Trustworthiness of grounded theory methodology research in information systems D Sikolia, D Biros, M Mason, M Weiser | 185 | 2013 |
Intention to Remain in a Computing Program: Exploring the Role of Passion and Grit. P Mahatanankoon, D Sikolia AMCIS, 2017 | 9 | 2017 |
A design science approach to virtual world implementation of trade fairs R Sharda, D Sikolia, J Thomas, R Sambasivan Pacific Asia Journal of the Association for Information Systems 4 (2), 4, 2012 | 9 | 2012 |
Employees' Adherence to Information Security Policies: A Partial Replication. D Sikolia, DP Twitchell, GW Sagers AMCIS, 2016 | 7 | 2016 |
Motivating employees to comply with information security policies D Sikolia, D Biros Journal of the Midwest Association for Information Systems (JMWAIS) 2016 (2), 2, 2016 | 5 | 2016 |
Trustworthiness of grounded theory methodology research in information systems. MWAIS 2013 Proceedings. Paper 16 D Sikolia, D Biros, M Mason, M Weiser Association for Information Systems AIS Electronic Library (AISeL), URL …, 2013 | 5 | 2013 |
Toward a Theory of Employee Compliance with Information Security Policies: A Grounded Theory Methodology. DW Sikolia ProQuest LLC, 2013 | 5 | 2013 |
Protection motivation and deterrence: Evidence from a fortune 100 company D Sikolia, D Twitchell, G Sagers AIS Transactions on Replication Research 4 (1), 7, 2018 | 4 | 2018 |
A thematic review of user compliance with information security policies literature D Sikolia | 4 | 2013 |
The Perceived Dichotomy between Current Green IT Initiatives and Information Security D Biros, D Sikolia, M Hass Cutter IT Journal 21 (2), 26, 2008 | 3 | 2008 |
A theory of employee compliance with information security D Sikolia, M Mason, D Biros, M Weiser | 2 | 2014 |
Trust in mobile banking: The effect of culture D Sikolia, M Weiser, D Biros, NC Romano Jr | 2 | 2010 |
The policy-practice gap: Describing discordances between regulation on paper and organizational practices D Sikolia, D Biros | 1 | 2017 |
How Effective are SETA Programs Anyway: Learning and Forgetting in Security Awareness Training D Sikolia, D Biros, T Zhang Journal of Cybersecurity Education, Research and Practice 2023 (1), 4, 2023 | | 2023 |
EFFECTS OF NEUTRALIZATION IN SOFTWARE PIRACY INTENTIONS D Sikolia | | 2022 |
Compliance with Information Security Policies: A Meta-Analysis of the role of the definition of the term “Security Policies” D Sikolia | | 2019 |