Follow
David Sikolia
Title
Cited by
Cited by
Year
Trustworthiness of grounded theory methodology research in information systems
D Sikolia, D Biros, M Mason, M Weiser
1852013
Intention to Remain in a Computing Program: Exploring the Role of Passion and Grit.
P Mahatanankoon, D Sikolia
AMCIS, 2017
92017
A design science approach to virtual world implementation of trade fairs
R Sharda, D Sikolia, J Thomas, R Sambasivan
Pacific Asia Journal of the Association for Information Systems 4 (2), 4, 2012
92012
Employees' Adherence to Information Security Policies: A Partial Replication.
D Sikolia, DP Twitchell, GW Sagers
AMCIS, 2016
72016
Motivating employees to comply with information security policies
D Sikolia, D Biros
Journal of the Midwest Association for Information Systems (JMWAIS) 2016 (2), 2, 2016
52016
Trustworthiness of grounded theory methodology research in information systems. MWAIS 2013 Proceedings. Paper 16
D Sikolia, D Biros, M Mason, M Weiser
Association for Information Systems AIS Electronic Library (AISeL), URL …, 2013
52013
Toward a Theory of Employee Compliance with Information Security Policies: A Grounded Theory Methodology.
DW Sikolia
ProQuest LLC, 2013
52013
Protection motivation and deterrence: Evidence from a fortune 100 company
D Sikolia, D Twitchell, G Sagers
AIS Transactions on Replication Research 4 (1), 7, 2018
42018
A thematic review of user compliance with information security policies literature
D Sikolia
42013
The Perceived Dichotomy between Current Green IT Initiatives and Information Security
D Biros, D Sikolia, M Hass
Cutter IT Journal 21 (2), 26, 2008
32008
A theory of employee compliance with information security
D Sikolia, M Mason, D Biros, M Weiser
22014
Trust in mobile banking: The effect of culture
D Sikolia, M Weiser, D Biros, NC Romano Jr
22010
The policy-practice gap: Describing discordances between regulation on paper and organizational practices
D Sikolia, D Biros
12017
How Effective are SETA Programs Anyway: Learning and Forgetting in Security Awareness Training
D Sikolia, D Biros, T Zhang
Journal of Cybersecurity Education, Research and Practice 2023 (1), 4, 2023
2023
EFFECTS OF NEUTRALIZATION IN SOFTWARE PIRACY INTENTIONS
D Sikolia
2022
Compliance with Information Security Policies: A Meta-Analysis of the role of the definition of the term “Security Policies”
D Sikolia
2019
The system can't perform the operation now. Try again later.
Articles 1–16