Follow
Anat Zeelim Hovav
Anat Zeelim Hovav
None
Verified email at korea.ac.kr
Title
Cited by
Cited by
Year
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
J D'Arcy, A Hovav, D Galletta
Information systems research 20 (1), 79-98, 2009
17602009
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the US and South Korea
A Hovav, J D’Arcy
Information & Management 49 (2), 99-110, 2012
3592012
The impact of denial‐of‐service attack announcements on the market value of firms
A Hovav, J D'Arcy
Risk Management and Insurance Review 6 (2), 97-121, 2003
3302003
Does one size fit all? Examining the differential effects of IS security countermeasures
J D’Arcy, A Hovav
Journal of business ethics 89, 59-71, 2009
2612009
Deterring internal information systems misuse
J D'Arcy, A Hovav
Communications of the ACM 50 (10), 113-117, 2007
2342007
A model of Internet standards adoption: the case of IPv6
A Hovav, R Patnayakuni, D Schuff
Information Systems Journal 14 (3), 265-294, 2004
1502004
The impact of virus attack announcements on the market value of firms.
A Hovav, J D'Arcy
WOSIS, 146-156, 2004
1442004
This is my device! Why should I follow your rules? Employees’ compliance with BYOD security policy
A Hovav, FF Putri
Pervasive and Mobile Computing 32, 35-49, 2016
1182016
To bridge or to bond? Diverse social connections in an IS project team
JY Han, A Hovav
International Journal of Project Management 31 (3), 378-390, 2013
942013
Employees compliance with BYOD security policy: Insights from reactance, organizational justice, and protection motivation theory
FF Putri, A Hovav
912014
The role of user computer self-efficacy, cybersecurity countermeasures awareness, and cybersecurity skills influence on computer misuse
MS Choi, Y Levy Ph D, H Anat
762013
The ripple effect of an information security breach event: A stakeholder analysis
A Hovav, P Gray
Communications of the Association for Information Systems 34 (1), 50, 2014
752014
Capital market reaction to defective IT products: The case of computer viruses
A Hovav, J D'arcy
Computers & Security 24 (5), 409-424, 2005
612005
From hindsight to foresight: Applying futures research techniques in information systems
P Gray, A Hovav
Communications of the Association for Information Systems 22 (1), 12, 2008
442008
Global diffusion of the internet V-the changing dynamic of the internet: Early and late adopters of the IPv6 standard
A Hovav, D Schuff
Communications of the Association for Information Systems 15 (1), 14, 2005
412005
Determinants of Internet standards adoption: The case of South Korea
A Hovav, M Hemmert, YJ Kim
Research Policy 40 (2), 253-262, 2011
392011
Towards a best fit between organizational security countermeasures and information systems misuse behaviors
J D’Arcy, A Hovav
Journal of Information System Security 3 (2), 3-30, 2007
362007
Using a dairy management information system to facilitate precision agriculture: The case of the AfiMilkŪ system
R Berger, A Hovav
Information Systems Management 30 (1), 21-34, 2013
342013
Tutorial: identity management systems and secured access control
A Hovav, R Berger
Communications of the Association for Information Systems 25 (1), 42, 2009
332009
Market reaction to security breach announcements: Evidence from South Korea
A Hovav, JY Han, J Kim
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 48 (1 …, 2017
282017
The system can't perform the operation now. Try again later.
Articles 1–20