Anat Hovav
According to our database1,
Anat Hovav
authored at least 47 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Introduction to the Minitrack on Information Security in the era of Artificial General Intelligence (AGI).
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
2023
The effects of cyber regulations and security policies on organizational outcomes: a knowledge management perspective.
Eur. J. Inf. Syst., March, 2023
2022
J. Comput. Inf. Syst., 2022
Development of methods for identifying an appropriate benchmarking peer to establish information security policy.
Expert Syst. Appl., 2022
2020
Benchmarking Methodology for Information Security Policy (BMISP): Artifact Development and Evaluation.
Inf. Syst. Frontiers, 2020
2019
The Effect of Paradoxical Tensions Between Confucian Culture and Organizational Culture on Fear and Knowledge Sharing Intention.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
2018
Rethinking the Prevailing Security Paradigm: Can User Empowerment with Traceability Reduce the Rate of Security Policy Circumvention?
Data Base, 2018
A Novel Method to Enhance ISSP Compliant: an Approach Drawing Upon the Concept of Empowerment in Erm System Workflow.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
2017
Data Base, 2017
How Espoused Culture Influences Misuse Intention: A Micro-Institutional Theory Perspective.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
2016
This is my device! Why should I follow your rules? Employees' compliance with BYOD security policy.
Pervasive Mob. Comput., 2016
Dimensionality of Social Capital and Organizational Citizenship Behavior in Information Systems Project Teams.
J. Comput. Inf. Syst., 2016
The influence of information security on the adoption of web-based integrated information systems: an e-government study in Peru.
Inf. Technol. Dev., 2016
Impact of Psychological Empowerment, position and Awareness of Audit on Information Security Policy Compliance Intention.
Proceedings of the 20th Pacific Asia Conference on Information Systems, 2016
Proceedings of the 22nd Americas Conference on Information Systems, 2016
2015
Empowerment or Control: Reconsidering Employee Security Policy Compliance in Terms of Authorization.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
2014
Using scenarios to understand the frontiers of IS: Fifteen years later (a postscript).
Inf. Syst. Frontiers, 2014
Commun. Assoc. Inf. Syst., 2014
Employees' Compliance with BYOD Security Policy: Insights from Reactance, Organizational Justice, and Protection Motivation Theory.
Proceedings of the 22st European Conference on Information Systems, 2014
2013
Using a Dairy Management Information System to Facilitate Precision Agriculture: The Case of the AfiMilk® System.
Inf. Syst. Manag., 2013
2012
Strategic value and drivers behind organizational adoption of enterprise DRM: The korean case.
J. Serv. Sci. Res., 2012
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea.
Inf. Manag., 2012
2011
Organizational Informal Structure Influence On Project Success: Social Capital Approach.
Proceedings of the Pacific Asia Conference on Information Systems, 2011
Proceedings of the Researching the Future in Information Systems, 2011
2010
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010
2009
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach.
Inf. Syst. Res., 2009
Commun. Assoc. Inf. Syst., 2009
Commun. ACM, 2009
Proceedings of the 15th Americas Conference on Information Systems, 2009
2008
From Hindsight to Foresight: Applying Futures Research Techniques in Information Systems.
Commun. Assoc. Inf. Syst., 2008
2007
2006
2005
Comput. Secur., 2005
Global Diffusion of the Internet V - The Changing Dynamic of the Internet: Early and Late Adopters of the IPv6 Standard.
Commun. Assoc. Inf. Syst., 2005
Are Prevailing Theories and Practices of IS Security Management Adequate? An Evaluation and Call to Action.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005
2004
Inf. Secur. J. A Glob. Perspect., 2004
The Role of Individual Characteristics on the Effectiveness of IS Security Countermeasures.
Proceedings of the 10th Americas Conference on Information Systems, 2004
2002
Inf. Syst. Frontiers, 2002
2001
Proceedings of the 9th European Conference on Information Systems, 2001
Proceedings of the 9th European Conference on Information Systems, 2001
1999
1998
Bus. Process. Manag. J., 1998
Proceedings of the ACM SIGCPR Conference on Computer Personnel Research, 1998
1996
Proceedings of the 1996 ACM SIGCPR/SIGMIS Conference on Computer personnel Research, 1996