Seguir
Anat Zeelim Hovav
Anat Zeelim Hovav
None
Dirección de correo verificada de korea.ac.kr
Título
Citado por
Citado por
Año
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
J D'Arcy, A Hovav, D Galletta
Information systems research 20 (1), 79-98, 2009
17682009
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the US and South Korea
A Hovav, J D’Arcy
Information & Management 49 (2), 99-110, 2012
3622012
The impact of denial‐of‐service attack announcements on the market value of firms
A Hovav, J D'Arcy
Risk Management and Insurance Review 6 (2), 97-121, 2003
3332003
Does one size fit all? Examining the differential effects of IS security countermeasures
J D’Arcy, A Hovav
Journal of business ethics 89, 59-71, 2009
2642009
Deterring internal information systems misuse
J D'Arcy, A Hovav
Communications of the ACM 50 (10), 113-117, 2007
2342007
A model of Internet standards adoption: the case of IPv6
A Hovav, R Patnayakuni, D Schuff
Information Systems Journal 14 (3), 265-294, 2004
1502004
The impact of virus attack announcements on the market value of firms.
A Hovav, J D'Arcy
WOSIS, 146-156, 2004
1442004
This is my device! Why should I follow your rules? Employees’ compliance with BYOD security policy
A Hovav, FF Putri
Pervasive and Mobile Computing 32, 35-49, 2016
1192016
To bridge or to bond? Diverse social connections in an IS project team
JY Han, A Hovav
International Journal of Project Management 31 (3), 378-390, 2013
942013
Employees compliance with BYOD security policy: Insights from reactance, organizational justice, and protection motivation theory
FF Putri, A Hovav
912014
The role of user computer self-efficacy, cybersecurity countermeasures awareness, and cybersecurity skills influence on computer misuse
MS Choi, Y Levy Ph D, H Anat
772013
The ripple effect of an information security breach event: A stakeholder analysis
A Hovav, P Gray
Communications of the Association for Information Systems 34 (1), 50, 2014
752014
Capital market reaction to defective IT products: The case of computer viruses
A Hovav, J D'arcy
Computers & Security 24 (5), 409-424, 2005
612005
From hindsight to foresight: Applying futures research techniques in information systems
P Gray, A Hovav
Communications of the Association for Information Systems 22 (1), 12, 2008
462008
Global diffusion of the internet V-the changing dynamic of the internet: Early and late adopters of the IPv6 standard
A Hovav, D Schuff
Communications of the Association for Information Systems 15 (1), 14, 2005
412005
Determinants of Internet standards adoption: The case of South Korea
A Hovav, M Hemmert, YJ Kim
Research Policy 40 (2), 253-262, 2011
392011
Towards a best fit between organizational security countermeasures and information systems misuse behaviors
J D’Arcy, A Hovav
Journal of Information System Security 3 (2), 3-30, 2007
362007
Using a dairy management information system to facilitate precision agriculture: The case of the AfiMilk® system
R Berger, A Hovav
Information Systems Management 30 (1), 21-34, 2013
342013
Tutorial: identity management systems and secured access control
A Hovav, R Berger
Communications of the Association for Information Systems 25 (1), 42, 2009
332009
Market reaction to security breach announcements: Evidence from South Korea
A Hovav, JY Han, J Kim
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 48 (1 …, 2017
292017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20