Mental Health, 4
Devi Gnyawali, Byung-Jin Park (2009)
Co‐opetition and Technological Innovation in Small and Medium‐Sized Enterprises: A Multilevel Conceptual ModelJournal of Small Business Management, 47
P. Chan, Wei Fan, A. Prodromidis, S. Stolfo (1999)
Distributed data mining in credit card fraud detectionIEEE Intell. Syst., 14
T. Schøtt, Mahdokht Sedaghat (2014)
Innovation embedded in entrepreneurs’ networks and national educational systemsSmall Business Economics, 43
(2014)
Authors present an empirical investigation on what behavioral information security governance factors drive the establishment of information security knowledge sharing in organizations
S. Mehta, Vikram Singh (2013)
A STUDY OF AWARENESS ABOUT CYBERLAWS IN THE INDIAN SOCIETY
Math 408, actuarial statistics I
Henry Dalziel (2015)
Cyber Kill Chain
Baozhou Lu, Weiguo Fan (2016)
Social Presence, Trust, and Social Commerce Purchase Intention: an Empirical ResearchComput. Hum. Behav., 56
Yogesh Dwivedi, N. Rana, A. Jeyaraj, Marc Clement, Michael Williams (2017)
Re-examining the Unified Theory of Acceptance and Use of Technology (UTAUT): Towards a Revised Theoretical ModelInformation Systems Frontiers, 21
D. Shaheen (2012)
Shaheen Dhada and Renu Shrinivas case of Maharastra
Kevin Gatzlaff, Kathleen McCullough (2008)
The Effect of Data Breaches on Shareholder WealthCorporate Finance: Valuation
Eric Hippel (2005)
Democratizing innovation: The evolving phenomenon of user innovationJournal für Betriebswirtschaft, 55
Issa Atoum, A. Otoom, Amer Abu-Ali (2014)
A holistic cyber security implementation frameworkInf. Manag. Comput. Secur., 22
Planning for and implementing ISO 27001
D. Aloini, L. Pellegrini, V. Lazzarotti, R. Manzini (2015)
Technological strategy, open innovation and innovation performance: evidences on the basis of a structural-equation-model approachMeasuring Business Excellence, 19
Navarrete Enrique (2006)
Practical Calculation of Expected and Unexpected Losses in Operational Risk by Simulation Methods
Christopher Wildeman, E. Wang (2017)
Mass incarceration, public health, and widening inequality in the USAThe Lancet, 389
L. Stoker, M. Jennings (2008)
Of Time and the Development of Partisan PolarizationAmerican Journal of Political Science, 52
Ulf Elg (2015)
Inter-firm market orientation and the influence of network and relational factors
J. D'Arcy, A. Hovav, D. Galletta (2009)
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence ApproachInf. Syst. Res., 20
Sara Trigueros-Preciado, Daniel González, Pedro González (2013)
Cloud computing in industrial SMEs: identification of the barriers to its adoption and effects of its applicationElectronic Markets, 23
Michael Stanko, Gregory Fisher, M. Bogers (2017)
Under the Wide Umbrella of Open InnovationJournal of Product Innovation Management, 34
Fred Davis, R. Bagozzi, P. Warshaw (1989)
User Acceptance of Computer Technology: A Comparison of Two Theoretical ModelsManagement Science, 35
Siri Skaaland (2008)
Measuring the effectiveness of information security controls
William Wood (2015)
WHY RESTORATIVE JUSTICE WILL NOT REDUCE INCARCERATIONBritish Journal of Criminology, 55
V. Lazzarotti, R. Manzini, L. Pellegrini (2015)
Is your open-innovation successful? The mediating role of a firm's organizational and social contextThe International Journal of Human Resource Management, 26
Salvatore Parise, P. Guinan (2008)
Marketing Using Web 2.0Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)
Kayhan Tajeddini, M. Trueman (2008)
The potential for innovativeness: a tale of the Swiss watch industryJournal of Marketing Management, 24
Daniel Rempala, Bradley Okdie (2017)
Safe harbor: Personality and the acceptance of online piracyPersonality and Individual Differences, 119
O. Vel, Alison Anderson, M. Corney, G. Mohay (2001)
Mining e-mail content for author identification forensicsSIGMOD Rec., 30
Kayhan Tajeddini, V. Ratten (2017)
The moderating effect of brand orientation on inter-firm market orientation and performanceJournal of Strategic Marketing, 28
Peter Dahlgren (2005)
The Internet, Public Spheres, and Political Communication: Dispersion and DeliberationPolitical Communication, 22
J. Goodman, Gabriele Paolacci (2017)
Crowdsourcing Consumer ResearchJournal of Consumer Research, 44
T. Tryfonas, E. Kiountouzis, A. Poulymenakou (2001)
Embedding security practices in contemporary information systems development approachesInf. Manag. Comput. Secur., 9
R. Baskerville, P. Spagnoletti, Jongwoo Kim (2014)
Incident-centered information security: Managing a strategic balance between prevention and responseInf. Manag., 51
F. Rowe, R. Baskerville, F. Wolff (2012)
Functionality vs. Security in IS: Tradeoff or Equilibrium?
M. Goldman (1991)
Kleptomania: making sense of the nonsensical.The American journal of psychiatry, 148 8
Abdel Nasser, H. Zaied (2012)
An Integrated Success Model for Evaluating Information System in Public Sectors
(2017)
UCLA basketball players LiAngelo Ball, Cody Riley and Jalen Hill suspended
P. Lowry, Jun Zhang, Chuang Wang, M. Siponen (2016)
Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning ModelInf. Syst. Res., 27
Heith Copes, R. Tewksbury (2011)
Criminal experience and perceptions of risk: what auto thieves fear when stealing carsJournal of Crime and Justice, 34
N. Rana, Yogesh Dwivedi, Michael Williams, V. Weerakkody (2016)
Adoption of online public grievance redressal system in India: Toward developing a unified viewComput. Hum. Behav., 59
Megan Kopkin, S. Brodsky, D. DeMatteo (2017)
Risk assessment in sentencing decisions: a remedy to mass incarceration?Journal of Aggression, Conflict and Peace Research, 9
Lois Stevenson (1990)
Some methodological problems associated with researching women entrepreneursJournal of Business Ethics, 9
J. Eckhardt, Michael Ciuchta, Mason Carpenter (2018)
Open innovation, information, and entrepreneurship within platform ecosystemsStrategic Entrepreneurship Journal
Iris Vermeir, T. Bock, P. Kenhove (2017)
The effectiveness of fear appeals featuring fines versus social disapproval in preventing shoplifting among adolescentsPsychology & Marketing, 34
Stearns Broadhead (2018)
The contemporary cybercrime ecosystem: A multi-disciplinary overview of the state of affairs and developmentsComput. Law Secur. Rev., 34
S. Asongu, Jacinta Nwachukwu (2016)
The Role of Governance in Mobile Phones for Inclusive Human Development in Sub-Saharan AfricaPolitical Anthropology eJournal
A. Singh, M. Gupta, Amitabh Ojha (2014)
Identifying factors of "organizational information security management"J. Enterp. Inf. Manag., 27
(2012)
State of cyber security and the factors governing its protection in Malaysia
(2008)
Information technology and its implications for internal auditing
American Economic Review, 100
Xu Cheng, C. Dale, Jiangchuan Liu (2008)
Statistics and Social Network of YouTube Videos2008 16th Interntional Workshop on Quality of Service
G. Jungck (1963)
The Extreme Value TheoremAmerican Mathematical Monthly, 70
N. Allan, N. Cantle, P. Godfrey, Yun Yin (2013)
A review of the use of complex systems applied to risk appetite and emerging risks in ERM practiceBritish Actuarial Journal, 18
Shamal Faily, I. Flechais (2010)
Designing and Aligning e-Science Security Culture with DesignInf. Manag. Comput. Secur., 18
L. Stoddart (2001)
Managing intranets to encourage knowledge sharing: opportunities and constraintsOnline Inf. Rev., 25
Ziying Tan, Xingyun Liu, Xiaoqian Liu, Q. Cheng, T. Zhu (2017)
Designing Microblog Direct Messages to Engage Social Media Users With Suicide Ideation: Interview and Survey Study on WeiboJournal of Medical Internet Research, 19
Ronnie Santos, F. Silva, C. Magalhães, Cleviton Monteiro (2016)
Building a Theory of Job Rotation in Software Engineering from an Instrumental Case Study2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE)
James Richards (1998)
Transnational Criminal Organizations, Cybercrime, and Money Laundering: A Handbook for Law Enforcement Officers, Auditors, and Financial Investigators
E. Huizingh (2011)
Open innovation: State of the art and future perspectivesTechnovation, 31
(2018)
Deploying social network security awareness through mass interpersonal persuasion (MIP)
H. Kulmala, M. Ojala, Lea Ahoniemi, E. uusi-Rauva (2006)
Unit cost behaviour in public sector outsourcingInternational Journal of Public Sector Management, 19
N. Patrignani, D. Whitehouse (2015)
Slow tech: bridging computer ethics and business ethicsInf. Technol. People, 28
E. Spafford (1989)
The internet worm program: an analysisComput. Commun. Rev., 19
P. Lowry, Jun Zhang, Tailai Wu (2017)
Nature or Nurture? A Meta-Analysis of the Factors That Maximize the Prediction of Digital Piracy by Using Social Cognitive Theory as a FrameworkInformation Systems: Behavioral & Social Methods eJournal
Justin Davis (2012)
Examining perceptions of local law enforcement in the fight against crimes with a cyber componentPolicing-an International Journal of Police Strategies & Management, 35
R. Afutu-Kotey, K. Gough, G. Owusu (2017)
Young Entrepreneurs in the Mobile Telephony Sector in Ghana: From Necessities to AspirationsJournal of African Business, 18
Kevin Stine (2022)
Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1 (French Translation)
Mark Brown, Nigel Pope, K. Voges (2003)
Buying or browsing? An exploration of shopping orientations and online purchase intentionEuropean Journal of Marketing, 37
(2013)
Mobile point-of-sale and loss prevention: an assessment of risk
M. Cusson, M. Cusson (2006)
SITUATIONAL DETERRENCE : FEAR DURING THE CRIMINAL EVENT by
C. Verbano, M. Crema, K. Venturini (2015)
The Identification and Characterization of Open Innovation Profiles in Italian Small and Medium‐sized EnterprisesJournal of Small Business Management, 53
Paolo Coccorese, Alfonso Pellecchia (2010)
Testing the Quiet Life Hypothesis in the Italian Banking IndustryEuropean Finance eJournal
Moorad Choudhry (1999)
An Introduction to Value-at-Risk
B. Kelly (1999)
PRESERVE, PROTECT, AND DEFENDJournal of Business Strategy, 20
T. Johnson (2005)
Computer Security Incident Handling Guide
H. Chesbrough (2003)
Open Innovation: The New Imperative for Creating and Profiting from Technology
C. McClellan, Mir Ali, R. Mutter, L. Kroutil, Justin Landwehr (2017)
Using social media to monitor mental health discussions − evidence from TwitterJournal of the American Medical Informatics Association, 24
Wynne Chin, P. Todd (1995)
On the use, usefulness, and ease of use of structural equation modeling in MIS research: a note of cautionManagement Information Systems Quarterly, 19
Sheshadri Chatterjee, A. Kar, M. Gupta (2017)
Critical Success Factors to Establish 5G Network in Smart Cities: Inputs for Security and PrivacyJ. Glob. Inf. Manag., 25
Jingguo Wang, Aby Chaudhury, H. Rao (2008)
Research Note - A Value-at-Risk Approach to Information Security InvestmentInf. Syst. Res., 19
Lloyd Klemke (1992)
The Sociology of Shoplifting: Boosters and Snitches Today
(2012)
Preventing cyber crime: a study regarding awareness of cyber crime in tricity
Teodora Tatu, Clara Ament, Lennart Jaeger (2018)
Lessons Learned from an Information Security Incident: A Practical Recommendation to Involve Employees in Information Security
M. Thomson, R. Solms (1998)
Information security awareness: educating your users effectivelyInf. Manag. Comput. Secur., 6
V. Venkatesh, John Aloysius, Hartmut Hoehle, Scot Burton (2017)
Design and Evaluation of Auto-ID Enabled Shopping Assistance Artifacts in Customers’ Mobile Phones: Two Retail Store Laboratory ExperimentsEngRN: Communication System (Topic)
V. Venkatesh, Fred Davis (1996)
A Model of the Antecedents of Perceived Ease of Use: Development and Test†Decision Sciences, 27
Ha Hoang, B. Antoncic (2003)
Network-based research in entrepreneurship A critical reviewJournal of Business Venturing, 18
(2013)
Purpose and function creep by design: transforming the face of surveillance through the IoT
M. Fritsch, Michael Wyrwich (2018)
Regional knowledge, entrepreneurial culture, and innovative start-ups over time and space―an empirical investigationSmall Business Economics, 51
H. Jahankhani, Ameer Al-Nemrat, A. Hosseinian-Far (2014)
Cybercrime classification and characteristics
John Cusick (2014)
A review of: ‘Social media in travel, tourism and hospitality: theory, practice and cases’Tourism Geographies, 16
Seyyed-Abdolhamid Mirhosseini (2020)
Designing Qualitative Studies
The benefits, limits of cyber value-at-risk
(2004)
Information security education assessed the extent to which companies used education activities or efforts to make employees aware of the environment, policy and manual of an organization’s security
S. Park (2009)
An Analysis of the Technology Acceptance Model in Understanding University Students' Behavioral Intention to Use e-LearningJ. Educ. Technol. Soc., 12
The Impact of the Global Crisis on SME and Entrepreneurship Financing and Policy Responses
Sarah Gordon, Richard Ford (2006)
On the definition and classification of cybercrimeJournal in Computer Virology, 2
Yuanyuan Chang, Huo-Tsan Chang, Hui-Ru Chi, Ming-Huei Chen, Lina Deng (2012)
How do established firms improve radical innovation performance? The organizational capabilities viewTechnovation, 32
Making sense of risk appetite, tolerance, and acceptance
Huseyin Cavusoglu, Srinivasan Raghunathan, H. Cavusoglu (2009)
Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection SystemsInf. Syst. Res., 20
S. Asongu (2014)
The impact of health worker migration on development dynamics: evidence of wealth effects from AfricaThe European Journal of Health Economics, 15
Solomon Messing, S. Westwood (2014)
Selective Exposure in the Age of Social MediaCommunication Research, 41
Diego Comin, B. Hobijn (2008)
An Exploration of Technology DiffusionIRPN: Innovation & Economic Growth (Topic)
M. Yadav, Kristine Valck, T. Hennig-Thurau, D. Hoffman, Martin Spann (2013)
Social Commerce: A Contingency Framework for Assessing Marketing PotentialJournal of Interactive Marketing, 27
(2016)
Mobile scan and pay technology could promote supermarket theft, study suggests
(2014)
Mapping twitter topic networks: from polarized crowds to community clusters
(2013)
Government of India ministry of electronics & information technology
T. Minshall, L. Mortara, R. Valli, D. Probert (2010)
Making “Asymmetric” Partnerships WorkResearch-Technology Management, 53
Tesis Kepatuhan, Penderita Diabetes, Mellitus Tipe, Yang Menjalani, Terapi Diet, Ditinjau Dari, Penelitian Kasus, Oleh Elfa, Lailatul Izza, Program Studi, Magister Keperawatan, F. Keperawatan, Universitas Airlangga, Elfa Izza, berbagai pihak, Maka itu, terimakasih segenap, hati tulus, diucapkan kepada, Johan Yuswanto, waktu luang, memberikan yang, sangat memberikan, fasilitas motivasi, dalam menyelesaikan, proses pendidikan, selaku penguji, yang memberikan, arahan masukan (2008)
THEORY OF PLANNED BEHAVIOUR
Vietnamese Firms (2014)
STOCHASTIC FRONTIER ANALYSIS OF
C. Fornell, D. Larcker (1981)
Evaluating Structural Equation Models with Unobservable Variables and Measurement ErrorJournal of Marketing Research, 18
Pablo Barberá (2014)
How Social Media Reduces Mass Political Polarization. Evidence from Germany, Spain, and the U.S.
S. Ray (2013)
Numerical solutions of (1 + 1) dimensional time fractional coupled Burger equations using new coupled fractional reduced differential transform methodInt. J. Comput. Sci. Math., 4
M. Holbrook, E. Hirschman (1982)
The Experiential Aspects of Consumption: Consumer Fantasies, Feelings, and FunJournal of Consumer Research, 9
M. Whitman (2004)
In defense of the realm: understanding the threats to information securityInt. J. Inf. Manag., 24
(1982)
Prospective shoplifters who desire to shoplift but never found
Jerome Smith (1975)
FactoringIEEE Engineering Management Review, 3
José Sousa, D. Mirza, T. Verdier (2009)
Trade and the Spillovers of Transnational TerrorismSwiss Journal of Economics and Statistics, 145
Petri Puhakainen, M. Siponen (2010)
Improving Employees' Compliance Through Information Systems Security Training: An Action Research StudyMIS Q., 34
M. Crossan, Marina Apaydin (2010)
A Multi-Dimensional Framework of Organizational Innovation: A Systematic Review of the LiteratureIO: Productivity
Lecture 5: the Poisson distribution
Kevin Corley, Dennis Gioia (2004)
Identity Ambiguity and Change in the Wake of a Corporate Spin-offAdministrative Science Quarterly, 49
B. Sullivan (2013)
Glossary of Defined Terms
J. Rivera-Vazquez, Lillian Ortiz-Fournier, Felix Flores (2009)
Overcoming cultural barriers for innovation and knowledge sharingJ. Knowl. Manag., 13
S. Asongu, P. Acha-Anyi (2017)
The Murder Epidemic: A Global Comparative StudyInternational Criminal Justice Review, 29
Susan Brown, V. Venkatesh (2005)
Model of Adoption and Technology in Households: A Baseline Model Test and Extension Incorporating Household Life CycleMIS Q., 29
E. Colleoni, A. Rozza, A. Arvidsson (2014)
Echo Chamber or Public Sphere? Predicting Political Orientation and Measuring Political Homophily in Twitter Using Big DataJournal of Communication, 64
(2018)
15 celebrities busted for shoplifting (and what they stole!)
P. Belsis, S. Kokolakis, E. Kiountouzis (2005)
Information systems security from a knowledge management perspectiveInf. Manag. Comput. Security, 13
M. Levi, D. Wall (2004)
Technologies, Security, and Privacy in the Post-9/11 European Information SocietyJournal of Law and Society, 31
Gregory Schlueter, Francis O'Neal, JoAnn Hickey, Gloria Seiler (1989)
Rational vs. Nonrational Shoplifting Types; The Implications for Loss Prevention StrategiesInternational Journal of Offender Therapy and Comparative Criminology, 33
T. Longstaff, E. Schultz (1993)
Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious codeComput. Secur., 12
Andrew Foster, M. Rosenzweig (2010)
Microeconomics of Technology Adoption.Annual review of economics, 2
V. Weerakkody, Z. Irani, Kawal Kapoor, U. Sivarajah, Yogesh Dwivedi (2017)
Open data and its usability: an empirical view from the Citizen’s perspectiveInformation Systems Frontiers, 19
S. Asongu, Jacinta Nwachukwu (2017)
Quality of Growth Empirics: Comparative Gaps, Benchmarking and Policy SyndromesLaw
(2017)
2017), especially in business environments, where the competitiveness
N. Doherty, H. Fulford (2006)
Aligning the information security policy with the strategic information systems planComput. Secur., 25
The purpose of this paper is to identify the factors influencing the citizens of India to prevent cybercrimes in the proposed Smart Cities of India.Design/methodology/approachA conceptual model has been developed for identifying factors preventing cybercrimes. The conceptual model was validated empirically with a sample size of 315 participants from India. Data were analyzed using structural equation modeling with SPSS and AMOS softwares.FindingsThe study reveals that the “awareness of cybercrimes” significantly influences the actual usage of technology to prevent cybercrimes in Smart Cities of India. The study reveals that government initiative (GI) and legal awareness are less influential in spreading of the awareness of cybercrimes (AOC) to the citizens of the proposed smart cities.Research limitations/implicationsThe conceptual model utilizes two constructs from the technology adoption model, namely, perceived usefulness and ease of use. The study employs other factors such as social media, word of mouth, GIs, legal awareness and organizations constituting entities spreading awareness from different related literature works. Thereby, a comprehensive theoretical conceptual model has been proposed which helps to identify the factors that may help in preventing cybercrimes.Practical implicationsThis study provides an insight to the policy maker to understand several factors influencing the AOC of the citizens of the proposed Smart Cities of India for the prevention of cybercrimes.Originality/valueThere are few existing studies analyzing the effect of AOC to mitigate cybercrimes. Thus, this study offers a novel contribution.
Information Technology and People – Emerald Publishing
Published: Sep 23, 2019
Keywords: Smart city; Cyber security; Digital services; Cyber-infrastructure
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.