Mario Silic

Orcid: 0009-0009-4141-991X

According to our database1, Mario Silic authored at least 30 papers between 2013 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes.
Inf. Syst. Frontiers, 2021

2020
Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance.
J. Manag. Inf. Syst., 2020

2019
Critical impact of organizational and individual inertia in explaining non-compliant security behavior in the Shadow IT context.
Comput. Secur., 2019

2018
Ambidextrous organization and agility in big data era: The role of business process management systems.
Bus. Process. Manag. J., 2018

Evaluating the Role of Trust in Adoption: A Conceptual Replication in the Context of Open Source Systems.
AIS Trans. Replication Res., 2018

Health Belief Model and Organizational Employee Computer Abuse.
Proceedings of the HCI in Business, Government, and Organizations, 2018

2017
Open Source Software Adoption: Lessons from Linux in Munich.
IT Prof., 2017

A new perspective on neutralization and deterrence: Predicting shadow IT usage.
Inf. Manag., 2017

Effects of Color Appeal, Perceived Risk and Culture on User's Decision in Presence of Warning Banner Message.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Impact of Gamification on User's Knowledge-Sharing Practices: Relationships between Work Motivation, Performance Expectancy and Work Engagement.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Deterrent Effects of Warnings on User's Behavior in Preventing Malicious Software Use.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Understanding Color Risk Appropriateness: Influence of Color on a User's Decision to Comply with the IT Security Policy - Evidence from the U.S. and India.
Proceedings of the HCI in Business, Government and Organizations. Supporting Business, 2017

2016
What are the Keys to a Successful Mobile Payment System? Case of Cytizi: Mobile Payment System.
J. Glob. Inf. Manag., 2016

The Influence of Risk Factors in Decision-Making Process for Open Source Software Adoption.
Int. J. Inf. Technol. Decis. Mak., 2016

Influence of Shadow IT on Innovation in Organizations.
Complex Syst. Informatics Model. Q., 2016

The dark side of social networking sites: Understanding phishing risks.
Comput. Hum. Behav., 2016

Restrictive Deterrence: Impact of Warning Banner Messages on Repeated Low-trust Software Use.
Proceedings of the ICEIS 2016, 2016

Colour Arousal Effect on Users' Decision-Making Processes in the Warning Message Context.
Proceedings of the HCI in Business, Government, and Organizations: Information Systems, 2016

Understanding Colour Impact on Warning Messages: Evidence from US and India.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Shadow IT: Steroids for Innovation.
Proceedings of the CAiSE'16 Forum, 2016

2015
Taxonomy of technological risks of open source software in the enterprise adoption context.
Inf. Comput. Secur., 2015

Identification and Importance of the Technological Risks of Open Source Software in the Enterprise Adoption Context.
Proceedings of the Smart Enterprise Engineering: 12. Internationale Tagung Wirtschaftsinformatik, 2015

Atos - Towards Zero Email Company.
Proceedings of the 23rd European Conference on Information Systems, 2015

2014
Information security: Critical review and future directions for research.
Inf. Manag. Comput. Secur., 2014

Employee Acceptance and Use of Unified Communications and Collaboration in a Cross-Cultural Environment.
Int. J. e Collab., 2014

Shadow IT - A view from behind the curtain.
Comput. Secur., 2014

Mobile contactless payments adoption challenge in the complex network actor ecosystem.
Proceedings of the 27th Bled eConference: eEcosystems, 2014

2013
Dual-use open source security software in organizations - Dilemma: Help or hinder?
Comput. Secur., 2013

Information Security and Open Source Dual Use Security Software: Trust Paradox.
Proceedings of the Open Source Software: Quality Verification, 2013

Organizational Culture Impact on Acceptance and Use of Unified Communications & Collaboration Technology in Organizations.
Proceedings of the 26th Bled eConference: eTrust: eInnovation: Challenges and Impacts for Individuals, 2013


  Loading...