Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Mississippi State University" +contributor:("Merrill Warkentin"). Showing records 1 – 8 of 8 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Mississippi State University

1. Pope, Michael Brian. Time orientation, rational choice and deterrence an information systems perspective.

Degree: PhD, Management and Information Systems, 2013, Mississippi State University

  The present study examines General Deterrence Theory (GDT) and its "parent," Rational Choice Theory (RCT), in an information security setting, assessing the behavioral intent… (more)

Subjects/Keywords: ebooks; copyright infringement; criminal sanctions; piracy; factorial survey method; computer crime; organizational justice; workplace deviance; consideration of future consequences; business information systems; differential deterrence; management information systems; information security; time orientation; time preference; time perspective; general deterrence theory; rational choice theory; security education training and awareness; computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pope, M. B. (2013). Time orientation, rational choice and deterrence an information systems perspective. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-04262013-065917/ ;

Chicago Manual of Style (16th Edition):

Pope, Michael Brian. “Time orientation, rational choice and deterrence an information systems perspective.” 2013. Doctoral Dissertation, Mississippi State University. Accessed July 22, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-04262013-065917/ ;.

MLA Handbook (7th Edition):

Pope, Michael Brian. “Time orientation, rational choice and deterrence an information systems perspective.” 2013. Web. 22 Jul 2019.

Vancouver:

Pope MB. Time orientation, rational choice and deterrence an information systems perspective. [Internet] [Doctoral dissertation]. Mississippi State University; 2013. [cited 2019 Jul 22]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04262013-065917/ ;.

Council of Science Editors:

Pope MB. Time orientation, rational choice and deterrence an information systems perspective. [Doctoral Dissertation]. Mississippi State University; 2013. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04262013-065917/ ;


Mississippi State University

2. Hulitt, Elaine. INFORMATION PROCESSING SYSTEM TO SECURITY STANDARD COMPLIANCE MEASUREMENT: A QUANTITATIVE APPROACH USING PATHFINDER NETWORKS (PFNETS).

Degree: PhD, Computer Science and Engineering, 2009, Mississippi State University

  Continuously changing system configurations and attack methods make information system risk management using traditional methods a formidable task. Traditional qualitative approaches usually lack sufficient… (more)

Subjects/Keywords: Secure Architecture Modeling; Risk Analysis; Standards Compliance Modeling; FISMA; RMF; Pathfinder Networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hulitt, E. (2009). INFORMATION PROCESSING SYSTEM TO SECURITY STANDARD COMPLIANCE MEASUREMENT: A QUANTITATIVE APPROACH USING PATHFINDER NETWORKS (PFNETS). (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-11052009-170749/ ;

Chicago Manual of Style (16th Edition):

Hulitt, Elaine. “INFORMATION PROCESSING SYSTEM TO SECURITY STANDARD COMPLIANCE MEASUREMENT: A QUANTITATIVE APPROACH USING PATHFINDER NETWORKS (PFNETS).” 2009. Doctoral Dissertation, Mississippi State University. Accessed July 22, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-11052009-170749/ ;.

MLA Handbook (7th Edition):

Hulitt, Elaine. “INFORMATION PROCESSING SYSTEM TO SECURITY STANDARD COMPLIANCE MEASUREMENT: A QUANTITATIVE APPROACH USING PATHFINDER NETWORKS (PFNETS).” 2009. Web. 22 Jul 2019.

Vancouver:

Hulitt E. INFORMATION PROCESSING SYSTEM TO SECURITY STANDARD COMPLIANCE MEASUREMENT: A QUANTITATIVE APPROACH USING PATHFINDER NETWORKS (PFNETS). [Internet] [Doctoral dissertation]. Mississippi State University; 2009. [cited 2019 Jul 22]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-11052009-170749/ ;.

Council of Science Editors:

Hulitt E. INFORMATION PROCESSING SYSTEM TO SECURITY STANDARD COMPLIANCE MEASUREMENT: A QUANTITATIVE APPROACH USING PATHFINDER NETWORKS (PFNETS). [Doctoral Dissertation]. Mississippi State University; 2009. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-11052009-170749/ ;


Mississippi State University

3. Mutchler, Leigh. Expanding protection motivation theory: The role of individual experience in information security policy compliance.

Degree: PhD, Management and Information Systems, 2012, Mississippi State University

  The purpose of the present study is to make contributions to the area of behavioral information security in the field of Information Systems and… (more)

Subjects/Keywords: Structured Equation Modeling; SEM; Information Systems; IS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mutchler, L. (2012). Expanding protection motivation theory: The role of individual experience in information security policy compliance. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-11022012-091426/ ;

Chicago Manual of Style (16th Edition):

Mutchler, Leigh. “Expanding protection motivation theory: The role of individual experience in information security policy compliance.” 2012. Doctoral Dissertation, Mississippi State University. Accessed July 22, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-11022012-091426/ ;.

MLA Handbook (7th Edition):

Mutchler, Leigh. “Expanding protection motivation theory: The role of individual experience in information security policy compliance.” 2012. Web. 22 Jul 2019.

Vancouver:

Mutchler L. Expanding protection motivation theory: The role of individual experience in information security policy compliance. [Internet] [Doctoral dissertation]. Mississippi State University; 2012. [cited 2019 Jul 22]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-11022012-091426/ ;.

Council of Science Editors:

Mutchler L. Expanding protection motivation theory: The role of individual experience in information security policy compliance. [Doctoral Dissertation]. Mississippi State University; 2012. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-11022012-091426/ ;


Mississippi State University

4. Malimage, Kalana. The role of habit in information security behaviors.

Degree: PhD, Management and Information Systems, 2013, Mississippi State University

  The purpose of this present study is to understand the role of habit in information security behaviors. The automatic aspect of habit and its… (more)

Subjects/Keywords: information security; habit; protection motivation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Malimage, K. (2013). The role of habit in information security behaviors. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-07302013-102839/ ;

Chicago Manual of Style (16th Edition):

Malimage, Kalana. “The role of habit in information security behaviors.” 2013. Doctoral Dissertation, Mississippi State University. Accessed July 22, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-07302013-102839/ ;.

MLA Handbook (7th Edition):

Malimage, Kalana. “The role of habit in information security behaviors.” 2013. Web. 22 Jul 2019.

Vancouver:

Malimage K. The role of habit in information security behaviors. [Internet] [Doctoral dissertation]. Mississippi State University; 2013. [cited 2019 Jul 22]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-07302013-102839/ ;.

Council of Science Editors:

Malimage K. The role of habit in information security behaviors. [Doctoral Dissertation]. Mississippi State University; 2013. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-07302013-102839/ ;

5. Ormond, Dustin K. The impact of affective flow on information security policy compliance.

Degree: PhD, Management and Information Systems, 2014, Mississippi State University

  Information system security literature has primarily focused on cognitive processes and their impact on information security policy noncompliance behavior. Specific cognitive theories that have… (more)

Subjects/Keywords: compliance; attitude; affective flow; affective absorption; affect; future compliance intention; information security policy; negative affect; organizational injustice

…the College of Business at Mississippi State University. This population is deemed as an… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ormond, D. K. (2014). The impact of affective flow on information security policy compliance. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-04252014-172237/ ;

Chicago Manual of Style (16th Edition):

Ormond, Dustin K. “The impact of affective flow on information security policy compliance.” 2014. Doctoral Dissertation, Mississippi State University. Accessed July 22, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-04252014-172237/ ;.

MLA Handbook (7th Edition):

Ormond, Dustin K. “The impact of affective flow on information security policy compliance.” 2014. Web. 22 Jul 2019.

Vancouver:

Ormond DK. The impact of affective flow on information security policy compliance. [Internet] [Doctoral dissertation]. Mississippi State University; 2014. [cited 2019 Jul 22]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04252014-172237/ ;.

Council of Science Editors:

Ormond DK. The impact of affective flow on information security policy compliance. [Doctoral Dissertation]. Mississippi State University; 2014. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-04252014-172237/ ;


Mississippi State University

6. Johnston, Allen Christopher. An Empirical Investigation of the Influence of Fear Appeals on Attitudes and Behavioral Intentions Associated with Recommended Individual Computer Security Actions.

Degree: PhD, Management and Information Systems, 2007, Mississippi State University

 Through persuasive communication, IT executives strive to align the actions of end users with the desired security posture of management and of the firm. In… (more)

Subjects/Keywords: persuasive communications; threat; computer security; fear appeals; information assurance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Johnston, A. C. (2007). An Empirical Investigation of the Influence of Fear Appeals on Attitudes and Behavioral Intentions Associated with Recommended Individual Computer Security Actions. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-10292007-083339/ ;

Chicago Manual of Style (16th Edition):

Johnston, Allen Christopher. “An Empirical Investigation of the Influence of Fear Appeals on Attitudes and Behavioral Intentions Associated with Recommended Individual Computer Security Actions.” 2007. Doctoral Dissertation, Mississippi State University. Accessed July 22, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-10292007-083339/ ;.

MLA Handbook (7th Edition):

Johnston, Allen Christopher. “An Empirical Investigation of the Influence of Fear Appeals on Attitudes and Behavioral Intentions Associated with Recommended Individual Computer Security Actions.” 2007. Web. 22 Jul 2019.

Vancouver:

Johnston AC. An Empirical Investigation of the Influence of Fear Appeals on Attitudes and Behavioral Intentions Associated with Recommended Individual Computer Security Actions. [Internet] [Doctoral dissertation]. Mississippi State University; 2007. [cited 2019 Jul 22]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-10292007-083339/ ;.

Council of Science Editors:

Johnston AC. An Empirical Investigation of the Influence of Fear Appeals on Attitudes and Behavioral Intentions Associated with Recommended Individual Computer Security Actions. [Doctoral Dissertation]. Mississippi State University; 2007. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-10292007-083339/ ;


Mississippi State University

7. Lee, Cheon-Pyo. AN EMPIRICAL STUDY OF ORGANIZATIONAL UBIQUITOUS COMPUTING TECHNOLOGY ADOPTION: THE CASE OF RADIO FREQUENCY IDENTIFICATION (RFID) IN THE HEALTHCARE INDUSTRY.

Degree: PhD, Management and Information Systems, 2008, Mississippi State University

 Advances in wireless networking and the Internet move us toward ubiquitous and embedded computing. Ubiquitous and embedded computing enhances computer use by making computers available… (more)

Subjects/Keywords: Information Technology Adoption; Need Pull; Technology Push; Radio Frequency Identifaction (RFID)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lee, C. (2008). AN EMPIRICAL STUDY OF ORGANIZATIONAL UBIQUITOUS COMPUTING TECHNOLOGY ADOPTION: THE CASE OF RADIO FREQUENCY IDENTIFICATION (RFID) IN THE HEALTHCARE INDUSTRY. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-10172008-090051/ ;

Chicago Manual of Style (16th Edition):

Lee, Cheon-Pyo. “AN EMPIRICAL STUDY OF ORGANIZATIONAL UBIQUITOUS COMPUTING TECHNOLOGY ADOPTION: THE CASE OF RADIO FREQUENCY IDENTIFICATION (RFID) IN THE HEALTHCARE INDUSTRY.” 2008. Doctoral Dissertation, Mississippi State University. Accessed July 22, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-10172008-090051/ ;.

MLA Handbook (7th Edition):

Lee, Cheon-Pyo. “AN EMPIRICAL STUDY OF ORGANIZATIONAL UBIQUITOUS COMPUTING TECHNOLOGY ADOPTION: THE CASE OF RADIO FREQUENCY IDENTIFICATION (RFID) IN THE HEALTHCARE INDUSTRY.” 2008. Web. 22 Jul 2019.

Vancouver:

Lee C. AN EMPIRICAL STUDY OF ORGANIZATIONAL UBIQUITOUS COMPUTING TECHNOLOGY ADOPTION: THE CASE OF RADIO FREQUENCY IDENTIFICATION (RFID) IN THE HEALTHCARE INDUSTRY. [Internet] [Doctoral dissertation]. Mississippi State University; 2008. [cited 2019 Jul 22]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-10172008-090051/ ;.

Council of Science Editors:

Lee C. AN EMPIRICAL STUDY OF ORGANIZATIONAL UBIQUITOUS COMPUTING TECHNOLOGY ADOPTION: THE CASE OF RADIO FREQUENCY IDENTIFICATION (RFID) IN THE HEALTHCARE INDUSTRY. [Doctoral Dissertation]. Mississippi State University; 2008. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-10172008-090051/ ;


Mississippi State University

8. Shropshire, Jordan. PREDICTING COMPLIANCE WITH PRESCRIBED ORGANIZATIONAL INFORMATION SECURITY PROTOCOLS.

Degree: PhD, Management and Information Systems, 2008, Mississippi State University

  Why do some employees go out of their way to follow prescribed information security protocols, while others all but ignore organizational information security measures?… (more)

Subjects/Keywords: Protocol Compliance; End User Behavior; Endpoint Security; Organizational Citizenship Behavior

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shropshire, J. (2008). PREDICTING COMPLIANCE WITH PRESCRIBED ORGANIZATIONAL INFORMATION SECURITY PROTOCOLS. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-10202008-120221/ ;

Chicago Manual of Style (16th Edition):

Shropshire, Jordan. “PREDICTING COMPLIANCE WITH PRESCRIBED ORGANIZATIONAL INFORMATION SECURITY PROTOCOLS.” 2008. Doctoral Dissertation, Mississippi State University. Accessed July 22, 2019. http://sun.library.msstate.edu/ETD-db/theses/available/etd-10202008-120221/ ;.

MLA Handbook (7th Edition):

Shropshire, Jordan. “PREDICTING COMPLIANCE WITH PRESCRIBED ORGANIZATIONAL INFORMATION SECURITY PROTOCOLS.” 2008. Web. 22 Jul 2019.

Vancouver:

Shropshire J. PREDICTING COMPLIANCE WITH PRESCRIBED ORGANIZATIONAL INFORMATION SECURITY PROTOCOLS. [Internet] [Doctoral dissertation]. Mississippi State University; 2008. [cited 2019 Jul 22]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-10202008-120221/ ;.

Council of Science Editors:

Shropshire J. PREDICTING COMPLIANCE WITH PRESCRIBED ORGANIZATIONAL INFORMATION SECURITY PROTOCOLS. [Doctoral Dissertation]. Mississippi State University; 2008. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-10202008-120221/ ;

.