Intervention effect rates as a path to research relevance: Information systems security example
© 2018 by the Association for Information Systems. In the current information systems security (ISS) research, new theory contributions are especially valued. This research typically reflects the following formula: Suggest a new theory (or set of constructs) of ISS and show that it is empirically su...
| Main Authors: | Siponen, M., Baskerville, Richard |
|---|---|
| Format: | Journal Article |
| Published: |
2018
|
| Online Access: | http://hdl.handle.net/20.500.11937/69178 |
Similar Items
Individual information systems as a research arena
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
Strategic Information Security Risk Management
by: Baskerville, Richard
Published: (2008)
by: Baskerville, Richard
Published: (2008)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
Information Systems Security Strategy: A Process View
by: Baskerville, Richard, et al.
Published: (2008)
by: Baskerville, Richard, et al.
Published: (2008)
Fashion waves in information systems research and practice
by: Baskerville, Richard, et al.
Published: (2009)
by: Baskerville, Richard, et al.
Published: (2009)
Information security: Going digital (invited lecture)
by: Baskerville, Richard
Published: (2019)
by: Baskerville, Richard
Published: (2019)
Generative Control Theory for Information Security
by: Raymond, B., et al.
Published: (2014)
by: Raymond, B., et al.
Published: (2014)
A critical perspective on action research as a method for information systems research
by: Baskerville, Richard, et al.
Published: (2016)
by: Baskerville, Richard, et al.
Published: (2016)
Framing the Information Security Process in Modern Society
by: Straub, D., et al.
Published: (2008)
by: Straub, D., et al.
Published: (2008)
Transferring Information Security Risk to an Opponent: New Principles for Non-Financial Risk Transfer Treatments
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information
by: Anderson, C., et al.
Published: (2017)
by: Anderson, C., et al.
Published: (2017)
Design theorizing individual information systems
by: Baskerville, Richard
Published: (2011)
by: Baskerville, Richard
Published: (2011)
A response to the design-oriented information systems research memorandum
by: Baskerville, Richard, et al.
Published: (2011)
by: Baskerville, Richard, et al.
Published: (2011)
Design ethnography in information systems
by: Baskerville, Richard, et al.
Published: (2015)
by: Baskerville, Richard, et al.
Published: (2015)
Incident-centered information security: Managing a strategic balance between prevention and response
by: Baskerville, Richard, et al.
Published: (2014)
by: Baskerville, Richard, et al.
Published: (2014)
Implementing complex rehabilitation interventions in research: the example of vocational rehabilitation for people with traumatic brain injury
by: Holmes, Jane A.
Published: (2018)
by: Holmes, Jane A.
Published: (2018)
The Aboriginal Mothers in Prison project: an example of how consultation can inform research practice
by: Wilson, Amanda, et al.
Published: (2014)
by: Wilson, Amanda, et al.
Published: (2014)
Keeping research relevant
by: Mustafa, Zulita
Published: (2016)
by: Mustafa, Zulita
Published: (2016)
Security alert through path analysis
by: Lo, Kelvin, Yir Siang
Published: (2013)
by: Lo, Kelvin, Yir Siang
Published: (2013)
The Information Security Risk Estimation Engine: A Tool for Possibility Based Risk Assessment
by: Baskerville, Richard, et al.
Published: (2013)
by: Baskerville, Richard, et al.
Published: (2013)
Information systems as a reference discipline: Current debate and future directions
by: Baskerville, Richard, et al.
Published: (2018)
by: Baskerville, Richard, et al.
Published: (2018)
Securing information system & computer security self-efficacy effect
by: Al-Shawabkeh, Mahmoud
Published: (2013)
by: Al-Shawabkeh, Mahmoud
Published: (2013)
Going back to basics in design science: from the information technology artifact to the information systems artifact
by: Lee, A., et al.
Published: (2015)
by: Lee, A., et al.
Published: (2015)
Two Approaches to Information Security Doctoral Research
by: Armstrong, Helen
Published: (2011)
by: Armstrong, Helen
Published: (2011)
Relevant, applicable learning and research
by: Daing Nasir, Ibrahim
Published: (2013)
by: Daing Nasir, Ibrahim
Published: (2013)
Setting our research agendas: Institutional ecology, informing sciences, or management fashion theory?
by: Myers, M., et al.
Published: (2011)
by: Myers, M., et al.
Published: (2011)
The Relevancy of Community-Based Methods: Using Diet within Native American and Alaska Native Adult Populations as an Example
by: Fialkowski, M., et al.
Published: (2012)
by: Fialkowski, M., et al.
Published: (2012)
The emergence of design science research from decision theory
by: Baskerville, Richard
Published: (2018)
by: Baskerville, Richard
Published: (2018)
Commentary on Gill and Bhattacherjee: Is there an informing crisis?
by: Myers, M., et al.
Published: (2009)
by: Myers, M., et al.
Published: (2009)
The Contributions of Alessandro D'Atri to Organization and Information Systems Studies
by: Spagnoletti, P., et al.
Published: (2013)
by: Spagnoletti, P., et al.
Published: (2013)
Functionality vs. Security in IS: Tradeoff or equilibrium
by: Baskerville, Richard, et al.
Published: (2012)
by: Baskerville, Richard, et al.
Published: (2012)
The relevance of developmental neurotoxicity research in Malaysia
by: Wan Ibrahim, Wan Norhamidah
Published: (2015)
by: Wan Ibrahim, Wan Norhamidah
Published: (2015)
Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective
by: Baskerville, Richard, et al.
Published: (2018)
by: Baskerville, Richard, et al.
Published: (2018)
Information Systems - Creativity and Innovation in Small and Medium-Sized Enterprises
by: Dhillon, G., et al.
Published: (2009)
by: Dhillon, G., et al.
Published: (2009)
Let researchers try new paths
by: Oni, Tolu, et al.
Published: (2016)
by: Oni, Tolu, et al.
Published: (2016)
A wealth of information or too much information? Examining the effectiveness of supplementary corpus examples in online dictionaries
by: Ptasznik, Bartosz
Published: (2024)
by: Ptasznik, Bartosz
Published: (2024)
Mineral replacement reactions in solid solution-aqueous solution systems: Volume changes, reactions paths and end-points using the example of model salt systems
by: Pollok, K., et al.
Published: (2011)
by: Pollok, K., et al.
Published: (2011)
Principles for re-designing information systems for environmental sustainability
by: Baskerville, Richard, et al.
Published: (2016)
by: Baskerville, Richard, et al.
Published: (2016)
Research Book - data engineering and information security series 1
Published: (2017)
Published: (2017)
The relevant intervention strategies for improving medication
adherence of diabetic patients.
by: Cliffton Akoi,, et al.
Published: (2013)
by: Cliffton Akoi,, et al.
Published: (2013)
Similar Items
-
Individual information systems as a research arena
by: Baskerville, Richard
Published: (2011) -
Strategic Information Security Risk Management
by: Baskerville, Richard
Published: (2008) -
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013) -
Information Systems Security Strategy: A Process View
by: Baskerville, Richard, et al.
Published: (2008) -
Fashion waves in information systems research and practice
by: Baskerville, Richard, et al.
Published: (2009)