Scott R. Boss
Scott R. Boss
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security
SR Boss, LJ Kirsch, I Angermeier, RA Shingler, RW Boss
European Journal of Information Systems 18 (2), 151-164, 2009
What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors
S Boss, D Galletta, PB Lowry, GD Moody, P Polak
MIS Quarterly (MISQ) 39 (4), 837-864, 2015
The last line of defense: motivating employees to follow corporate security guidelines
L Kirsch, S Boss
ICIS 2007 proceedings, 103, 2007
The last line of defense: motivating employees to follow corporate security guidelines
L Kirsch, S Boss
ICIS 2007 proceedings, 103, 2007
Friends don't make friends good citizens, but advisors do
TJ Zagenczyk, R Gibney, AJ Murrell, SR Boss
Group & Organization Management 33 (6), 760-780, 2008
Factors associated with IT audits by the internal audit function
MJ Abdolmohammadi, SR Boss
International Journal of Accounting Information Systems 11 (3), 140-151, 2010
Control, perceived risk, and information security precautions: external and internal motivations for security behavior
SR Boss
University of Pittsburgh, 2007
Handoff processes, information quality and patient safety
JL Gogan, RJ Baxter, SR Boss, AM Chircu
Business Process Management Journal, 2013
The dark side of online knowledge sharing (retracted)
AL Smith, RJ Baxter, SR Boss, JE Hunton
Journal of Information Systems 26 (2), 71-91, 2012
Medication errors, handoff processes and information quality
AM Chircu, JL Gogan, SR Boss, R Baxter
Business Process Management Journal, 2013
Control, Risk and Information Security Precautions
SR Boss
Scared Straight: An Empirical Comparison of Two Major Theoretical Models Explaining User Backups
S Boss, D Galletta
Proceedings of the International Research Symposium on Accounting …, 2008
The White-Collar Hacking Contest: A Novel Approach to Teach Forensic Investigations in a Digital World
M Schermann, SR Boss
A. Vance, R. Raghav, J. Allen. Proceedings of, 2014
Handoffs and medication errors: A community hospital case study
AM Chircu, JL Gogan, RJ Baxter, SR Boss
2011 44th Hawaii International Conference on System Sciences, 1-10, 2011
Familiarity breeds content: How fear of cybercrime influences individual precaution-taking behavior
SR Boss, LJ Kirsch, I Angermeier, RW Boss
IFIP TC8 International Workshop on IS Security Research, Capetown, South …, 2009
The Formation and Evolution of Faultlines in Large-Scale, Multi-Party Information Systems Development.
S Slaughter, EI Diamant, MH Haney, L Ma, LJ Kirsch, SR Boss
ICIS, 70, 2007
Asymmetry in identification of multiplicity errors
CL Dunn, G Gerard, S Grabski, S Boss
When shall I tell? Relational promotion and timing of information technology diffusion
D Gibbons, B Butler, S Boss
DIGIT 2004 Proceedings, 7, 2004
Accountants, Cybersecurity isn’t just for ‘Techies’: Incorporating Cybersecurity into the Accounting Curriculum
J Diane, G Joy, S Boss
Asymmetry in Identification of Multiplicity Errors in Conceptual Models of Business Processes
CL Dunn, GJ Gerard, SV Grabski, SR Boss
Journal of Information Systems 31 (1), 21-39, 2017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20