Mikko T. Siponen

Orcid: 0000-0001-7041-1313

Affiliations:
  • University of Alabama, AL, USA
  • University of Jyväskylä, Finland


According to our database1, Mikko T. Siponen authored at least 148 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Splitting versus lumping: narrowing a theory's scope may increase its value.
Eur. J. Inf. Syst., July, 2024

Towards a cybercontextual transmission model for online scamming.
Eur. J. Inf. Syst., July, 2024

Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions.
Inf. Syst. Frontiers, June, 2024

How memory anxiety can influence password security behavior.
Comput. Secur., February, 2024

The Impacts of Internet Monitoring on Employees' Cyberloafing and Organizational Citizenship Behavior: A Longitudinal Field Quasi-Experiment.
Inf. Syst. Res., 2024

Smart services and privacy, can we have both?
Int. J. Prod. Res., 2024

How Do Real Cybercrime Syndicates Operate?: The Case of Online Romance Fraud Syndicates.
IEEE Secur. Priv., 2024

Testing the dominant mediator in EPPM: An empirical study on household anti-malware software users.
Comput. Secur., 2024

Investigating the use of protective technologies after data breach: The roles of psychological distance, technological service type and organizational justice.
Comput. Secur., 2024

Stage Theorizing in Behavioral Information Systems Security Research.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

When Empirical Contributions Are More Important than Theoretical Contributions.
Proceedings of the 32nd European Conference on Information Systems, 2024

Intuition or Analysis? Investigation of Employees' Cognitive Mode of Information Security Policy Compliance.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024

2023
Personal use of technology at work: a literature review and a theoretical model for understanding how it affects employee job performance.
Eur. J. Inf. Syst., March, 2023

"Unus pro omnibus, omnes pro uno": understanding unauthorised file sharing in online communities from a public goods contribution perspective.
Internet Res., 2023

Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity.
Comput. Secur., 2023

Seeking rhetorical validity in fear appeal research: An application of rhetorical theory.
Comput. Secur., 2023

Protection Motivation Theory in Information Security Behavior Research: Reconsidering the Fundamentals.
Commun. Assoc. Inf. Syst., 2023

Popperian Falsificationism in IS: Major Confusions and Harmful Influences.
Commun. Assoc. Inf. Syst., 2023

Organization Members Developing Information Security Policies: a Case Study.
Proceedings of the 44th International Conference on Information Systems, 2023

2022
Impacts of platform design on consumer commitment and online review intention: does use context matter in dual-platform e-commerce?
Internet Res., 2022

Citizens' Cybersecurity Behavior: Some Major Challenges.
IEEE Secur. Priv., 2022

Discovering the interplay between defensive avoidance and continued use intention of anti-malware software among experienced home users: A moderated mediation model.
Inf. Manag., 2022

Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions.
Data Base, 2022

Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats.
Behav. Inf. Technol., 2022

What Do We Really Mean by Rigor in Information Systems Research?
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
An Empirical Examination of the Economics of Mobile Application Security.
MIS Q., December, 2021

Determinants of Individual Knowledge Innovation Behavior: A Perspective of Emotion, Knowledge Sharing, and Trust.
J. Organ. End User Comput., 2021

Research Perspectives: Reconsidering the Role of Research Method Guidelines for Interpretive, Mixed Methods, and Design Science Research.
J. Assoc. Inf. Syst., 2021

Protection Motivation Theory in Information Systems Security Research: A Review of the Past and a Road Map for the Future.
Data Base, 2021

Influence of Organizational Culture on Employees Information Security Policy Compliance in Ethiopian Companies.
Proceedings of the 25th Pacific Asia Conference on Information Systems, 2021

The Primary Scientific Contribution is Hardly a Theory in Design Science Research.
Proceedings of the Next Wave of Sociotechnical Design, 2021

Investigating the Impact of Organizational Culture on Information Security Policy Compliance: The Case of Ethiopia.
Proceedings of the 27th Americas Conference on Information Systems, 2021

2020
Demystifying the Influential IS Legends of Positivism: Response to Lee's Commentary.
J. Assoc. Inf. Syst., 2020

Examining the side effects of organizational Internet monitoring on employees.
Internet Res., 2020

Why is the hypothetico-deductive (H-D) method in information systems not an H-D method?
Inf. Organ., 2020

Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures.
Inf. Manag., 2020

Executives' Commitment to Information Security: Interaction between the Preferred Subordinate Influence Approach (PSIA) and Proposal Characteristics.
Data Base, 2020

Can individuals' neutralization techniques be overcome? A field experiment on password policy.
Comput. Secur., 2020

Shall we follow? Impact of reputation concern on information security managers' investment decisions.
Comput. Secur., 2020

State of the art in information security policy development.
Comput. Secur., 2020

Toward a stage theory of the development of employees' information security behavior.
Comput. Secur., 2020

Mechanistic Explanations and Deliberate Misrepresentations.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective.
Inf. Syst. Res., 2019

Improving password memorability, while not inconveniencing the user.
Int. J. Hum. Comput. Stud., 2019

Speak their Language: Designing Effective Messages to Improve Employees' Information Security Decision Making.
Decis. Sci., 2019

Ethically Aligned Design of Autonomous Systems: Industry viewpoint and an empirical study.
CoRR, 2019

Agile Software Development Method, A Comparative Review1.
CoRR, 2019

Keeping secure to the end: a long-term perspective to understand employees' consequence-delayed information security violation.
Behav. Inf. Technol., 2019

How and Why 'Theory' Is Often Misunderstood in Information Systems Literature.
Proceedings of the 40th International Conference on Information Systems, 2019

Narrowing the Theory's or Study's Scope May Increase Practical Relevance.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

To Calculate or To Follow Others: How Do Information Security Managers Make Investment Decisions?
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Reconsidering the Role of Research Method Guidelines for Qualitative, Mixed-methods, and Design Science Research.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Moral sensitivity in Information Security Dilemmas.
Proceedings of the 27th European Conference on Information Systems, 2019

A field Experiment for Understanding the Unintended Impact of Internet Monitoring on Employees: Policy Satisfaction, Organizational Citizenship behaviour and Work Motivation.
Proceedings of the 27th European Conference on Information Systems, 2019

2018
Toward a Unified Model of Information Security Policy Compliance.
MIS Q., 2018

Errors and Complications in SQL Query Formulation.
ACM Trans. Comput. Educ., 2018

Demystifying the Influential IS Legends of Positivism.
J. Assoc. Inf. Syst., 2018

Intervention Effect Rates as a Path to Research Relevance: Information Systems Security Example.
J. Assoc. Inf. Syst., 2018

Too many passwords? How understanding our memory can increase password memorability.
Int. J. Hum. Comput. Stud., 2018

Omission of Quality Software Development Practices: A Systematic Literature Review.
ACM Comput. Surv., 2018

Updating the Philosophy of Middle-Range Theories: Implications for IS.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018

Developing Organization-Specific Information Security Policies.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018

2017
What Leads to Prosocial Behaviors on Social Networking Services: A Tripartite Model.
J. Manag. Inf. Syst., 2017

To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls.
J. Manag. Inf. Syst., 2017

How Do Mobile ICTs Enable Organizational Fluidity: Toward a Theoretical Framework.
Inf. Manag., 2017

2016
Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model.
Inf. Syst. Res., 2016

2015
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric.
MIS Q., 2015

2014
Employees' adherence to information security policies: An exploratory field study.
Inf. Manag., 2014

Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations.
Eur. J. Inf. Syst., 2014

Toward a Rational Choice Process Theory of Internet Scamming: The Offender's Perspective.
Proceedings of the International Conference on Information Systems, 2014

Short-Time Non-work-related Computing and Creative Performance.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work.
Inf. Manag., 2013

Information Security Behavior: Towards Multi-Stage Models.
Proceedings of the 17th Pacific Asia Conference on Information Systems, 2013

One Size Does Not Fit All: Different Cultures Require Different Information Systems Security Interventions.
Proceedings of the 17th Pacific Asia Conference on Information Systems, 2013

Understanding Why IS Students Drop Out: Toward A Process Theory.
Proceedings of the 21st European Conference on Information Systems, 2013

2012
IS Security Policy Violations: A Rational Choice Perspective.
J. Organ. End User Comput., 2012

Measuring Electronic Commerce Technology-Enabled Business Value: An Empirical Investigation.
J. Organ. Comput. Electron. Commer., 2012

Motivating IS security compliance: Insights from Habit and Protection Motivation Theory.
Inf. Manag., 2012

New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs.
Inf. Manag., 2012

What Makes Information System Developers Produce Defective Information Systems For Their Clients?
Proceedings of the 16th Pacific Asia Conference on Information Systems, 2012

Towards A Cross-Cultural Model Of Online Whistle-Blowing Systems Use.
Proceedings of the 16th Pacific Asia Conference on Information Systems, 2012

2011
Integrating Habit into UTAUT: The Chinese eBay Case.
Pac. Asia J. Assoc. Inf. Syst., 2011

The Effects of Teaching the Universality Thesis on Students' Integrative Complexity of Thought.
J. Inf. Syst. Educ., 2011

Toward a New Meta-Theory for Designing Information Systems (IS) Security Training Approaches.
J. Assoc. Inf. Syst., 2011

Gray-Area Phenomenon In Information Systems Development: A Call For Research.
Proceedings of the Pacific Asia Conference on Information Systems, 2011

A Call For Research On Home Users' Information Security Behaviour.
Proceedings of the Pacific Asia Conference on Information Systems, 2011

2010
Attitudes of sixth form female students toward the IT field.
SIGCAS Comput. Soc., 2010

Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations.
MIS Q., 2010

Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study.
MIS Q., 2010

On IS Students' Intentions to Use Theories of Ethics in Resolving Moral Conflicts.
J. Inf. Syst. Educ., 2010

Compliance with Information Security Policies: An Empirical Investigation.
Computer, 2010

New Insights for an Old Problem: Explaining Software Piracy through Neutralization Theory.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Implementation Intentions Explain How a Behavior Becomes Habitual: The Use of Online Newspapers.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Agile Software Development Methods: A Comparative Review<sup>1</sup>.
Proceedings of the Agile Software Development - Current Research and Future Directions, 2010

2009
Information security management standards: Problems and solutions.
Inf. Manag., 2009

What levels of moral reasoning and values explain adherence to information security rules? An empirical study.
Eur. J. Inf. Syst., 2009

Overcoming the insider: reducing employee computer crime through Situational Crime Prevention.
Commun. ACM, 2009

Technical opinion - Are employees putting your company at risk by not following information security policies?
Commun. ACM, 2009

2008
Do secure information system design methods provide adequate modeling support?
Inf. Softw. Technol., 2008

Power and Practice in Information Systems Security Research.
Proceedings of the International Conference on Information Systems, 2008

Software Piracy: Original Insights from a Criminological Perspective.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

2007
Unauthorized copying of software: an empirical study of reasons for and against.
SIGCAS Comput. Soc., 2007

A review of information security issues and respective research contributions.
Data Base, 2007

Employees' Adherence to Information Security Policies: An Empirical Study.
Proceedings of the New Approaches for Security, 2007

Which Factors Explain Employees' Adherence to Information Security Policies? An Empirical Study.
Proceedings of the Pacific Asia Conference on Information Systems, 2007

Employees' Behavior towards IS Security Policy Compliance.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

A Critical Assessment of IS Security Research between 1990-2004.
Proceedings of the Fifteenth European Conference on Information Systems, 2007

2006
A justification for software rights.
SIGCAS Comput. Soc., 2006

Six Design Theories for IS Security Policies and Guidelines.
J. Assoc. Inf. Syst., 2006

A Design Theory for Secure Information Systems Design Methods.
J. Assoc. Inf. Syst., 2006

Secure-system design methods: evolution and future directions.
IT Prof., 2006

Information security standards focus on the existence of process, not its content.
Commun. ACM, 2006

A survey of usability capability maturity models: implications for practice and research.
Behav. Inf. Technol., 2006

A New Model for Understanding Users' IS Security Compliance.
Proceedings of the Pacific Asia Conference on Information Systems, 2006

Collaboration in Software Development: Lesson Learned from Two Large Multinational Organizations.
Proceedings of the Pacific Asia Conference on Information Systems, 2006

Abuse Cases Revised: An Action Research Experience.
Proceedings of the Pacific Asia Conference on Information Systems, 2006

Effective Anti-Spam Strategies in Companies: An International Study.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Minitrack Introduction.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Attitudes of sixth form female students towards the IT field.
Proceedings of the Fourteenth European Conference on Information Systems, 2006

2005
Unauthorized Copying of Software: What is Wrong with the Nonexclusive Argument?
IT Prof., 2005

Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods.
Inf. Organ., 2005

An analysis of the traditional IS security approaches: implications for research and practice.
Eur. J. Inf. Syst., 2005

Attitudes to and factors affecting unauthorized copying of computer software in Finland.
Behav. Inf. Technol., 2005

Integrating Security into Agile Development Methods.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Mini Track: 'Information Systems Security Management'.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

2004
Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice.
Inf. Syst. J., 2004

Defects, Usefulness and Usability of Ethics Theories in IS Ethics Education.
Proceedings of the ICEIS 2004, 2004

Information Systems Security Management: Minitrack Introduction.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
New Directions on IS Security Methods.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Information Security Management Standards: Problems and Solutions.
Proceedings of the Seventh Pacific Asia Conference on Information Systems, 2003

New Directions on Agile Methods: A Comparative Analysis.
Proceedings of the 25th International Conference on Software Engineering, 2003

Universality thesis in IS ethics education - an empirical study.
Proceedings of the 11th European Conference on Information Systems, 2003

2002
Designing secure information systems and software:critical evaluation of the existing approaches and a new paradigm.
PhD thesis, 2002

Towards maturity of information security maturity criteria: six lessons learned from software maturity criteria.
Inf. Manag. Comput. Secur., 2002

Teaching End-User Ethics: Issues and a Solution Based on Universalizability.
Commun. Assoc. Inf. Syst., 2002

Database Security and the Problem of Polyinstantiation: a moral scrutiny.
Australas. J. Inf. Syst., 2002

Maturity Criteria for Developing Secure IS and SW: Limits, and Prospects.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

2001
Five dimensions of information security awareness.
SIGCAS Comput. Soc., 2001

On the Role of Human Mortality in Information System Security: From the Problems of Descriptivism to Non-Descriptive Foundations.
Inf. Resour. Manag. J., 2001

The relevance of software rights: An anthology of the divergence of sociopolitical doctrines.
AI Soc., 2001

A Paradigmatic Analysis of Conventional Approaches for Developing and Managing Secure IS.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

A New Paradigm for Adding Security Into IS Development Methods.
Proceedings of the Advances in Information Security Management & Small Systems Security, 2001

End-User Ethics Teaching: Issues and a Solution based on Universalization.
Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34), 2001

2000
Critical analysis of different approaches to minimizing user-related faults in information systems security: implications for research and practice.
Inf. Manag. Comput. Secur., 2000

A conceptual foundation for organizational information security awareness.
Inf. Manag. Comput. Secur., 2000

On the Role of Human Morality in Information System Security: The Problems of Descriptivism and Non-descriptive Foundations.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Policies for Construction of Information Systems' Security Guidelines: Five Approaches.
Proceedings of the Information Security for Global Information Infrastructures, 2000

1998
Ontology of Organizational IT Security Awareness - From Theoretical Foundations to Practical Framework.
Proceedings of the 7th Workshop on Enabling Technologies (WETICE '98), 1998


  Loading...