Scott R. Boss
Scott R. Boss
Bestätigte E-Mail-Adresse bei bentley.edu
Titel
Zitiert von
Zitiert von
Jahr
If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security
SR Boss, LJ Kirsch, I Angermeier, RA Shingler, RW Boss
European Journal of Information Systems 18 (2), 151-164, 2009
4562009
What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors
S Boss, D Galletta, PB Lowry, GD Moody, P Polak
MIS Quarterly (MISQ) 39 (4), 837-864, 2015
3942015
The last line of defense: motivating employees to follow corporate security guidelines
L Kirsch, S Boss
ICIS 2007 proceedings, 103, 2007
99*2007
The last line of defense: motivating employees to follow corporate security guidelines
L Kirsch, S Boss
ICIS 2007 proceedings, 103, 2007
762007
Friends don't make friends good citizens, but advisors do
TJ Zagenczyk, R Gibney, AJ Murrell, SR Boss
Group & Organization Management 33 (6), 760-780, 2008
612008
Factors associated with IT audits by the internal audit function
MJ Abdolmohammadi, SR Boss
International Journal of Accounting Information Systems 11 (3), 140-151, 2010
462010
Control, perceived risk, and information security precautions: external and internal motivations for security behavior
SR Boss
University of Pittsburgh, 2007
272007
Handoff processes, information quality and patient safety
JL Gogan, RJ Baxter, SR Boss, AM Chircu
Business Process Management Journal, 2013
242013
The dark side of online knowledge sharing (retracted)
AL Smith, RJ Baxter, SR Boss, JE Hunton
Journal of Information Systems 26 (2), 71-91, 2012
202012
Medication errors, handoff processes and information quality
AM Chircu, JL Gogan, SR Boss, R Baxter
Business Process Management Journal, 2013
162013
Control, Risk and Information Security Precautions
SR Boss
72005
Scared Straight: An Empirical Comparison of Two Major Theoretical Models Explaining User Backups
S Boss, D Galletta
Proceedings of the International Research Symposium on Accounting …, 2008
62008
The White-Collar Hacking Contest: A Novel Approach to Teach Forensic Investigations in a Digital World
M Schermann, SR Boss
A. Vance, R. Raghav, J. Allen. Proceedings of, 2014
22014
Handoffs and medication errors: A community hospital case study
AM Chircu, JL Gogan, RJ Baxter, SR Boss
2011 44th Hawaii International Conference on System Sciences, 1-10, 2011
22011
Familiarity breeds content: How fear of cybercrime influences individual precaution-taking behavior
SR Boss, LJ Kirsch, I Angermeier, RW Boss
IFIP TC8 International Workshop on IS Security Research, Capetown, South …, 2009
22009
The Formation and Evolution of Faultlines in Large-Scale, Multi-Party Information Systems Development.
S Slaughter, EI Diamant, MH Haney, L Ma, LJ Kirsch, SR Boss
ICIS, 70, 2007
22007
Asymmetry in identification of multiplicity errors
CL Dunn, G Gerard, S Grabski, S Boss
12014
When shall I tell? Relational promotion and timing of information technology diffusion
D Gibbons, B Butler, S Boss
DIGIT 2004 Proceedings, 7, 2004
12004
Accountants, Cybersecurity isn’t just for ‘Techies’: Incorporating Cybersecurity into the Accounting Curriculum
J Diane, G Joy, S Boss
2020
Asymmetry in Identification of Multiplicity Errors in Conceptual Models of Business Processes
CL Dunn, GJ Gerard, SV Grabski, SR Boss
Journal of Information Systems 31 (1), 21-39, 2017
2017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20