BibTeX records: Mikko T. Siponen

download as .bib file

@article{DBLP:journals/compsec/WoodsS24,
  author       = {Naomi Woods and
                  Mikko T. Siponen},
  title        = {How memory anxiety can influence password security behavior},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103589},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103589},
  doi          = {10.1016/J.COSE.2023.103589},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WoodsS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/Siponen24,
  author       = {Mikko T. Siponen},
  editor       = {Tung X. Bui},
  title        = {Stage Theorizing in Behavioral Information Systems Security Research},
  booktitle    = {57th Hawaii International Conference on System Sciences, {HICSS} 2024,
                  Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January
                  3-6, 2024},
  pages        = {4724--4733},
  publisher    = {ScholarSpace},
  year         = {2024},
  url          = {https://hdl.handle.net/10125/106952},
  timestamp    = {Thu, 04 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/Siponen24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/MaoSN23,
  author       = {Mingsong Mao and
                  Mikko T. Siponen and
                  Marco Nathan},
  title        = {Popperian Falsificationism in {IS:} Major Confusions and Harmful Influences},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {53},
  pages        = {34},
  year         = {2023},
  url          = {https://aisel.aisnet.org/cais/vol53/iss1/34},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cais/MaoSN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/SiponenRLHL23,
  author       = {Mikko T. Siponen and
                  Mikko R{\"{o}}nkk{\"{o}} and
                  Fufan Liu and
                  Steffi Haag and
                  Gabriella Laatikainen},
  title        = {Protection Motivation Theory in Information Security Behavior Research:
                  Reconsidering the Fundamentals},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {53},
  pages        = {47},
  year         = {2023},
  url          = {https://aisel.aisnet.org/cais/vol53/iss1/47},
  timestamp    = {Mon, 01 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cais/SiponenRLHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShaikhS23,
  author       = {Faheem Ahmed Shaikh and
                  Mikko T. Siponen},
  title        = {Information security risk assessments following cybersecurity breaches:
                  The mediating role of top management attention to cybersecurity},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102974},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102974},
  doi          = {10.1016/J.COSE.2022.102974},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShaikhS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JohnstonGBCSWS23,
  author       = {Allen C. Johnston and
                  Paul Michael Di Gangi and
                  France B{\'{e}}langer and
                  Robert E. Crossler and
                  Mikko T. Siponen and
                  Merrill Warkentin and
                  Tripti Singh},
  title        = {Seeking rhetorical validity in fear appeal research: An application
                  of rhetorical theory},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103020},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103020},
  doi          = {10.1016/J.COSE.2022.103020},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/JohnstonGBCSWS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejis/JiangST23,
  author       = {Hemin Jiang and
                  Mikko T. Siponen and
                  Aggeliki Tsohou},
  title        = {Personal use of technology at work: a literature review and a theoretical
                  model for understanding how it affects employee job performance},
  journal      = {Eur. J. Inf. Syst.},
  volume       = {32},
  number       = {2},
  pages        = {331--345},
  year         = {2023},
  url          = {https://doi.org/10.1080/0960085x.2021.1963193},
  doi          = {10.1080/0960085X.2021.1963193},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejis/JiangST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/ShaoJSCH23,
  author       = {Xiuyan Shao and
                  Hemin Jiang and
                  Mikko T. Siponen and
                  Cong Cao and
                  Xiaohua Huang},
  title        = {"Unus pro omnibus, omnes pro uno": understanding unauthorised
                  file sharing in online communities from a public goods contribution
                  perspective},
  journal      = {Internet Res.},
  volume       = {33},
  number       = {3},
  pages        = {1114--1133},
  year         = {2023},
  url          = {https://doi.org/10.1108/INTR-11-2021-0808},
  doi          = {10.1108/INTR-11-2021-0808},
  timestamp    = {Tue, 11 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/intr/ShaoJSCH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pacis/2023,
  editor       = {Patrick Chau and
                  Jack Jing and
                  Mikko T. Siponen and
                  Andrew Burton{-}Jones and
                  Chuan{-}Hoo Tan and
                  Bo Sophia Xiao},
  title        = {27th Pacific Asia Conference on Information Systems, {PACIS} 2023,
                  Nanchang, China, July 9-12, 2023},
  year         = {2023},
  url          = {http://aisel.aisnet.org/pacis2023/},
  timestamp    = {Wed, 19 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pacis/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/behaviourIT/XinSC22,
  author       = {Tong Xin and
                  Mikko T. Siponen and
                  Sihua Chen},
  title        = {Understanding the inward emotion-focused coping strategies of individual
                  users in response to mobile malware threats},
  journal      = {Behav. Inf. Technol.},
  volume       = {41},
  number       = {13},
  pages        = {2835--2859},
  year         = {2022},
  url          = {https://doi.org/10.1080/0144929x.2021.1954242},
  doi          = {10.1080/0144929X.2021.1954242},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/behaviourIT/XinSC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/db/SiponenSV22,
  author       = {Mikko T. Siponen and
                  Wael Soliman and
                  Anthony Vance},
  title        = {Common Misunderstandings of Deterrence Theory in Information Systems
                  Research and Future Research Directions},
  journal      = {Data Base},
  volume       = {53},
  number       = {1},
  pages        = {25--60},
  year         = {2022},
  url          = {https://doi.org/10.1145/3514097.3514101},
  doi          = {10.1145/3514097.3514101},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/db/SiponenSV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/XieSMZ22,
  author       = {Yitian Xie and
                  Mikko T. Siponen and
                  Greg D. Moody and
                  Xiaosong Zheng},
  title        = {Discovering the interplay between defensive avoidance and continued
                  use intention of anti-malware software among experienced home users:
                  {A} moderated mediation model},
  journal      = {Inf. Manag.},
  volume       = {59},
  number       = {2},
  pages        = {103586},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.im.2021.103586},
  doi          = {10.1016/J.IM.2021.103586},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/XieSMZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LiXS22,
  author       = {Ying Li and
                  Tong Xin and
                  Mikko T. Siponen},
  title        = {Citizens' Cybersecurity Behavior: Some Major Challenges},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {1},
  pages        = {54--61},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2021.3117371},
  doi          = {10.1109/MSEC.2021.3117371},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LiXS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/XiaoSZLCM22,
  author       = {Quan Xiao and
                  Mikko T. Siponen and
                  Xing Zhang and
                  Fucai Lu and
                  Sihua Chen and
                  Mingsong Mao},
  title        = {Impacts of platform design on consumer commitment and online review
                  intention: does use context matter in dual-platform e-commerce?},
  journal      = {Internet Res.},
  volume       = {32},
  number       = {5},
  pages        = {1496--1531},
  year         = {2022},
  url          = {https://doi.org/10.1108/INTR-03-2021-0152},
  doi          = {10.1108/INTR-03-2021-0152},
  timestamp    = {Wed, 26 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/intr/XiaoSZLCM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/SolimanS22,
  author       = {Wael Soliman and
                  Mikko T. Siponen},
  title        = {What Do We Really Mean by Rigor in Information Systems Research?},
  booktitle    = {55th Hawaii International Conference on System Sciences, {HICSS} 2022,
                  Virtual Event / Maui, Hawaii, USA, January 4-7, 2022},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2022},
  url          = {http://hdl.handle.net/10125/80137},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/SolimanS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/db/HaagSL21,
  author       = {Steffi Haag and
                  Mikko T. Siponen and
                  Fufan Liu},
  title        = {Protection Motivation Theory in Information Systems Security Research:
                  {A} Review of the Past and a Road Map for the Future},
  journal      = {Data Base},
  volume       = {52},
  number       = {2},
  pages        = {25--67},
  year         = {2021},
  url          = {https://doi.org/10.1145/3462766.3462770},
  doi          = {10.1145/3462766.3462770},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/db/HaagSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/SiponenSH21,
  author       = {Mikko T. Siponen and
                  Wael Soliman and
                  Philipp Holtkamp},
  title        = {Research Perspectives: Reconsidering the Role of Research Method Guidelines
                  for Interpretive, Mixed Methods, and Design Science Research},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {22},
  number       = {4},
  pages        = {1},
  year         = {2021},
  url          = {https://aisel.aisnet.org/jais/vol22/iss4/1},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/SiponenSH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/ChenXHMSQX21,
  author       = {Sihua Chen and
                  Hua Xiao and
                  Wei He and
                  Jian Mou and
                  Mikko T. Siponen and
                  Han Qiu and
                  Feng Xu},
  title        = {Determinants of Individual Knowledge Innovation Behavior: {A} Perspective
                  of Emotion, Knowledge Sharing, and Trust},
  journal      = {J. Organ. End User Comput.},
  volume       = {33},
  number       = {6},
  pages        = {1--24},
  year         = {2021},
  url          = {https://doi.org/10.4018/joeuc.20211101.oa27},
  doi          = {10.4018/JOEUC.20211101.OA27},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joeuc/ChenXHMSQX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/misq/SanyalMS21,
  author       = {Pallab Sanyal and
                  Nirup M. Menon and
                  Mikko T. Siponen},
  title        = {An Empirical Examination of the Economics of Mobile Application Security},
  journal      = {{MIS} Q.},
  volume       = {45},
  number       = {4},
  pages        = {2235--2260},
  year         = {2021},
  url          = {https://doi.org/10.25300/misq/2021/15315},
  doi          = {10.25300/MISQ/2021/15315},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/misq/SanyalMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/EjiguSA21,
  author       = {Kibrom Tadesse Ejigu and
                  Mikko T. Siponen and
                  Tilahun Muluneh Arage},
  editor       = {Yolande E. Chan and
                  Maric Boudreau and
                  Benoit Aubert and
                  Guy Par{\'{e}} and
                  Wynne Chin},
  title        = {Investigating the Impact of Organizational Culture on Information
                  Security Policy Compliance: The Case of Ethiopia},
  booktitle    = {27th Americas Conference on Information Systems, {AMCIS} 2021, Virtual
                  Conference, August 9-13, 2021},
  publisher    = {Association for Information Systems},
  year         = {2021},
  url          = {https://aisel.aisnet.org/amcis2021/info\_security/info\_security/10},
  timestamp    = {Mon, 30 Aug 2021 12:04:20 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/EjiguSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desrist/SiponenK21,
  author       = {Mikko T. Siponen and
                  Tuula Klaavuniemi},
  editor       = {Leona Chandra Kruse and
                  Stefan Seidel and
                  Geir Inge Hausvik},
  title        = {The Primary Scientific Contribution is Hardly a Theory in Design Science
                  Research},
  booktitle    = {The Next Wave of Sociotechnical Design - 16th International Conference
                  on Design Science Research in Information Systems and Technology,
                  {DESRIST} 2021, Kristiansand, Norway, August 4-6, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12807},
  pages        = {137--146},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-82405-1\_16},
  doi          = {10.1007/978-3-030-82405-1\_16},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/desrist/SiponenK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/EjiguSM21,
  author       = {Kibrom Ejigu and
                  Mikko T. Siponen and
                  Tilahun Muluneh},
  editor       = {Doug Vogel and
                  Kathy Ning Shen and
                  Pan Shan Ling and
                  M. N. Ravishankar and
                  Jacky Xi Zhang},
  title        = {Influence of Organizational Culture on Employees Information Security
                  Policy Compliance in Ethiopian Companies},
  booktitle    = {25th Pacific Asia Conference on Information Systems, {PACIS} 2021,
                  Virtual Event / Dubai, UAE, July 12-14, 2021},
  pages        = {158},
  year         = {2021},
  url          = {https://aisel.aisnet.org/pacis2021/158},
  timestamp    = {Tue, 20 Sep 2022 19:48:12 +0200},
  biburl       = {https://dblp.org/rec/conf/pacis/EjiguSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PaananenLS20,
  author       = {Hanna Paananen and
                  Michael Lapke and
                  Mikko T. Siponen},
  title        = {State of the art in information security policy development},
  journal      = {Comput. Secur.},
  volume       = {88},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101608},
  doi          = {10.1016/J.COSE.2019.101608},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PaananenLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SiponenPV20,
  author       = {Mikko T. Siponen and
                  Petri Puhakainen and
                  Anthony Vance},
  title        = {Can individuals' neutralization techniques be overcome? {A} field
                  experiment on password policy},
  journal      = {Comput. Secur.},
  volume       = {88},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101617},
  doi          = {10.1016/J.COSE.2019.101617},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SiponenPV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KarjalainenSS20,
  author       = {Mari Karjalainen and
                  Mikko T. Siponen and
                  Suprateek Sarker},
  title        = {Toward a stage theory of the development of employees' information
                  security behavior},
  journal      = {Comput. Secur.},
  volume       = {93},
  pages        = {101782},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101782},
  doi          = {10.1016/J.COSE.2020.101782},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KarjalainenSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShaoSL20,
  author       = {Xiuyan Shao and
                  Mikko T. Siponen and
                  Fufan Liu},
  title        = {Shall we follow? Impact of reputation concern on information security
                  managers' investment decisions},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101961},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101961},
  doi          = {10.1016/J.COSE.2020.101961},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShaoSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/db/MenonS20,
  author       = {Nirup M. Menon and
                  Mikko T. Siponen},
  title        = {Executives' Commitment to Information Security: Interaction between
                  the Preferred Subordinate Influence Approach {(PSIA)} and Proposal
                  Characteristics},
  journal      = {Data Base},
  volume       = {51},
  number       = {2},
  pages        = {36--53},
  year         = {2020},
  url          = {https://doi.org/10.1145/3400043.3400047},
  doi          = {10.1145/3400043.3400047},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/db/MenonS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/VanceSS20,
  author       = {Anthony Vance and
                  Mikko T. Siponen and
                  Detmar W. Straub},
  title        = {Effects of sanctions, moral beliefs, and neutralization on information
                  security policy violations across cultures},
  journal      = {Inf. Manag.},
  volume       = {57},
  number       = {4},
  pages        = {103212},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.im.2019.103212},
  doi          = {10.1016/J.IM.2019.103212},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/VanceSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iando/SiponenK20,
  author       = {Mikko T. Siponen and
                  Tuula Klaavuniemi},
  title        = {Why is the hypothetico-deductive {(H-D)} method in information systems
                  not an {H-D} method?},
  journal      = {Inf. Organ.},
  volume       = {30},
  number       = {1},
  pages        = {100287},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.infoandorg.2020.100287},
  doi          = {10.1016/J.INFOANDORG.2020.100287},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iando/SiponenK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/JiangTSL20,
  author       = {Hemin Jiang and
                  Aggeliki Tsohou and
                  Mikko T. Siponen and
                  Ying Li},
  title        = {Examining the side effects of organizational Internet monitoring on
                  employees},
  journal      = {Internet Res.},
  volume       = {30},
  number       = {6},
  pages        = {1613--1630},
  year         = {2020},
  url          = {https://doi.org/10.1108/INTR-08-2019-0360},
  doi          = {10.1108/INTR-08-2019-0360},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/intr/JiangTSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/SiponenT20,
  author       = {Mikko T. Siponen and
                  Aggeliki Tsohou},
  title        = {Demystifying the Influential {IS} Legends of Positivism: Response
                  to Lee's Commentary},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {21},
  number       = {6},
  pages        = {1},
  year         = {2020},
  url          = {https://doi.org/10.17705/1jais.00650},
  doi          = {10.17705/1JAIS.00650},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/SiponenT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/SiponenKN20,
  author       = {Mikko T. Siponen and
                  Tuula Klaavuniemi and
                  Marco Nathan},
  title        = {Mechanistic Explanations and Deliberate Misrepresentations},
  booktitle    = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020,
                  Maui, Hawaii, USA, January 7-10, 2020},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2020},
  url          = {https://hdl.handle.net/10125/64441},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/SiponenKN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/behaviourIT/LiZS19,
  author       = {Ying Li and
                  Nan (Andy) Zhang and
                  Mikko T. Siponen},
  title        = {Keeping secure to the end: a long-term perspective to understand employees'
                  consequence-delayed information security violation},
  journal      = {Behav. Inf. Technol.},
  volume       = {38},
  number       = {5},
  pages        = {435--453},
  year         = {2019},
  url          = {https://doi.org/10.1080/0144929X.2018.1539519},
  doi          = {10.1080/0144929X.2018.1539519},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/behaviourIT/LiZS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsj/JohnstonWDS19,
  author       = {Allen C. Johnston and
                  Merrill Warkentin and
                  Alan R. Dennis and
                  Mikko T. Siponen},
  title        = {Speak their Language: Designing Effective Messages to Improve Employees'
                  Information Security Decision Making},
  journal      = {Decis. Sci.},
  volume       = {50},
  number       = {2},
  pages        = {245--284},
  year         = {2019},
  url          = {https://doi.org/10.1111/deci.12328},
  doi          = {10.1111/DECI.12328},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dsj/JohnstonWDS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmms/WoodsS19,
  author       = {Naomi Woods and
                  Mikko T. Siponen},
  title        = {Improving password memorability, while not inconveniencing the user},
  journal      = {Int. J. Hum. Comput. Stud.},
  volume       = {128},
  pages        = {61--71},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijhcs.2019.02.003},
  doi          = {10.1016/J.IJHCS.2019.02.003},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmms/WoodsS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isr/KarjalainenSS19,
  author       = {Mari Karjalainen and
                  Suprateek Sarker and
                  Mikko T. Siponen},
  title        = {Toward a Theory of Information Systems Security Behaviors of Organizational
                  Employees: {A} Dialectical Process Perspective},
  journal      = {Inf. Syst. Res.},
  volume       = {30},
  number       = {2},
  pages        = {687--704},
  year         = {2019},
  url          = {https://doi.org/10.1287/isre.2018.0827},
  doi          = {10.1287/ISRE.2018.0827},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isr/KarjalainenSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/JiangST19,
  author       = {Hemin Jiang and
                  Mikko T. Siponen and
                  Aggeliki Tsohou},
  editor       = {Jan vom Brocke and
                  Shirley Gregor and
                  Oliver M{\"{u}}ller},
  title        = {A field Experiment for Understanding the Unintended Impact of Internet
                  Monitoring on Employees: Policy Satisfaction, Organizational Citizenship
                  behaviour and Work Motivation},
  booktitle    = {27th European Conference on Information Systems - Information Systems
                  for a Sharing Society, {ECIS} 2019, Stockholm and Uppsala, Sweden,
                  June 8-14, 2019},
  year         = {2019},
  url          = {https://aisel.aisnet.org/ecis2019\_rp/107},
  timestamp    = {Wed, 05 Jun 2019 13:01:12 +0200},
  biburl       = {https://dblp.org/rec/conf/ecis/JiangST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/MohammadnazarGS19,
  author       = {Hojat Mohammadnazar and
                  Hadi Ghanbari and
                  Mikko T. Siponen},
  editor       = {Jan vom Brocke and
                  Shirley Gregor and
                  Oliver M{\"{u}}ller},
  title        = {Moral sensitivity in Information Security Dilemmas},
  booktitle    = {27th European Conference on Information Systems - Information Systems
                  for a Sharing Society, {ECIS} 2019, Stockholm and Uppsala, Sweden,
                  June 8-14, 2019},
  year         = {2019},
  url          = {https://aisel.aisnet.org/ecis2019\_rip/44},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecis/MohammadnazarGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/HoltkampSS19,
  author       = {Philipp Holtkamp and
                  Wael Soliman and
                  Mikko T. Siponen},
  editor       = {Tung Bui},
  title        = {Reconsidering the Role of Research Method Guidelines for Qualitative,
                  Mixed-methods, and Design Science Research},
  booktitle    = {52nd Hawaii International Conference on System Sciences, {HICSS} 2019,
                  Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2019},
  url          = {https://hdl.handle.net/10125/60062},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/HoltkampSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/ShaoSP19,
  author       = {Xiuyan Shao and
                  Mikko T. Siponen and
                  Seppo Pahnila},
  editor       = {Tung Bui},
  title        = {To Calculate or To Follow Others: How Do Information Security Managers
                  Make Investment Decisions?},
  booktitle    = {52nd Hawaii International Conference on System Sciences, {HICSS} 2019,
                  Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2019},
  url          = {https://hdl.handle.net/10125/59926},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/ShaoSP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/SiponenK19,
  author       = {Mikko T. Siponen and
                  Tuula Klaavuniemi},
  editor       = {Tung Bui},
  title        = {Narrowing the Theory's or Study's Scope May Increase Practical Relevance},
  booktitle    = {52nd Hawaii International Conference on System Sciences, {HICSS} 2019,
                  Grand Wailea, Maui, Hawaii, USA, January 8-11, 2019},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2019},
  url          = {https://hdl.handle.net/10125/60060},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/SiponenK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/SiponenK19,
  author       = {Mikko T. Siponen and
                  Tuula Klaavuniemi},
  editor       = {Helmut Krcmar and
                  Jane Fedorowicz and
                  Wai Fong Boh and
                  Jan Marco Leimeister and
                  Sunil Wattal},
  title        = {How and Why 'Theory' Is Often Misunderstood in Information Systems
                  Literature},
  booktitle    = {Proceedings of the 40th International Conference on Information Systems,
                  {ICIS} 2019, Munich, Germany, December 15-18, 2019},
  publisher    = {Association for Information Systems},
  year         = {2019},
  url          = {https://aisel.aisnet.org/icis2019/research\_methods/research\_methods/3},
  timestamp    = {Tue, 10 Dec 2019 12:03:30 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/SiponenK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-10913,
  author       = {Pekka Abrahamsson and
                  Nilay V. Oza and
                  Mikko T. Siponen},
  title        = {Agile Software Development Method, {A} Comparative Review1},
  journal      = {CoRR},
  volume       = {abs/1903.10913},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.10913},
  eprinttype    = {arXiv},
  eprint       = {1903.10913},
  timestamp    = {Tue, 02 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-10913.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-07946,
  author       = {Ville Vakkuri and
                  Kai{-}Kristian Kemell and
                  Joni Kultanen and
                  Mikko T. Siponen and
                  Pekka Abrahamsson},
  title        = {Ethically Aligned Design of Autonomous Systems: Industry viewpoint
                  and an empirical study},
  journal      = {CoRR},
  volume       = {abs/1906.07946},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.07946},
  eprinttype    = {arXiv},
  eprint       = {1906.07946},
  timestamp    = {Mon, 24 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-07946.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/GhanbariVS18,
  author       = {Hadi Ghanbari and
                  Tero Vartiainen and
                  Mikko T. Siponen},
  title        = {Omission of Quality Software Development Practices: {A} Systematic
                  Literature Review},
  journal      = {{ACM} Comput. Surv.},
  volume       = {51},
  number       = {2},
  pages        = {38:1--38:27},
  year         = {2018},
  url          = {https://doi.org/10.1145/3177746},
  doi          = {10.1145/3177746},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/GhanbariVS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmms/WoodsS18,
  author       = {Naomi Woods and
                  Mikko T. Siponen},
  title        = {Too many passwords? How understanding our memory can increase password
                  memorability},
  journal      = {Int. J. Hum. Comput. Stud.},
  volume       = {111},
  pages        = {36--48},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijhcs.2017.11.002},
  doi          = {10.1016/J.IJHCS.2017.11.002},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmms/WoodsS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/SiponenB18,
  author       = {Mikko T. Siponen and
                  Richard L. Baskerville},
  title        = {Intervention Effect Rates as a Path to Research Relevance: Information
                  Systems Security Example},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {19},
  number       = {4},
  pages        = {4},
  year         = {2018},
  url          = {https://doi.org/10.17705/1jais.00491},
  doi          = {10.17705/1JAIS.00491},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/SiponenB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/SiponenT18,
  author       = {Mikko T. Siponen and
                  Aggeliki Tsohou},
  title        = {Demystifying the Influential {IS} Legends of Positivism},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {19},
  number       = {7},
  pages        = {5},
  year         = {2018},
  url          = {https://aisel.aisnet.org/jais/vol19/iss7/5},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/SiponenT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jeric/TaipalusSV18,
  author       = {Toni Taipalus and
                  Mikko T. Siponen and
                  Tero Vartiainen},
  title        = {Errors and Complications in {SQL} Query Formulation},
  journal      = {{ACM} Trans. Comput. Educ.},
  volume       = {18},
  number       = {3},
  pages        = {15:1--15:29},
  year         = {2018},
  url          = {https://doi.org/10.1145/3231712},
  doi          = {10.1145/3231712},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jeric/TaipalusSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/misq/MoodySP18,
  author       = {Gregory D. Moody and
                  Mikko T. Siponen and
                  Seppo Pahnila},
  title        = {Toward a Unified Model of Information Security Policy Compliance},
  journal      = {{MIS} Q.},
  volume       = {42},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.25300/misq/2018/13853},
  doi          = {10.25300/MISQ/2018/13853},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/misq/MoodySP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/SiponenK18,
  author       = {Mikko T. Siponen and
                  Tuula Klaavuniemi},
  editor       = {Masaaki Hirano and
                  Michael D. Myers and
                  Kyoichi Kijima and
                  Motonari Tanabu and
                  Dai Senoo},
  title        = {Updating the Philosophy of Middle-Range Theories: Implications for
                  {IS}},
  booktitle    = {22nd Pacific Asia Conference on Information Systems, {PACIS} 2018,
                  Yokohama, Japan, June 26-30, 2018},
  pages        = {128},
  year         = {2018},
  url          = {https://aisel.aisnet.org/pacis2018/128},
  timestamp    = {Wed, 07 Nov 2018 09:42:06 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/SiponenK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/KinnunenS18,
  author       = {Hanna Kinnunen and
                  Mikko T. Siponen},
  editor       = {Masaaki Hirano and
                  Michael D. Myers and
                  Kyoichi Kijima and
                  Motonari Tanabu and
                  Dai Senoo},
  title        = {Developing Organization-Specific Information Security Policies},
  booktitle    = {22nd Pacific Asia Conference on Information Systems, {PACIS} 2018,
                  Yokohama, Japan, June 26-30, 2018},
  pages        = {244},
  year         = {2018},
  url          = {https://aisel.aisnet.org/pacis2018/244},
  timestamp    = {Wed, 07 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/KinnunenS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/ChatterjeeSS17,
  author       = {Sutirtha Chatterjee and
                  Suprateek Sarker and
                  Mikko T. Siponen},
  title        = {How Do Mobile ICTs Enable Organizational Fluidity: Toward a Theoretical
                  Framework},
  journal      = {Inf. Manag.},
  volume       = {54},
  number       = {1},
  pages        = {1--13},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.im.2016.03.007},
  doi          = {10.1016/J.IM.2016.03.007},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/ChatterjeeSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/KuemRSK17,
  author       = {Jungwon Kuem and
                  Soumya Ray and
                  Mikko T. Siponen and
                  Sung S. Kim},
  title        = {What Leads to Prosocial Behaviors on Social Networking Services: {A}
                  Tripartite Model},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {34},
  number       = {1},
  pages        = {40--70},
  year         = {2017},
  url          = {https://doi.org/10.1080/07421222.2017.1296744},
  doi          = {10.1080/07421222.2017.1296744},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/KuemRSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/KhansaKSK17,
  author       = {Lara Khansa and
                  Jungwon Kuem and
                  Mikko T. Siponen and
                  Sung S. Kim},
  title        = {To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of
                  Formal Organizational Controls},
  journal      = {J. Manag. Inf. Syst.},
  volume       = {34},
  number       = {1},
  pages        = {141--176},
  year         = {2017},
  url          = {https://doi.org/10.1080/07421222.2017.1297173},
  doi          = {10.1080/07421222.2017.1297173},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmis/KhansaKSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isr/LowryZWS16,
  author       = {Paul Benjamin Lowry and
                  Jun Zhang and
                  Chuang Wang and
                  Mikko T. Siponen},
  title        = {Why Do Adults Engage in Cyberbullying on Social Media? An Integration
                  of Online Disinhibition and Deindividuation Effects with the Social
                  Structure and Social Learning Model},
  journal      = {Inf. Syst. Res.},
  volume       = {27},
  number       = {4},
  pages        = {962--986},
  year         = {2016},
  url          = {https://doi.org/10.1287/isre.2016.0671},
  doi          = {10.1287/ISRE.2016.0671},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isr/LowryZWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/misq/JohnstonWS15,
  author       = {Allen C. Johnston and
                  Merrill Warkentin and
                  Mikko T. Siponen},
  title        = {An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to
                  the Human Asset Through Sanctioning Rhetoric},
  journal      = {{MIS} Q.},
  volume       = {39},
  number       = {1},
  pages        = {113--134},
  year         = {2015},
  url          = {https://doi.org/10.25300/misq/2015/39.1.06},
  doi          = {10.25300/MISQ/2015/39.1.06},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/misq/JohnstonWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejis/SiponenV14,
  author       = {Mikko T. Siponen and
                  Anthony Vance},
  title        = {Guidelines for improving the contextual relevance of field surveys:
                  the case of information security policy violations},
  journal      = {Eur. J. Inf. Syst.},
  volume       = {23},
  number       = {3},
  pages        = {289--305},
  year         = {2014},
  url          = {https://doi.org/10.1057/ejis.2012.59},
  doi          = {10.1057/EJIS.2012.59},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejis/SiponenV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/SiponenMP14,
  author       = {Mikko T. Siponen and
                  M. Adam Mahmood and
                  Seppo Pahnila},
  title        = {Employees' adherence to information security policies: An exploratory
                  field study},
  journal      = {Inf. Manag.},
  volume       = {51},
  number       = {2},
  pages        = {217--224},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.im.2013.08.006},
  doi          = {10.1016/J.IM.2013.08.006},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/SiponenMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/KuemS14,
  author       = {Jungwon Kuem and
                  Mikko T. Siponen},
  title        = {Short-Time Non-work-related Computing and Creative Performance},
  booktitle    = {47th Hawaii International Conference on System Sciences, {HICSS} 2014,
                  Waikoloa, HI, USA, January 6-9, 2014},
  pages        = {3215--3223},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HICSS.2014.398},
  doi          = {10.1109/HICSS.2014.398},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/KuemS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/EbotS14,
  author       = {Alain Claude Tambe Ebot and
                  Mikko T. Siponen},
  editor       = {Michael D. Myers and
                  Detmar W. Straub},
  title        = {Toward a Rational Choice Process Theory of Internet Scamming: The
                  Offender's Perspective},
  booktitle    = {Proceedings of the International Conference on Information Systems
                  - Building a Better World through Information Systems, {ICIS} 2014,
                  Auckland, New Zealand, December 14-17, 2014},
  publisher    = {Association for Information Systems},
  year         = {2014},
  url          = {http://aisel.aisnet.org/icis2014/proceedings/GeneralIS/16},
  timestamp    = {Tue, 24 Mar 2015 08:43:46 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/EbotS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/MoodyS13,
  author       = {Gregory D. Moody and
                  Mikko T. Siponen},
  title        = {Using the theory of interpersonal behavior to explain non-work-related
                  personal use of the Internet at work},
  journal      = {Inf. Manag.},
  volume       = {50},
  number       = {6},
  pages        = {322--335},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.im.2013.04.005},
  doi          = {10.1016/J.IM.2013.04.005},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/MoodyS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/LeiviskaS13,
  author       = {Katja Leivisk{\"{a}} and
                  Mikko T. Siponen},
  title        = {Understanding Why {IS} Students Drop Out: Toward {A} Process Theory},
  booktitle    = {21st European Conference on Information Systems, {ECIS} 2013, Utrecht,
                  The Netherlands, June 5-8, 2013},
  pages        = {62},
  year         = {2013},
  url          = {http://aisel.aisnet.org/ecis2013\_cr/62},
  timestamp    = {Mon, 05 Dec 2016 15:14:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/LeiviskaS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/KarjalainenSPS13,
  author       = {Mari Karjalainen and
                  Mikko T. Siponen and
                  Petri Puhakainen and
                  Suprateek Sarker},
  editor       = {Jae{-}Nam Lee and
                  Ji{-}Ye Mao and
                  James Y. L. Thong},
  title        = {One Size Does Not Fit All: Different Cultures Require Different Information
                  Systems Security Interventions},
  booktitle    = {17th Pacific Asia Conference on Information Systems, {PACIS} 2013,
                  Jeju Island, Korea, June 18-22, 2013},
  pages        = {98},
  year         = {2013},
  url          = {http://aisel.aisnet.org/pacis2013/98},
  timestamp    = {Tue, 08 Apr 2014 14:41:43 +0200},
  biburl       = {https://dblp.org/rec/conf/pacis/KarjalainenSPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/PahnilaKS13,
  author       = {Seppo Pahnila and
                  Mari Karjalainen and
                  Mikko T. Siponen},
  editor       = {Jae{-}Nam Lee and
                  Ji{-}Ye Mao and
                  James Y. L. Thong},
  title        = {Information Security Behavior: Towards Multi-Stage Models},
  booktitle    = {17th Pacific Asia Conference on Information Systems, {PACIS} 2013,
                  Jeju Island, Korea, June 18-22, 2013},
  pages        = {102},
  year         = {2013},
  url          = {http://aisel.aisnet.org/pacis2013/102},
  timestamp    = {Tue, 08 Apr 2014 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pacis/PahnilaKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/VanceSP12,
  author       = {Anthony Vance and
                  Mikko T. Siponen and
                  Seppo Pahnila},
  title        = {Motivating {IS} security compliance: Insights from Habit and Protection
                  Motivation Theory},
  journal      = {Inf. Manag.},
  volume       = {49},
  number       = {3-4},
  pages        = {190--198},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.im.2012.04.002},
  doi          = {10.1016/J.IM.2012.04.002},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/VanceSP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/SiponenVW12,
  author       = {Mikko T. Siponen and
                  Anthony Vance and
                  Robert Willison},
  title        = {New insights into the problem of software piracy: The effects of neutralization,
                  shame, and moral beliefs},
  journal      = {Inf. Manag.},
  volume       = {49},
  number       = {7-8},
  pages        = {334--341},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.im.2012.06.004},
  doi          = {10.1016/J.IM.2012.06.004},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/SiponenVW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocec/MahmoodSLV12,
  author       = {Mo Adam Mahmood and
                  Mikko T. Siponen and
                  Francisco J. L{\'{o}}pez and
                  Anthony Vance},
  title        = {Measuring Electronic Commerce Technology-Enabled Business Value: An
                  Empirical Investigation},
  journal      = {J. Organ. Comput. Electron. Commer.},
  volume       = {22},
  number       = {3},
  pages        = {256--279},
  year         = {2012},
  url          = {https://doi.org/10.1080/10919392.2012.696947},
  doi          = {10.1080/10919392.2012.696947},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocec/MahmoodSLV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/VanceS12,
  author       = {Anthony Vance and
                  Mikko T. Siponen},
  title        = {{IS} Security Policy Violations: {A} Rational Choice Perspective},
  journal      = {J. Organ. End User Comput.},
  volume       = {24},
  number       = {1},
  pages        = {21--41},
  year         = {2012},
  url          = {https://doi.org/10.4018/joeuc.2012010102},
  doi          = {10.4018/JOEUC.2012010102},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joeuc/VanceS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/VartiainenS12,
  author       = {Tero Vartiainen and
                  Mikko T. Siponen},
  editor       = {Shan L. Pan and
                  Tru H. Cao},
  title        = {What Makes Information System Developers Produce Defective Information
                  Systems For Their Clients?},
  booktitle    = {16th Pacific Asia Conference on Information Systems, {PACIS} 2012,
                  Ho Chi Minh City, Vietnam, 11-15 July 2012},
  pages        = {107},
  year         = {2012},
  url          = {http://aisel.aisnet.org/pacis2012/107},
  timestamp    = {Wed, 30 Jan 2013 13:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/VartiainenS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/LowryRMS12,
  author       = {Paul Benjamin Lowry and
                  Kamel Rouibah and
                  Greg D. Moody and
                  Mikko T. Siponen},
  editor       = {Shan L. Pan and
                  Tru H. Cao},
  title        = {Towards {A} Cross-Cultural Model Of Online Whistle-Blowing Systems
                  Use},
  booktitle    = {16th Pacific Asia Conference on Information Systems, {PACIS} 2012,
                  Ho Chi Minh City, Vietnam, 11-15 July 2012},
  pages        = {147},
  year         = {2012},
  url          = {http://aisel.aisnet.org/pacis2012/147},
  timestamp    = {Wed, 30 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/LowryRMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/KarjalainenS11,
  author       = {Mari Karjalainen and
                  Mikko T. Siponen},
  title        = {Toward a New Meta-Theory for Designing Information Systems {(IS)}
                  Security Training Approaches},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {12},
  number       = {8},
  pages        = {3},
  year         = {2011},
  url          = {https://doi.org/10.17705/1jais.00274},
  doi          = {10.17705/1JAIS.00274},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/KarjalainenS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisedu/VartiainenSM11,
  author       = {Tero Vartiainen and
                  Mikko T. Siponen and
                  Liisa Myyry},
  title        = {The Effects of Teaching the Universality Thesis on Students' Integrative
                  Complexity of Thought},
  journal      = {J. Inf. Syst. Educ.},
  volume       = {22},
  number       = {3},
  pages        = {261},
  year         = {2011},
  url          = {https://jise.org/Volume22/n3/JISEv22n3p261.html},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisedu/VartiainenSM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pajais/PahnilaSZ11,
  author       = {Seppo Pahnila and
                  Mikko T. Siponen and
                  Xiaosong Zheng},
  title        = {Integrating Habit into {UTAUT:} The Chinese eBay Case},
  journal      = {Pac. Asia J. Assoc. Inf. Syst.},
  volume       = {3},
  number       = {2},
  pages        = {2},
  year         = {2011},
  url          = {https://aisel.aisnet.org/pajais/vol3/iss2/2},
  timestamp    = {Thu, 24 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pajais/PahnilaSZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/LiS11,
  author       = {Ying Li and
                  Mikko T. Siponen},
  editor       = {Peter B. Seddon and
                  Shirley Gregor},
  title        = {A Call For Research On Home Users' Information Security Behaviour},
  booktitle    = {Pacific Asia Conference on Information Systems, {PACIS} 2011: Quality
                  Research in Pacific Asia, Brisbane, Queensland, Australia, 7-11 July
                  2011},
  pages        = {112},
  publisher    = {Queensland University of Technology},
  year         = {2011},
  url          = {http://aisel.aisnet.org/pacis2011/112},
  timestamp    = {Wed, 12 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/LiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/VartiainenSM11,
  author       = {Tero Vartiainen and
                  Mikko T. Siponen and
                  Gregory D. Moody},
  editor       = {Peter B. Seddon and
                  Shirley Gregor},
  title        = {Gray-Area Phenomenon In Information Systems Development: {A} Call
                  For Research},
  booktitle    = {Pacific Asia Conference on Information Systems, {PACIS} 2011: Quality
                  Research in Pacific Asia, Brisbane, Queensland, Australia, 7-11 July
                  2011},
  pages        = {198},
  publisher    = {Queensland University of Technology},
  year         = {2011},
  url          = {http://aisel.aisnet.org/pacis2011/198},
  timestamp    = {Wed, 30 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/VartiainenSM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SiponenPM10,
  author       = {Mikko T. Siponen and
                  Seppo Pahnila and
                  M. Adam Mahmood},
  title        = {Compliance with Information Security Policies: An Empirical Investigation},
  journal      = {Computer},
  volume       = {43},
  number       = {2},
  pages        = {64--71},
  year         = {2010},
  url          = {https://doi.org/10.1109/MC.2010.35},
  doi          = {10.1109/MC.2010.35},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/SiponenPM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisedu/VartiainenS10,
  author       = {Tero Vartiainen and
                  Mikko T. Siponen},
  title        = {On {IS} Students' Intentions to Use Theories of Ethics in Resolving
                  Moral Conflicts},
  journal      = {J. Inf. Syst. Educ.},
  volume       = {21},
  number       = {1},
  pages        = {33--42},
  year         = {2010},
  url          = {https://jise.org/Volume21/n1/JISEv21n1p33.html},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisedu/VartiainenS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/misq/SipponenV10,
  author       = {Mikko T. Siponen and
                  Anthony Vance},
  title        = {Neutralization: New Insights into the Problem of Employee Systems
                  Security Policy Violations},
  journal      = {{MIS} Q.},
  volume       = {34},
  number       = {3},
  pages        = {487--502},
  year         = {2010},
  url          = {http://misq.org/neutralization-new-insights-into-the-problem-of-employee-systems-security-policy-violations.html},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/misq/SipponenV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/misq/PuhakainenS10,
  author       = {Petri Puhakainen and
                  Mikko T. Siponen},
  title        = {Improving Employees' Compliance Through Information Systems Security
                  Training: An Action Research Study},
  journal      = {{MIS} Q.},
  volume       = {34},
  number       = {4},
  pages        = {757--778},
  year         = {2010},
  url          = {http://misq.org/improving-employees-compliance-through-information-systems-security-training-an-action-research-study.html},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/misq/PuhakainenS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/LeiviskaS10,
  author       = {Katja Leivisk{\"{a}} and
                  Mikko T. Siponen},
  title        = {Attitudes of sixth form female students toward the {IT} field},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {40},
  number       = {1},
  pages        = {34--49},
  year         = {2010},
  url          = {https://doi.org/10.1145/1750888.1750893},
  doi          = {10.1145/1750888.1750893},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/LeiviskaS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/PahnilaS10,
  author       = {Seppo Pahnila and
                  Mikko T. Siponen},
  title        = {Implementation Intentions Explain How a Behavior Becomes Habitual:
                  The Use of Online Newspapers},
  booktitle    = {43rd Hawaii International International Conference on Systems Science
                  {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI,
                  {USA}},
  pages        = {1--11},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HICSS.2010.222},
  doi          = {10.1109/HICSS.2010.222},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/PahnilaS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/SiponenVW10,
  author       = {Mikko T. Siponen and
                  Anthony Vance and
                  Robert Willison},
  title        = {New Insights for an Old Problem: Explaining Software Piracy through
                  Neutralization Theory},
  booktitle    = {43rd Hawaii International International Conference on Systems Science
                  {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI,
                  {USA}},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HICSS.2010.287},
  doi          = {10.1109/HICSS.2010.287},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/SiponenVW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/AbrahamssonOS10,
  author       = {Pekka Abrahamsson and
                  Nilay V. Oza and
                  Mikko T. Siponen},
  editor       = {Torgeir Dings{\o}yr and
                  Tore Dyb{\aa} and
                  Nils Brede Moe},
  title        = {Agile Software Development Methods: {A} Comparative Review\({}^{\mbox{1}}\)},
  booktitle    = {Agile Software Development - Current Research and Future Directions},
  pages        = {31--59},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12575-1\_3},
  doi          = {10.1007/978-3-642-12575-1\_3},
  timestamp    = {Fri, 27 Mar 2020 08:31:58 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/p/AbrahamssonOS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/WillisonS09,
  author       = {Robert Willison and
                  Mikko T. Siponen},
  title        = {Overcoming the insider: reducing employee computer crime through Situational
                  Crime Prevention},
  journal      = {Commun. {ACM}},
  volume       = {52},
  number       = {9},
  pages        = {133--137},
  year         = {2009},
  url          = {https://doi.org/10.1145/1562164.1562198},
  doi          = {10.1145/1562164.1562198},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/WillisonS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/SiponenMP09,
  author       = {Mikko T. Siponen and
                  M. Adam Mahmood and
                  Seppo Pahnila},
  title        = {Technical opinion - Are employees putting your company at risk by
                  not following information security policies?},
  journal      = {Commun. {ACM}},
  volume       = {52},
  number       = {12},
  pages        = {145--147},
  year         = {2009},
  url          = {https://doi.org/10.1145/1610252.1610289},
  doi          = {10.1145/1610252.1610289},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/SiponenMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejis/MyyrySPVV09,
  author       = {Liisa Myyry and
                  Mikko T. Siponen and
                  Seppo Pahnila and
                  Tero Vartiainen and
                  Anthony Vance},
  title        = {What levels of moral reasoning and values explain adherence to information
                  security rules? An empirical study},
  journal      = {Eur. J. Inf. Syst.},
  volume       = {18},
  number       = {2},
  pages        = {126--139},
  year         = {2009},
  url          = {https://doi.org/10.1057/ejis.2009.10},
  doi          = {10.1057/EJIS.2009.10},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejis/MyyrySPVV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/SiponenW09,
  author       = {Mikko T. Siponen and
                  Robert Willison},
  title        = {Information security management standards: Problems and solutions},
  journal      = {Inf. Manag.},
  volume       = {46},
  number       = {5},
  pages        = {267--270},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.im.2008.12.007},
  doi          = {10.1016/J.IM.2008.12.007},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/SiponenW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/SiponenH08,
  author       = {Mikko T. Siponen and
                  Juhani Heikka},
  title        = {Do secure information system design methods provide adequate modeling
                  support?},
  journal      = {Inf. Softw. Technol.},
  volume       = {50},
  number       = {9-10},
  pages        = {1035--1053},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.infsof.2007.10.011},
  doi          = {10.1016/J.INFSOF.2007.10.011},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/infsof/SiponenH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/WillisonS08,
  author       = {Robert Willison and
                  Mikko T. Siponen},
  title        = {Software Piracy: Original Insights from a Criminological Perspective},
  booktitle    = {41st Hawaii International International Conference on Systems Science
                  {(HICSS-41} 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island,
                  HI, {USA}},
  pages        = {266},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HICSS.2008.407},
  doi          = {10.1109/HICSS.2008.407},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/WillisonS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/SiponenWB08,
  author       = {Mikko T. Siponen and
                  Robert Willison and
                  Richard L. Baskerville},
  title        = {Power and Practice in Information Systems Security Research},
  booktitle    = {Proceedings of the International Conference on Information Systems,
                  {ICIS} 2008, Paris, France, December 14-17, 2008},
  pages        = {26},
  publisher    = {Association for Information Systems},
  year         = {2008},
  url          = {http://aisel.aisnet.org/icis2008/26},
  timestamp    = {Wed, 30 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/SiponenWB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/db/SiponenO07,
  author       = {Mikko T. Siponen and
                  Harri Oinas{-}Kukkonen},
  title        = {A review of information security issues and respective research contributions},
  journal      = {Data Base},
  volume       = {38},
  number       = {1},
  pages        = {60--80},
  year         = {2007},
  url          = {https://doi.org/10.1145/1216218.1216224},
  doi          = {10.1145/1216218.1216224},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/db/SiponenO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/SiponenV07,
  author       = {Mikko T. Siponen and
                  Tero Vartiainen},
  title        = {Unauthorized copying of software: an empirical study of reasons for
                  and against},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {37},
  number       = {1},
  pages        = {30--43},
  year         = {2007},
  url          = {https://doi.org/10.1145/1273353.1273357},
  doi          = {10.1145/1273353.1273357},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/SiponenV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/SiponenW07,
  author       = {Mikko T. Siponen and
                  Robert Willison},
  editor       = {Hubert {\"{O}}sterle and
                  Joachim Schelp and
                  Robert Winter},
  title        = {A Critical Assessment of {IS} Security Research between 1990-2004},
  booktitle    = {Proceedings of the Fifteenth European Conference on Information Systems,
                  {ECIS} 2007, St. Gallen, Switzerland, 2007},
  pages        = {1551--1559},
  publisher    = {University of St. Gallen},
  year         = {2007},
  url          = {http://aisel.aisnet.org/ecis2007/190},
  timestamp    = {Wed, 24 Jul 2019 16:44:05 +0200},
  biburl       = {https://dblp.org/rec/conf/ecis/SiponenW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/PahnilaSM07,
  author       = {Seppo Pahnila and
                  Mikko T. Siponen and
                  M. Adam Mahmood},
  title        = {Employees' Behavior towards {IS} Security Policy Compliance},
  booktitle    = {40th Hawaii International International Conference on Systems Science
                  {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007,
                  Waikoloa, Big Island, HI, {USA}},
  pages        = {156},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/HICSS.2007.206},
  doi          = {10.1109/HICSS.2007.206},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/PahnilaSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/PahnilaSM07,
  author       = {Seppo Pahnila and
                  Mikko T. Siponen and
                  M. Adam Mahmood},
  title        = {Which Factors Explain Employees' Adherence to Information Security
                  Policies? An Empirical Study},
  booktitle    = {Pacific Asia Conference on Information Systems, {PACIS} 2007, Auckland,
                  New Zealand, July 4-6, 2007},
  pages        = {73},
  publisher    = {AISeL},
  year         = {2007},
  url          = {http://aisel.aisnet.org/pacis2007/73},
  timestamp    = {Thu, 01 Mar 2012 19:18:51 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/PahnilaSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SiponenPM07,
  author       = {Mikko T. Siponen and
                  Seppo Pahnila and
                  M. Adam Mahmood},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Les Labuschagne and
                  Jan H. P. Eloff and
                  Rossouw von Solms},
  title        = {Employees' Adherence to Information Security Policies: An Empirical
                  Study},
  booktitle    = {New Approaches for Security, Privacy and Trust in Complex Environments,
                  Proceedings of the {IFIP} {TC-11} 22nd International Information Security
                  Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa},
  series       = {{IFIP}},
  volume       = {232},
  pages        = {133--144},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-72367-9\_12},
  doi          = {10.1007/978-0-387-72367-9\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/SiponenPM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/behaviourIT/JokelaSHE06,
  author       = {Timo Jokela and
                  Mikko T. Siponen and
                  Naotake Hirasawa and
                  Jonathan Earthy},
  title        = {A survey of usability capability maturity models: implications for
                  practice and research},
  journal      = {Behav. Inf. Technol.},
  volume       = {25},
  number       = {3},
  pages        = {263--282},
  year         = {2006},
  url          = {https://doi.org/10.1080/01449290500168079},
  doi          = {10.1080/01449290500168079},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/behaviourIT/JokelaSHE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Siponen06,
  author       = {Mikko T. Siponen},
  title        = {Information security standards focus on the existence of process,
                  not its content},
  journal      = {Commun. {ACM}},
  volume       = {49},
  number       = {8},
  pages        = {97--100},
  year         = {2006},
  url          = {https://doi.org/10.1145/1145287.1145316},
  doi          = {10.1145/1145287.1145316},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Siponen06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Siponen06,
  author       = {Mikko T. Siponen},
  title        = {Secure-system design methods: evolution and future directions},
  journal      = {{IT} Prof.},
  volume       = {8},
  number       = {3},
  pages        = {40--44},
  year         = {2006},
  url          = {https://doi.org/10.1109/MITP.2006.73},
  doi          = {10.1109/MITP.2006.73},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Siponen06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/Siponen06,
  author       = {Mikko T. Siponen},
  title        = {Six Design Theories for {IS} Security Policies and Guidelines},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {7},
  number       = {7},
  pages        = {19},
  year         = {2006},
  url          = {https://doi.org/10.17705/1jais.00095},
  doi          = {10.17705/1JAIS.00095},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/Siponen06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/HeikkaBS06,
  author       = {Juhani Heikka and
                  Richard L. Baskerville and
                  Mikko T. Siponen},
  title        = {A Design Theory for Secure Information Systems Design Methods},
  journal      = {J. Assoc. Inf. Syst.},
  volume       = {7},
  number       = {11},
  pages        = {31},
  year         = {2006},
  url          = {https://doi.org/10.17705/1jais.00107},
  doi          = {10.17705/1JAIS.00107},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jais/HeikkaBS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Siponen06,
  author       = {Mikko T. Siponen},
  title        = {A justification for software rights},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {36},
  number       = {3},
  pages        = {11--20},
  year         = {2006},
  url          = {https://doi.org/10.1145/1195716.1195718},
  doi          = {10.1145/1195716.1195718},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Siponen06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/LeiviskaS06,
  author       = {Katja Leivisk{\"{a}} and
                  Mikko T. Siponen},
  editor       = {Jan Ljungberg and
                  Magnus Andersson},
  title        = {Attitudes of sixth form female students towards the {IT} field},
  booktitle    = {Proceedings of the Fourteenth European Conference on Information Systems,
                  {ECIS} 2006, G{\"{o}}teborg, Sweden, 2006},
  pages        = {859--872},
  year         = {2006},
  url          = {http://aisel.aisnet.org/ecis2006/187},
  timestamp    = {Mon, 05 Dec 2016 15:14:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/LeiviskaS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/DhillonSS06,
  author       = {Gurpreet Dhillon and
                  Mikko T. Siponen and
                  Raj Sharman},
  title        = {Minitrack Introduction},
  booktitle    = {39th Hawaii International International Conference on Systems Science
                  {(HICSS-39} 2006), {CD-ROM} / Abstracts Proceedings, 4-7 January 2006,
                  Kauai, HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/HICSS.2006.302},
  doi          = {10.1109/HICSS.2006.302},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/DhillonSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/SiponenS06,
  author       = {Mikko T. Siponen and
                  Carl Stucke},
  title        = {Effective Anti-Spam Strategies in Companies: An International Study},
  booktitle    = {39th Hawaii International International Conference on Systems Science
                  {(HICSS-39} 2006), {CD-ROM} / Abstracts Proceedings, 4-7 January 2006,
                  Kauai, HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/HICSS.2006.140},
  doi          = {10.1109/HICSS.2006.140},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/SiponenS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/HeikkaS06,
  author       = {Juhani Heikka and
                  Mikko T. Siponen},
  title        = {Abuse Cases Revised: An Action Research Experience},
  booktitle    = {Pacific Asia Conference on Information Systems, {PACIS} 2006, Kuala
                  Lumpur, Malaysia, July 6-9, 2006},
  pages        = {46},
  publisher    = {AISeL},
  year         = {2006},
  url          = {http://aisel.aisnet.org/pacis2006/46},
  timestamp    = {Thu, 01 Mar 2012 19:27:42 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/HeikkaS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/SiponenPM06,
  author       = {Mikko T. Siponen and
                  Seppo Pahnila and
                  M. Adam Mahmood},
  title        = {A New Model for Understanding Users' {IS} Security Compliance},
  booktitle    = {Pacific Asia Conference on Information Systems, {PACIS} 2006, Kuala
                  Lumpur, Malaysia, July 6-9, 2006},
  pages        = {48},
  publisher    = {AISeL},
  year         = {2006},
  url          = {http://aisel.aisnet.org/pacis2006/48},
  timestamp    = {Thu, 01 Mar 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/SiponenPM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/MettovaaraSL06,
  author       = {Vesa Mettovaara and
                  Mikko T. Siponen and
                  Jari A. Lehto},
  title        = {Collaboration in Software Development: Lesson Learned from Two Large
                  Multinational Organizations},
  booktitle    = {Pacific Asia Conference on Information Systems, {PACIS} 2006, Kuala
                  Lumpur, Malaysia, July 6-9, 2006},
  pages        = {103},
  publisher    = {AISeL},
  year         = {2006},
  url          = {http://aisel.aisnet.org/pacis2006/103},
  timestamp    = {Thu, 01 Mar 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/MettovaaraSL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/behaviourIT/SiponenV05,
  author       = {Mikko T. Siponen and
                  Tero Vartiainen},
  title        = {Attitudes to and factors affecting unauthorized copying of computer
                  software in Finland},
  journal      = {Behav. Inf. Technol.},
  volume       = {24},
  number       = {4},
  pages        = {249--257},
  year         = {2005},
  url          = {https://doi.org/10.1080/01449290512331321857},
  doi          = {10.1080/01449290512331321857},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/behaviourIT/SiponenV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejis/Siponen05,
  author       = {Mikko T. Siponen},
  title        = {An analysis of the traditional {IS} security approaches: implications
                  for research and practice},
  journal      = {Eur. J. Inf. Syst.},
  volume       = {14},
  number       = {3},
  pages        = {303--315},
  year         = {2005},
  url          = {https://doi.org/10.1057/palgrave.ejis.3000537},
  doi          = {10.1057/PALGRAVE.EJIS.3000537},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejis/Siponen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iando/Siponen05,
  author       = {Mikko T. Siponen},
  title        = {Analysis of modern {IS} security development approaches: towards the
                  next generation of social and adaptable {ISS} methods},
  journal      = {Inf. Organ.},
  volume       = {15},
  number       = {4},
  pages        = {339--375},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.infoandorg.2004.11.001},
  doi          = {10.1016/J.INFOANDORG.2004.11.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iando/Siponen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/Siponen05,
  author       = {Mikko T. Siponen},
  title        = {Unauthorized Copying of Software: What is Wrong with the Nonexclusive
                  Argument?},
  journal      = {{IT} Prof.},
  volume       = {7},
  number       = {5},
  pages        = {49--51},
  year         = {2005},
  url          = {https://doi.org/10.1109/MITP.2005.127},
  doi          = {10.1109/MITP.2005.127},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/Siponen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/DhillonSS05,
  author       = {Gurpreet Dhillon and
                  Mikko T. Siponen and
                  Raj Sharman},
  title        = {Mini Track: 'Information Systems Security Management'},
  booktitle    = {38th Hawaii International Conference on System Sciences {(HICSS-38}
                  2005), {CD-ROM} / Abstracts Proceedings, 3-6 January 2005, Big Island,
                  HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/HICSS.2005.414},
  doi          = {10.1109/HICSS.2005.414},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/DhillonSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/SiponenBK05,
  author       = {Mikko T. Siponen and
                  Richard L. Baskerville and
                  Tapio Kuivalainen},
  title        = {Integrating Security into Agile Development Methods},
  booktitle    = {38th Hawaii International Conference on System Sciences {(HICSS-38}
                  2005), {CD-ROM} / Abstracts Proceedings, 3-6 January 2005, Big Island,
                  HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/HICSS.2005.329},
  doi          = {10.1109/HICSS.2005.329},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/SiponenBK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/SiponenV04,
  author       = {Mikko T. Siponen and
                  Tero Vartiainen},
  title        = {Unauthorized copying of software and levels of moral development:
                  a literature analysis and its implications for research and practice},
  journal      = {Inf. Syst. J.},
  volume       = {14},
  number       = {4},
  pages        = {387--407},
  year         = {2004},
  url          = {https://doi.org/10.1111/j.1365-2575.2004.00179.x},
  doi          = {10.1111/J.1365-2575.2004.00179.X},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isj/SiponenV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Siponen04,
  author       = {Mikko T. Siponen},
  title        = {A justification for software rights},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {34},
  number       = {3},
  pages        = {3},
  year         = {2004},
  url          = {https://doi.org/10.1145/1111635.1111638},
  doi          = {10.1145/1111635.1111638},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Siponen04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/SiponenD04,
  author       = {Mikko T. Siponen and
                  Gurpreet Dhillon},
  title        = {Information Systems Security Management: Minitrack Introduction},
  booktitle    = {37th Hawaii International Conference on System Sciences {(HICSS-37}
                  2004), {CD-ROM} / Abstracts Proceedings, 5-8 January 2004, Big Island,
                  HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/HICSS.2004.1265442},
  doi          = {10.1109/HICSS.2004.1265442},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/SiponenD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/VartiainenS04,
  author       = {Tero Vartiainen and
                  Mikko T. Siponen},
  title        = {Defects, Usefulness and Usability of Ethics Theories in {IS} Ethics
                  Education},
  booktitle    = {{ICEIS} 2004, Proceedings of the 6th International Conference on Enterprise
                  Information Systems, Porto, Portugal, April 14-17, 2004},
  pages        = {179--186},
  year         = {2004},
  timestamp    = {Thu, 02 Feb 2017 12:56:49 +0100},
  biburl       = {https://dblp.org/rec/conf/iceis/VartiainenS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/VartiainenS03,
  author       = {Tero Vartiainen and
                  Mikko T. Siponen},
  editor       = {Claudio U. Ciborra and
                  Riccardo Mercurio and
                  Marco de Marco and
                  Marcello Martinez and
                  Andrea Carignani},
  title        = {Universality thesis in {IS} ethics education - an empirical study},
  booktitle    = {Proceedings of the 11th European Conference on Information Systems,
                  {ECIS} 2003, Naples, Italy 16-21 June 2003},
  pages        = {2036--2043},
  year         = {2003},
  timestamp    = {Mon, 05 Dec 2016 15:14:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/VartiainenS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/AbrahamssonWSR03,
  author       = {Pekka Abrahamsson and
                  Juhani Warsta and
                  Mikko T. Siponen and
                  Jussi Ronkainen},
  editor       = {Lori A. Clarke and
                  Laurie Dillon and
                  Walter F. Tichy},
  title        = {New Directions on Agile Methods: {A} Comparative Analysis},
  booktitle    = {Proceedings of the 25th International Conference on Software Engineering,
                  May 3-10, 2003, Portland, Oregon, {USA}},
  pages        = {244--254},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICSE.2003.1201204},
  doi          = {10.1109/ICSE.2003.1201204},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/AbrahamssonWSR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/Siponen03,
  author       = {Mikko T. Siponen},
  title        = {Information Security Management Standards: Problems and Solutions},
  booktitle    = {The Seventh Pacific Asia Conference on Information Systems, {PACIS}
                  2003, Adelaide, Australia, July 10-13, 2003},
  pages        = {105},
  publisher    = {AISeL},
  year         = {2003},
  url          = {http://aisel.aisnet.org/pacis2003/105},
  timestamp    = {Sat, 03 Mar 2012 13:29:57 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/Siponen03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Siponen03,
  author       = {Mikko T. Siponen},
  editor       = {Dimitris Gritzalis and
                  Sabrina De Capitani di Vimercati and
                  Pierangela Samarati and
                  Sokratis K. Katsikas},
  title        = {New Directions on {IS} Security Methods},
  booktitle    = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\)
                  International Conference on Information Security (SEC2003), May 26-28,
                  2003, Athens, Greece},
  series       = {{IFIP} Conference Proceedings},
  volume       = {250},
  pages        = {325--336},
  publisher    = {Kluwer},
  year         = {2003},
  timestamp    = {Fri, 25 Apr 2003 10:12:34 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/Siponen03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Siponen02,
  author       = {Mikko T. Siponen},
  title        = {Designing secure information systems and software:critical evaluation
                  of the existing approaches and a new paradigm},
  school       = {University of Oulu, Finland},
  year         = {2002},
  url          = {http://urn.fi/urn:isbn:9514267907},
  urn          = {urn:isbn:9514267907},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Siponen02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ajis/Siponen02,
  author       = {Mikko T. Siponen},
  title        = {Database Security and the Problem of Polyinstantiation: a moral scrutiny},
  journal      = {Australas. J. Inf. Syst.},
  volume       = {10},
  number       = {1},
  year         = {2002},
  url          = {http://journal.acs.org.au/index.php/ajis/article/view/169},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ajis/Siponen02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/SiponenV02,
  author       = {Mikko T. Siponen and
                  Tero Vartiainen},
  title        = {Teaching End-User Ethics: Issues and a Solution Based on Universalizability},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {8},
  pages        = {29},
  year         = {2002},
  url          = {https://doi.org/10.17705/1cais.00829},
  doi          = {10.17705/1CAIS.00829},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cais/SiponenV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Siponen02,
  author       = {Mikko T. Siponen},
  title        = {Towards maturity of information security maturity criteria: six lessons
                  learned from software maturity criteria},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {5},
  pages        = {210--224},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210446560},
  doi          = {10.1108/09685220210446560},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Siponen02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Siponen02,
  author       = {Mikko T. Siponen},
  editor       = {Adeeb Ghonaimy and
                  Mahmoud T. El{-}Hadidi and
                  Heba Kamal Aslan},
  title        = {Maturity Criteria for Developing Secure {IS} and {SW:} Limits, and
                  Prospects},
  booktitle    = {Security in the Information Society: Visions and Perspectives, {IFIP}
                  {TC11} 17\({}^{\mbox{th}}\) International Conference on Information
                  Security (SEC2002), May 7-9, 2002, Cairo, Egypt},
  series       = {{IFIP} Conference Proceedings},
  volume       = {214},
  pages        = {91--108},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Fri, 11 Feb 2005 12:53:42 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/Siponen02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ais/Siponen01,
  author       = {Mikko T. Siponen},
  title        = {The relevance of software rights: An anthology of the divergence of
                  sociopolitical doctrines},
  journal      = {{AI} Soc.},
  volume       = {15},
  number       = {1-2},
  pages        = {128--148},
  year         = {2001},
  url          = {https://doi.org/10.1007/BF01205743},
  doi          = {10.1007/BF01205743},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ais/Siponen01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/irmj/Siponen01,
  author       = {Mikko T. Siponen},
  title        = {On the Role of Human Mortality in Information System Security: From
                  the Problems of Descriptivism to Non-Descriptive Foundations},
  journal      = {Inf. Resour. Manag. J.},
  volume       = {14},
  number       = {4},
  pages        = {15--23},
  year         = {2001},
  url          = {https://doi.org/10.4018/irmj.2001100102},
  doi          = {10.4018/IRMJ.2001100102},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/irmj/Siponen01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigcas/Siponen01,
  author       = {Mikko T. Siponen},
  title        = {Five dimensions of information security awareness},
  journal      = {{SIGCAS} Comput. Soc.},
  volume       = {31},
  number       = {2},
  pages        = {24--29},
  year         = {2001},
  url          = {https://doi.org/10.1145/503345.503348},
  doi          = {10.1145/503345.503348},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigcas/Siponen01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/SiponenV01,
  author       = {Mikko T. Siponen and
                  Tero Vartiainen},
  title        = {End-User Ethics Teaching: Issues and a Solution based on Universalization},
  booktitle    = {34th Annual Hawaii International Conference on System Sciences (HICSS-34),
                  January 3-6, 2001, Maui, Hawaii, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/HICSS.2001.927151},
  doi          = {10.1109/HICSS.2001.927151},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/SiponenV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-1/SiponenB01,
  author       = {Mikko T. Siponen and
                  Richard L. Baskerville},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Rossouw von Solms and
                  Gurpreet Dhillon},
  title        = {A New Paradigm for Adding Security Into {IS} Development Methods},
  booktitle    = {Advances in Information Security Management {\&} Small Systems
                  Security, {IFIP} {TC11} {WG11.1/WG11.2} Eigth Annual Working Conference
                  on Information Security Management {\&} Small Systems Security,
                  September 27-28, 2001, Las Vegas, Nevada, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {200},
  pages        = {99--112},
  publisher    = {Kluwer},
  year         = {2001},
  timestamp    = {Wed, 30 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-1/SiponenB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Siponen01,
  author       = {Mikko T. Siponen},
  editor       = {Michel Dupuy and
                  Pierre Paradinas},
  title        = {A Paradigmatic Analysis of Conventional Approaches for Developing
                  and Managing Secure {IS}},
  booktitle    = {Trusted Information: The New Decade Challenge, {IFIP} {TC11} Sixteenth
                  Annual Working Conference on Information Security (IFIP/Sec'01), June
                  11-13, 2001, Paris, France},
  series       = {{IFIP} Conference Proceedings},
  volume       = {193},
  pages        = {437--452},
  publisher    = {Kluwer},
  year         = {2001},
  url          = {https://doi.org/10.1007/0-306-46998-7\_30},
  doi          = {10.1007/0-306-46998-7\_30},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/Siponen01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Siponen00,
  author       = {Mikko T. Siponen},
  title        = {A conceptual foundation for organizational information security awareness},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {31--41},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010371394},
  doi          = {10.1108/09685220010371394},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Siponen00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Siponen00a,
  author       = {Mikko T. Siponen},
  title        = {Critical analysis of different approaches to minimizing user-related
                  faults in information systems security: implications for research
                  and practice},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {8},
  number       = {5},
  pages        = {197--209},
  year         = {2000},
  url          = {https://doi.org/10.1108/09685220010353178},
  doi          = {10.1108/09685220010353178},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Siponen00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Siponen00,
  author       = {Mikko T. Siponen},
  editor       = {Sihan Qing and
                  Jan H. P. Eloff},
  title        = {Policies for Construction of Information Systems' Security Guidelines:
                  Five Approaches},
  booktitle    = {Information Security for Global Information Infrastructures, {IFIP}
                  {TC11} Fifteenth Annual Working Conference on Information Security,
                  August 22-24, 2000, Beijing, China},
  series       = {{IFIP} Conference Proceedings},
  volume       = {175},
  pages        = {111--120},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Fri, 26 Jul 2002 13:04:43 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/Siponen00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Siponen00a,
  author       = {Mikko T. Siponen},
  editor       = {Sihan Qing and
                  Jan H. P. Eloff},
  title        = {On the Role of Human Morality in Information System Security: The
                  Problems of Descriptivism and Non-descriptive Foundations},
  booktitle    = {Information Security for Global Information Infrastructures, {IFIP}
                  {TC11} Fifteenth Annual Working Conference on Information Security,
                  August 22-24, 2000, Beijing, China},
  series       = {{IFIP} Conference Proceedings},
  volume       = {175},
  pages        = {401--410},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Thu, 03 Jan 2002 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/Siponen00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/SiponenK98,
  author       = {Mikko T. Siponen and
                  Jorma Kajava},
  title        = {Ontology of Organizational {IT} Security Awareness - From Theoretical
                  Foundations to Practical Framework},
  booktitle    = {7th Workshop on Enabling Technologies {(WETICE} '98), Infrastructure
                  for Collaborative Enterprises, June 17-19, 1998, Palo Alto, CAUSA,
                  Proceedings},
  pages        = {327--333},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/ENABL.1998.725713},
  doi          = {10.1109/ENABL.1998.725713},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wetice/SiponenK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics