Mikko T. Siponen
Orcid: 0000-0001-7041-1313Affiliations:
- University of Alabama, AL, USA
- University of Jyväskylä, Finland
According to our database1,
Mikko T. Siponen
authored at least 148 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Eur. J. Inf. Syst., July, 2024
Eur. J. Inf. Syst., July, 2024
Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions.
Inf. Syst. Frontiers, June, 2024
Comput. Secur., February, 2024
The Impacts of Internet Monitoring on Employees' Cyberloafing and Organizational Citizenship Behavior: A Longitudinal Field Quasi-Experiment.
Inf. Syst. Res., 2024
How Do Real Cybercrime Syndicates Operate?: The Case of Online Romance Fraud Syndicates.
IEEE Secur. Priv., 2024
Testing the dominant mediator in EPPM: An empirical study on household anti-malware software users.
Comput. Secur., 2024
Investigating the use of protective technologies after data breach: The roles of psychological distance, technological service type and organizational justice.
Comput. Secur., 2024
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Proceedings of the 32nd European Conference on Information Systems, 2024
Intuition or Analysis? Investigation of Employees' Cognitive Mode of Information Security Policy Compliance.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024
2023
Personal use of technology at work: a literature review and a theoretical model for understanding how it affects employee job performance.
Eur. J. Inf. Syst., March, 2023
"Unus pro omnibus, omnes pro uno": understanding unauthorised file sharing in online communities from a public goods contribution perspective.
Internet Res., 2023
Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity.
Comput. Secur., 2023
Seeking rhetorical validity in fear appeal research: An application of rhetorical theory.
Comput. Secur., 2023
Protection Motivation Theory in Information Security Behavior Research: Reconsidering the Fundamentals.
Commun. Assoc. Inf. Syst., 2023
Commun. Assoc. Inf. Syst., 2023
Proceedings of the 44th International Conference on Information Systems, 2023
2022
Impacts of platform design on consumer commitment and online review intention: does use context matter in dual-platform e-commerce?
Internet Res., 2022
Discovering the interplay between defensive avoidance and continued use intention of anti-malware software among experienced home users: A moderated mediation model.
Inf. Manag., 2022
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions.
Data Base, 2022
Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats.
Behav. Inf. Technol., 2022
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
2021
MIS Q., December, 2021
Determinants of Individual Knowledge Innovation Behavior: A Perspective of Emotion, Knowledge Sharing, and Trust.
J. Organ. End User Comput., 2021
Research Perspectives: Reconsidering the Role of Research Method Guidelines for Interpretive, Mixed Methods, and Design Science Research.
J. Assoc. Inf. Syst., 2021
Protection Motivation Theory in Information Systems Security Research: A Review of the Past and a Road Map for the Future.
Data Base, 2021
Influence of Organizational Culture on Employees Information Security Policy Compliance in Ethiopian Companies.
Proceedings of the 25th Pacific Asia Conference on Information Systems, 2021
Proceedings of the Next Wave of Sociotechnical Design, 2021
Investigating the Impact of Organizational Culture on Information Security Policy Compliance: The Case of Ethiopia.
Proceedings of the 27th Americas Conference on Information Systems, 2021
2020
J. Assoc. Inf. Syst., 2020
Internet Res., 2020
Why is the hypothetico-deductive (H-D) method in information systems not an H-D method?
Inf. Organ., 2020
Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures.
Inf. Manag., 2020
Executives' Commitment to Information Security: Interaction between the Preferred Subordinate Influence Approach (PSIA) and Proposal Characteristics.
Data Base, 2020
Can individuals' neutralization techniques be overcome? A field experiment on password policy.
Comput. Secur., 2020
Shall we follow? Impact of reputation concern on information security managers' investment decisions.
Comput. Secur., 2020
Toward a stage theory of the development of employees' information security behavior.
Comput. Secur., 2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
2019
Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective.
Inf. Syst. Res., 2019
Int. J. Hum. Comput. Stud., 2019
Speak their Language: Designing Effective Messages to Improve Employees' Information Security Decision Making.
Decis. Sci., 2019
Ethically Aligned Design of Autonomous Systems: Industry viewpoint and an empirical study.
CoRR, 2019
Keeping secure to the end: a long-term perspective to understand employees' consequence-delayed information security violation.
Behav. Inf. Technol., 2019
Proceedings of the 40th International Conference on Information Systems, 2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
To Calculate or To Follow Others: How Do Information Security Managers Make Investment Decisions?
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Reconsidering the Role of Research Method Guidelines for Qualitative, Mixed-methods, and Design Science Research.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Proceedings of the 27th European Conference on Information Systems, 2019
A field Experiment for Understanding the Unintended Impact of Internet Monitoring on Employees: Policy Satisfaction, Organizational Citizenship behaviour and Work Motivation.
Proceedings of the 27th European Conference on Information Systems, 2019
2018
Intervention Effect Rates as a Path to Research Relevance: Information Systems Security Example.
J. Assoc. Inf. Syst., 2018
Int. J. Hum. Comput. Stud., 2018
ACM Comput. Surv., 2018
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018
2017
J. Manag. Inf. Syst., 2017
To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls.
J. Manag. Inf. Syst., 2017
Inf. Manag., 2017
2016
Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model.
Inf. Syst. Res., 2016
2015
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric.
MIS Q., 2015
2014
Inf. Manag., 2014
Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations.
Eur. J. Inf. Syst., 2014
Toward a Rational Choice Process Theory of Internet Scamming: The Offender's Perspective.
Proceedings of the International Conference on Information Systems, 2014
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
2013
Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work.
Inf. Manag., 2013
Proceedings of the 17th Pacific Asia Conference on Information Systems, 2013
One Size Does Not Fit All: Different Cultures Require Different Information Systems Security Interventions.
Proceedings of the 17th Pacific Asia Conference on Information Systems, 2013
Proceedings of the 21st European Conference on Information Systems, 2013
2012
J. Organ. End User Comput., 2012
Measuring Electronic Commerce Technology-Enabled Business Value: An Empirical Investigation.
J. Organ. Comput. Electron. Commer., 2012
Motivating IS security compliance: Insights from Habit and Protection Motivation Theory.
Inf. Manag., 2012
New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs.
Inf. Manag., 2012
What Makes Information System Developers Produce Defective Information Systems For Their Clients?
Proceedings of the 16th Pacific Asia Conference on Information Systems, 2012
Proceedings of the 16th Pacific Asia Conference on Information Systems, 2012
2011
Pac. Asia J. Assoc. Inf. Syst., 2011
The Effects of Teaching the Universality Thesis on Students' Integrative Complexity of Thought.
J. Inf. Syst. Educ., 2011
Toward a New Meta-Theory for Designing Information Systems (IS) Security Training Approaches.
J. Assoc. Inf. Syst., 2011
Proceedings of the Pacific Asia Conference on Information Systems, 2011
Proceedings of the Pacific Asia Conference on Information Systems, 2011
2010
SIGCAS Comput. Soc., 2010
Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations.
MIS Q., 2010
Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study.
MIS Q., 2010
J. Inf. Syst. Educ., 2010
Computer, 2010
New Insights for an Old Problem: Explaining Software Piracy through Neutralization Theory.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
Implementation Intentions Explain How a Behavior Becomes Habitual: The Use of Online Newspapers.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
Proceedings of the Agile Software Development - Current Research and Future Directions, 2010
2009
What levels of moral reasoning and values explain adherence to information security rules? An empirical study.
Eur. J. Inf. Syst., 2009
Overcoming the insider: reducing employee computer crime through Situational Crime Prevention.
Commun. ACM, 2009
Technical opinion - Are employees putting your company at risk by not following information security policies?
Commun. ACM, 2009
2008
Inf. Softw. Technol., 2008
Proceedings of the International Conference on Information Systems, 2008
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008
2007
SIGCAS Comput. Soc., 2007
Data Base, 2007
Proceedings of the New Approaches for Security, 2007
Which Factors Explain Employees' Adherence to Information Security Policies? An Empirical Study.
Proceedings of the Pacific Asia Conference on Information Systems, 2007
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
Proceedings of the Fifteenth European Conference on Information Systems, 2007
2006
J. Assoc. Inf. Syst., 2006
J. Assoc. Inf. Syst., 2006
Commun. ACM, 2006
A survey of usability capability maturity models: implications for practice and research.
Behav. Inf. Technol., 2006
Proceedings of the Pacific Asia Conference on Information Systems, 2006
Collaboration in Software Development: Lesson Learned from Two Large Multinational Organizations.
Proceedings of the Pacific Asia Conference on Information Systems, 2006
Proceedings of the Pacific Asia Conference on Information Systems, 2006
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006
Proceedings of the Fourteenth European Conference on Information Systems, 2006
2005
IT Prof., 2005
Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods.
Inf. Organ., 2005
An analysis of the traditional IS security approaches: implications for research and practice.
Eur. J. Inf. Syst., 2005
Attitudes to and factors affecting unauthorized copying of computer software in Finland.
Behav. Inf. Technol., 2005
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005
2004
Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice.
Inf. Syst. J., 2004
Defects, Usefulness and Usability of Ethics Theories in IS Ethics Education.
Proceedings of the ICEIS 2004, 2004
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
2003
New Directions on IS Security Methods.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the Seventh Pacific Asia Conference on Information Systems, 2003
Proceedings of the 25th International Conference on Software Engineering, 2003
Universality thesis in IS ethics education - an empirical study.
Proceedings of the 11th European Conference on Information Systems, 2003
2002
Designing secure information systems and software:critical evaluation of the existing approaches and a new paradigm.
PhD thesis, 2002
Towards maturity of information security maturity criteria: six lessons learned from software maturity criteria.
Inf. Manag. Comput. Secur., 2002
Commun. Assoc. Inf. Syst., 2002
Australas. J. Inf. Syst., 2002
Maturity Criteria for Developing Secure IS and SW: Limits, and Prospects.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
2001
On the Role of Human Mortality in Information System Security: From the Problems of Descriptivism to Non-Descriptive Foundations.
Inf. Resour. Manag. J., 2001
The relevance of software rights: An anthology of the divergence of sociopolitical doctrines.
AI Soc., 2001
A Paradigmatic Analysis of Conventional Approaches for Developing and Managing Secure IS.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
A New Paradigm for Adding Security Into IS Development Methods.
Proceedings of the Advances in Information Security Management & Small Systems Security, 2001
Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34), 2001
2000
Critical analysis of different approaches to minimizing user-related faults in information systems security: implications for research and practice.
Inf. Manag. Comput. Secur., 2000
Inf. Manag. Comput. Secur., 2000
On the Role of Human Morality in Information System Security: The Problems of Descriptivism and Non-descriptive Foundations.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Policies for Construction of Information Systems' Security Guidelines: Five Approaches.
Proceedings of the Information Security for Global Information Infrastructures, 2000
1998
Ontology of Organizational IT Security Awareness - From Theoretical Foundations to Practical Framework.
Proceedings of the 7th Workshop on Enabling Technologies (WETICE '98), 1998