1. Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions;Anderson;MIS Q.,2010
2. Don't make excuses! discouraging neutralization to reduce IT policy violation;Barlow;Comput. Secur.,2013
3. Don't even think about it! the effects of antineutralization, informational, and normative communication on information security compliance;Barlow;J. Assoc. Inf. Syst.,2018
4. Field research methods: interviewing, questionnaires, participant observation, systematic observation, unobtrusive measures;Bouchard;Handbook Industr. Organ. Psychol.,1976
5. Validation in information systems research: a state-of-the-art assessment;Boudreau;Mis Q.,2001