default search action
Mikko T. Siponen
Person information
- affiliation: University of Alabama, AL, USA
- affiliation: University of Jyväskylä, Finland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j90]Naomi Woods, Mikko T. Siponen:
How memory anxiety can influence password security behavior. Comput. Secur. 137: 103589 (2024) - [j89]Yitian Xie, Mikko T. Siponen, Gabriella Laatikainen, Gregory D. Moody, Xiaosong Zheng:
Testing the dominant mediator in EPPM: An empirical study on household anti-malware software users. Comput. Secur. 140: 103776 (2024) - [j88]Emmanuel W. Ayaburi, Francis Kofi Andoh-Baidoo, Jaeung Lee, Mikko T. Siponen:
Investigating the use of protective technologies after data breach: The roles of psychological distance, technological service type and organizational justice. Comput. Secur. 143: 103900 (2024) - [j87]Mikko T. Siponen, Tuula Klaavuniemi, Quan Xiao:
Splitting versus lumping: narrowing a theory's scope may increase its value. Eur. J. Inf. Syst. 33(4): 561-570 (2024) - [j86]Alain Claude Tambe Ebot, Mikko T. Siponen, Volkan Topalli:
Towards a cybercontextual transmission model for online scamming. Eur. J. Inf. Syst. 33(4): 571-596 (2024) - [j85]Francis Kofi Andoh-Baidoo, Martin Otu Offei, Emmanuel W. Ayaburi, Mikko T. Siponen, Pavel Gladyshev:
How Do Real Cybercrime Syndicates Operate?: The Case of Online Romance Fraud Syndicates. IEEE Secur. Priv. 22(4): 124-128 (2024) - [j84]Sihua Chen, Weidong Wang, Xiang Wen, Han Qiu, Wei He, Mikko T. Siponen, Xiaoming Zhang:
Smart services and privacy, can we have both? Int. J. Prod. Res. 62(20): 7432-7446 (2024) - [j83]Faheem Ahmed Shaikh, Mikko T. Siponen:
Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions. Inf. Syst. Frontiers 26(3): 1109-1120 (2024) - [j82]Hemin Jiang, Mikko T. Siponen, Zhenhui (Jack) Jiang, Aggeliki Tsohou:
The Impacts of Internet Monitoring on Employees' Cyberloafing and Organizational Citizenship Behavior: A Longitudinal Field Quasi-Experiment. Inf. Syst. Res. 35(3): 1175-1194 (2024) - [c55]Weijie Zhao, Allen C. Johnston, Mikko T. Siponen:
Intuition or Analysis? Investigation of Employees' Cognitive Mode of Information Security Policy Compliance. AMCIS 2024 - [c54]Mikko T. Siponen, Hemin Jiang, Tuula Klaavuniemi:
When Empirical Contributions Are More Important than Theoretical Contributions. ECIS 2024 - [c53]Mikko T. Siponen:
Stage Theorizing in Behavioral Information Systems Security Research. HICSS 2024: 4724-4733 - 2023
- [j81]Mingsong Mao, Mikko T. Siponen, Marco Nathan:
Popperian Falsificationism in IS: Major Confusions and Harmful Influences. Commun. Assoc. Inf. Syst. 53: 34 (2023) - [j80]Mikko T. Siponen, Mikko Rönkkö, Fufan Liu, Steffi Haag, Gabriella Laatikainen:
Protection Motivation Theory in Information Security Behavior Research: Reconsidering the Fundamentals. Commun. Assoc. Inf. Syst. 53: 47 (2023) - [j79]Faheem Ahmed Shaikh, Mikko T. Siponen:
Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity. Comput. Secur. 124: 102974 (2023) - [j78]Allen C. Johnston, Paul Michael Di Gangi, France Bélanger, Robert E. Crossler, Mikko T. Siponen, Merrill Warkentin, Tripti Singh:
Seeking rhetorical validity in fear appeal research: An application of rhetorical theory. Comput. Secur. 125: 103020 (2023) - [j77]Hemin Jiang, Mikko T. Siponen, Aggeliki Tsohou:
Personal use of technology at work: a literature review and a theoretical model for understanding how it affects employee job performance. Eur. J. Inf. Syst. 32(2): 331-345 (2023) - [j76]Xiuyan Shao, Hemin Jiang, Mikko T. Siponen, Cong Cao, Xiaohua Huang:
"Unus pro omnibus, omnes pro uno": understanding unauthorised file sharing in online communities from a public goods contribution perspective. Internet Res. 33(3): 1114-1133 (2023) - [c52]Hanna Paananen, Mikko T. Siponen:
Organization Members Developing Information Security Policies: a Case Study. ICIS 2023 - [e1]Patrick Chau, Jack Jing, Mikko T. Siponen, Andrew Burton-Jones, Chuan-Hoo Tan, Bo Sophia Xiao:
27th Pacific Asia Conference on Information Systems, PACIS 2023, Nanchang, China, July 9-12, 2023. 2023 [contents] - 2022
- [j75]Tong Xin, Mikko T. Siponen, Sihua Chen:
Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats. Behav. Inf. Technol. 41(13): 2835-2859 (2022) - [j74]Mikko T. Siponen, Wael Soliman, Anthony Vance:
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions. Data Base 53(1): 25-60 (2022) - [j73]Yitian Xie, Mikko T. Siponen, Greg D. Moody, Xiaosong Zheng:
Discovering the interplay between defensive avoidance and continued use intention of anti-malware software among experienced home users: A moderated mediation model. Inf. Manag. 59(2): 103586 (2022) - [j72]Ying Li, Tong Xin, Mikko T. Siponen:
Citizens' Cybersecurity Behavior: Some Major Challenges. IEEE Secur. Priv. 20(1): 54-61 (2022) - [j71]Quan Xiao, Mikko T. Siponen, Xing Zhang, Fucai Lu, Sihua Chen, Mingsong Mao:
Impacts of platform design on consumer commitment and online review intention: does use context matter in dual-platform e-commerce? Internet Res. 32(5): 1496-1531 (2022) - [c51]Wael Soliman, Mikko T. Siponen:
What Do We Really Mean by Rigor in Information Systems Research? HICSS 2022: 1-10 - 2021
- [j70]Steffi Haag, Mikko T. Siponen, Fufan Liu:
Protection Motivation Theory in Information Systems Security Research: A Review of the Past and a Road Map for the Future. Data Base 52(2): 25-67 (2021) - [j69]Mikko T. Siponen, Wael Soliman, Philipp Holtkamp:
Research Perspectives: Reconsidering the Role of Research Method Guidelines for Interpretive, Mixed Methods, and Design Science Research. J. Assoc. Inf. Syst. 22(4): 1 (2021) - [j68]Sihua Chen, Hua Xiao, Wei He, Jian Mou, Mikko T. Siponen, Han Qiu, Feng Xu:
Determinants of Individual Knowledge Innovation Behavior: A Perspective of Emotion, Knowledge Sharing, and Trust. J. Organ. End User Comput. 33(6): 1-24 (2021) - [j67]Pallab Sanyal, Nirup M. Menon, Mikko T. Siponen:
An Empirical Examination of the Economics of Mobile Application Security. MIS Q. 45(4): 2235-2260 (2021) - [c50]Kibrom Tadesse Ejigu, Mikko T. Siponen, Tilahun Muluneh Arage:
Investigating the Impact of Organizational Culture on Information Security Policy Compliance: The Case of Ethiopia. AMCIS 2021 - [c49]Mikko T. Siponen, Tuula Klaavuniemi:
The Primary Scientific Contribution is Hardly a Theory in Design Science Research. DESRIST 2021: 137-146 - [c48]Kibrom Ejigu, Mikko T. Siponen, Tilahun Muluneh:
Influence of Organizational Culture on Employees Information Security Policy Compliance in Ethiopian Companies. PACIS 2021: 158 - 2020
- [j66]Hanna Paananen, Michael Lapke, Mikko T. Siponen:
State of the art in information security policy development. Comput. Secur. 88 (2020) - [j65]Mikko T. Siponen, Petri Puhakainen, Anthony Vance:
Can individuals' neutralization techniques be overcome? A field experiment on password policy. Comput. Secur. 88 (2020) - [j64]Mari Karjalainen, Mikko T. Siponen, Suprateek Sarker:
Toward a stage theory of the development of employees' information security behavior. Comput. Secur. 93: 101782 (2020) - [j63]Xiuyan Shao, Mikko T. Siponen, Fufan Liu:
Shall we follow? Impact of reputation concern on information security managers' investment decisions. Comput. Secur. 97: 101961 (2020) - [j62]Nirup M. Menon, Mikko T. Siponen:
Executives' Commitment to Information Security: Interaction between the Preferred Subordinate Influence Approach (PSIA) and Proposal Characteristics. Data Base 51(2): 36-53 (2020) - [j61]Anthony Vance, Mikko T. Siponen, Detmar W. Straub:
Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures. Inf. Manag. 57(4): 103212 (2020) - [j60]Mikko T. Siponen, Tuula Klaavuniemi:
Why is the hypothetico-deductive (H-D) method in information systems not an H-D method? Inf. Organ. 30(1): 100287 (2020) - [j59]Hemin Jiang, Aggeliki Tsohou, Mikko T. Siponen, Ying Li:
Examining the side effects of organizational Internet monitoring on employees. Internet Res. 30(6): 1613-1630 (2020) - [j58]Mikko T. Siponen, Aggeliki Tsohou:
Demystifying the Influential IS Legends of Positivism: Response to Lee's Commentary. J. Assoc. Inf. Syst. 21(6): 1 (2020) - [c47]Mikko T. Siponen, Tuula Klaavuniemi, Marco Nathan:
Mechanistic Explanations and Deliberate Misrepresentations. HICSS 2020: 1-10
2010 – 2019
- 2019
- [j57]Ying Li, Nan (Andy) Zhang, Mikko T. Siponen:
Keeping secure to the end: a long-term perspective to understand employees' consequence-delayed information security violation. Behav. Inf. Technol. 38(5): 435-453 (2019) - [j56]Allen C. Johnston, Merrill Warkentin, Alan R. Dennis, Mikko T. Siponen:
Speak their Language: Designing Effective Messages to Improve Employees' Information Security Decision Making. Decis. Sci. 50(2): 245-284 (2019) - [j55]Naomi Woods, Mikko T. Siponen:
Improving password memorability, while not inconveniencing the user. Int. J. Hum. Comput. Stud. 128: 61-71 (2019) - [j54]Mari Karjalainen, Suprateek Sarker, Mikko T. Siponen:
Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective. Inf. Syst. Res. 30(2): 687-704 (2019) - [c46]Hemin Jiang, Mikko T. Siponen, Aggeliki Tsohou:
A field Experiment for Understanding the Unintended Impact of Internet Monitoring on Employees: Policy Satisfaction, Organizational Citizenship behaviour and Work Motivation. ECIS 2019 - [c45]Hojat Mohammadnazar, Hadi Ghanbari, Mikko T. Siponen:
Moral sensitivity in Information Security Dilemmas. ECIS 2019 - [c44]Philipp Holtkamp, Wael Soliman, Mikko T. Siponen:
Reconsidering the Role of Research Method Guidelines for Qualitative, Mixed-methods, and Design Science Research. HICSS 2019: 1-10 - [c43]Xiuyan Shao, Mikko T. Siponen, Seppo Pahnila:
To Calculate or To Follow Others: How Do Information Security Managers Make Investment Decisions? HICSS 2019: 1-10 - [c42]Mikko T. Siponen, Tuula Klaavuniemi:
Narrowing the Theory's or Study's Scope May Increase Practical Relevance. HICSS 2019: 1-10 - [c41]Mikko T. Siponen, Tuula Klaavuniemi:
How and Why 'Theory' Is Often Misunderstood in Information Systems Literature. ICIS 2019 - [i2]Pekka Abrahamsson, Nilay V. Oza, Mikko T. Siponen:
Agile Software Development Method, A Comparative Review1. CoRR abs/1903.10913 (2019) - [i1]Ville Vakkuri, Kai-Kristian Kemell, Joni Kultanen, Mikko T. Siponen, Pekka Abrahamsson:
Ethically Aligned Design of Autonomous Systems: Industry viewpoint and an empirical study. CoRR abs/1906.07946 (2019) - 2018
- [j53]Hadi Ghanbari, Tero Vartiainen, Mikko T. Siponen:
Omission of Quality Software Development Practices: A Systematic Literature Review. ACM Comput. Surv. 51(2): 38:1-38:27 (2018) - [j52]Naomi Woods, Mikko T. Siponen:
Too many passwords? How understanding our memory can increase password memorability. Int. J. Hum. Comput. Stud. 111: 36-48 (2018) - [j51]Mikko T. Siponen, Richard L. Baskerville:
Intervention Effect Rates as a Path to Research Relevance: Information Systems Security Example. J. Assoc. Inf. Syst. 19(4): 4 (2018) - [j50]Mikko T. Siponen, Aggeliki Tsohou:
Demystifying the Influential IS Legends of Positivism. J. Assoc. Inf. Syst. 19(7): 5 (2018) - [j49]Toni Taipalus, Mikko T. Siponen, Tero Vartiainen:
Errors and Complications in SQL Query Formulation. ACM Trans. Comput. Educ. 18(3): 15:1-15:29 (2018) - [j48]Gregory D. Moody, Mikko T. Siponen, Seppo Pahnila:
Toward a Unified Model of Information Security Policy Compliance. MIS Q. 42(1) (2018) - [c40]Mikko T. Siponen, Tuula Klaavuniemi:
Updating the Philosophy of Middle-Range Theories: Implications for IS. PACIS 2018: 128 - [c39]Hanna Kinnunen, Mikko T. Siponen:
Developing Organization-Specific Information Security Policies. PACIS 2018: 244 - 2017
- [j47]Sutirtha Chatterjee, Suprateek Sarker, Mikko T. Siponen:
How Do Mobile ICTs Enable Organizational Fluidity: Toward a Theoretical Framework. Inf. Manag. 54(1): 1-13 (2017) - [j46]Jungwon Kuem, Soumya Ray, Mikko T. Siponen, Sung S. Kim:
What Leads to Prosocial Behaviors on Social Networking Services: A Tripartite Model. J. Manag. Inf. Syst. 34(1): 40-70 (2017) - [j45]Lara Khansa, Jungwon Kuem, Mikko T. Siponen, Sung S. Kim:
To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls. J. Manag. Inf. Syst. 34(1): 141-176 (2017) - 2016
- [j44]Paul Benjamin Lowry, Jun Zhang, Chuang Wang, Mikko T. Siponen:
Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model. Inf. Syst. Res. 27(4): 962-986 (2016) - 2015
- [j43]Allen C. Johnston, Merrill Warkentin, Mikko T. Siponen:
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric. MIS Q. 39(1): 113-134 (2015) - 2014
- [j42]Mikko T. Siponen, Anthony Vance:
Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations. Eur. J. Inf. Syst. 23(3): 289-305 (2014) - [j41]Mikko T. Siponen, M. Adam Mahmood, Seppo Pahnila:
Employees' adherence to information security policies: An exploratory field study. Inf. Manag. 51(2): 217-224 (2014) - [c38]Jungwon Kuem, Mikko T. Siponen:
Short-Time Non-work-related Computing and Creative Performance. HICSS 2014: 3215-3223 - [c37]Alain Claude Tambe Ebot, Mikko T. Siponen:
Toward a Rational Choice Process Theory of Internet Scamming: The Offender's Perspective. ICIS 2014 - 2013
- [j40]Gregory D. Moody, Mikko T. Siponen:
Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work. Inf. Manag. 50(6): 322-335 (2013) - [c36]Katja Leiviskä, Mikko T. Siponen:
Understanding Why IS Students Drop Out: Toward A Process Theory. ECIS 2013: 62 - [c35]Mari Karjalainen, Mikko T. Siponen, Petri Puhakainen, Suprateek Sarker:
One Size Does Not Fit All: Different Cultures Require Different Information Systems Security Interventions. PACIS 2013: 98 - [c34]Seppo Pahnila, Mari Karjalainen, Mikko T. Siponen:
Information Security Behavior: Towards Multi-Stage Models. PACIS 2013: 102 - 2012
- [j39]Anthony Vance, Mikko T. Siponen, Seppo Pahnila:
Motivating IS security compliance: Insights from Habit and Protection Motivation Theory. Inf. Manag. 49(3-4): 190-198 (2012) - [j38]Mikko T. Siponen, Anthony Vance, Robert Willison:
New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs. Inf. Manag. 49(7-8): 334-341 (2012) - [j37]Mo Adam Mahmood, Mikko T. Siponen, Francisco J. López, Anthony Vance:
Measuring Electronic Commerce Technology-Enabled Business Value: An Empirical Investigation. J. Organ. Comput. Electron. Commer. 22(3): 256-279 (2012) - [j36]Anthony Vance, Mikko T. Siponen:
IS Security Policy Violations: A Rational Choice Perspective. J. Organ. End User Comput. 24(1): 21-41 (2012) - [c33]Tero Vartiainen, Mikko T. Siponen:
What Makes Information System Developers Produce Defective Information Systems For Their Clients? PACIS 2012: 107 - [c32]Paul Benjamin Lowry, Kamel Rouibah, Greg D. Moody, Mikko T. Siponen:
Towards A Cross-Cultural Model Of Online Whistle-Blowing Systems Use. PACIS 2012: 147 - 2011
- [j35]Mari Karjalainen, Mikko T. Siponen:
Toward a New Meta-Theory for Designing Information Systems (IS) Security Training Approaches. J. Assoc. Inf. Syst. 12(8): 3 (2011) - [j34]Tero Vartiainen, Mikko T. Siponen, Liisa Myyry:
The Effects of Teaching the Universality Thesis on Students' Integrative Complexity of Thought. J. Inf. Syst. Educ. 22(3): 261 (2011) - [j33]Seppo Pahnila, Mikko T. Siponen, Xiaosong Zheng:
Integrating Habit into UTAUT: The Chinese eBay Case. Pac. Asia J. Assoc. Inf. Syst. 3(2): 2 (2011) - [c31]Ying Li, Mikko T. Siponen:
A Call For Research On Home Users' Information Security Behaviour. PACIS 2011: 112 - [c30]Tero Vartiainen, Mikko T. Siponen, Gregory D. Moody:
Gray-Area Phenomenon In Information Systems Development: A Call For Research. PACIS 2011: 198 - 2010
- [j32]Mikko T. Siponen, Seppo Pahnila, M. Adam Mahmood:
Compliance with Information Security Policies: An Empirical Investigation. Computer 43(2): 64-71 (2010) - [j31]Tero Vartiainen, Mikko T. Siponen:
On IS Students' Intentions to Use Theories of Ethics in Resolving Moral Conflicts. J. Inf. Syst. Educ. 21(1): 33-42 (2010) - [j30]Mikko T. Siponen, Anthony Vance:
Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations. MIS Q. 34(3): 487-502 (2010) - [j29]Petri Puhakainen, Mikko T. Siponen:
Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study. MIS Q. 34(4): 757-778 (2010) - [j28]Katja Leiviskä, Mikko T. Siponen:
Attitudes of sixth form female students toward the IT field. SIGCAS Comput. Soc. 40(1): 34-49 (2010) - [c29]Seppo Pahnila, Mikko T. Siponen:
Implementation Intentions Explain How a Behavior Becomes Habitual: The Use of Online Newspapers. HICSS 2010: 1-11 - [c28]Mikko T. Siponen, Anthony Vance, Robert Willison:
New Insights for an Old Problem: Explaining Software Piracy through Neutralization Theory. HICSS 2010: 1-10 - [p1]Pekka Abrahamsson, Nilay V. Oza, Mikko T. Siponen:
Agile Software Development Methods: A Comparative Review1. Agile Software Development 2010: 31-59
2000 – 2009
- 2009
- [j27]Robert Willison, Mikko T. Siponen:
Overcoming the insider: reducing employee computer crime through Situational Crime Prevention. Commun. ACM 52(9): 133-137 (2009) - [j26]Mikko T. Siponen, M. Adam Mahmood, Seppo Pahnila:
Technical opinion - Are employees putting your company at risk by not following information security policies? Commun. ACM 52(12): 145-147 (2009) - [j25]Liisa Myyry, Mikko T. Siponen, Seppo Pahnila, Tero Vartiainen, Anthony Vance:
What levels of moral reasoning and values explain adherence to information security rules? An empirical study. Eur. J. Inf. Syst. 18(2): 126-139 (2009) - [j24]Mikko T. Siponen, Robert Willison:
Information security management standards: Problems and solutions. Inf. Manag. 46(5): 267-270 (2009) - 2008
- [j23]Mikko T. Siponen, Juhani Heikka:
Do secure information system design methods provide adequate modeling support? Inf. Softw. Technol. 50(9-10): 1035-1053 (2008) - [c27]Robert Willison, Mikko T. Siponen:
Software Piracy: Original Insights from a Criminological Perspective. HICSS 2008: 266 - [c26]Mikko T. Siponen, Robert Willison, Richard L. Baskerville:
Power and Practice in Information Systems Security Research. ICIS 2008: 26 - 2007
- [j22]Mikko T. Siponen, Harri Oinas-Kukkonen:
A review of information security issues and respective research contributions. Data Base 38(1): 60-80 (2007) - [j21]Mikko T. Siponen, Tero Vartiainen:
Unauthorized copying of software: an empirical study of reasons for and against. SIGCAS Comput. Soc. 37(1): 30-43 (2007) - [c25]Mikko T. Siponen, Robert Willison:
A Critical Assessment of IS Security Research between 1990-2004. ECIS 2007: 1551-1559 - [c24]Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood:
Employees' Behavior towards IS Security Policy Compliance. HICSS 2007: 156 - [c23]Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood:
Which Factors Explain Employees' Adherence to Information Security Policies? An Empirical Study. PACIS 2007: 73 - [c22]Mikko T. Siponen, Seppo Pahnila, M. Adam Mahmood:
Employees' Adherence to Information Security Policies: An Empirical Study. SEC 2007: 133-144 - 2006
- [j20]Timo Jokela, Mikko T. Siponen, Naotake Hirasawa, Jonathan Earthy:
A survey of usability capability maturity models: implications for practice and research. Behav. Inf. Technol. 25(3): 263-282 (2006) - [j19]Mikko T. Siponen:
Information security standards focus on the existence of process, not its content. Commun. ACM 49(8): 97-100 (2006) - [j18]Mikko T. Siponen:
Secure-system design methods: evolution and future directions. IT Prof. 8(3): 40-44 (2006) - [j17]Mikko T. Siponen:
Six Design Theories for IS Security Policies and Guidelines. J. Assoc. Inf. Syst. 7(7): 19 (2006) - [j16]Juhani Heikka, Richard L. Baskerville, Mikko T. Siponen:
A Design Theory for Secure Information Systems Design Methods. J. Assoc. Inf. Syst. 7(11): 31 (2006) - [j15]Mikko T. Siponen:
A justification for software rights. SIGCAS Comput. Soc. 36(3): 11-20 (2006) - [c21]Katja Leiviskä, Mikko T. Siponen:
Attitudes of sixth form female students towards the IT field. ECIS 2006: 859-872 - [c20]Gurpreet Dhillon, Mikko T. Siponen, Raj Sharman:
Minitrack Introduction. HICSS 2006 - [c19]Mikko T. Siponen, Carl Stucke:
Effective Anti-Spam Strategies in Companies: An International Study. HICSS 2006 - [c18]Juhani Heikka, Mikko T. Siponen:
Abuse Cases Revised: An Action Research Experience. PACIS 2006: 46 - [c17]Mikko T. Siponen, Seppo Pahnila, M. Adam Mahmood:
A New Model for Understanding Users' IS Security Compliance. PACIS 2006: 48 - [c16]Vesa Mettovaara, Mikko T. Siponen, Jari A. Lehto:
Collaboration in Software Development: Lesson Learned from Two Large Multinational Organizations. PACIS 2006: 103 - 2005
- [j14]Mikko T. Siponen, Tero Vartiainen:
Attitudes to and factors affecting unauthorized copying of computer software in Finland. Behav. Inf. Technol. 24(4): 249-257 (2005) - [j13]Mikko T. Siponen:
An analysis of the traditional IS security approaches: implications for research and practice. Eur. J. Inf. Syst. 14(3): 303-315 (2005) - [j12]Mikko T. Siponen:
Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods. Inf. Organ. 15(4): 339-375 (2005) - [j11]Mikko T. Siponen:
Unauthorized Copying of Software: What is Wrong with the Nonexclusive Argument? IT Prof. 7(5): 49-51 (2005) - [c15]Gurpreet Dhillon, Mikko T. Siponen, Raj Sharman:
Mini Track: 'Information Systems Security Management'. HICSS 2005 - [c14]Mikko T. Siponen, Richard L. Baskerville, Tapio Kuivalainen:
Integrating Security into Agile Development Methods. HICSS 2005 - 2004
- [j10]Mikko T. Siponen, Tero Vartiainen:
Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice. Inf. Syst. J. 14(4): 387-407 (2004) - [j9]Mikko T. Siponen:
A justification for software rights. SIGCAS Comput. Soc. 34(3): 3 (2004) - [c13]Mikko T. Siponen, Gurpreet Dhillon:
Information Systems Security Management: Minitrack Introduction. HICSS 2004 - [c12]Tero Vartiainen, Mikko T. Siponen:
Defects, Usefulness and Usability of Ethics Theories in IS Ethics Education. ICEIS (5) 2004: 179-186 - 2003
- [c11]Tero Vartiainen, Mikko T. Siponen:
Universality thesis in IS ethics education - an empirical study. ECIS 2003: 2036-2043 - [c10]Pekka Abrahamsson, Juhani Warsta, Mikko T. Siponen, Jussi Ronkainen:
New Directions on Agile Methods: A Comparative Analysis. ICSE 2003: 244-254 - [c9]Mikko T. Siponen:
Information Security Management Standards: Problems and Solutions. PACIS 2003: 105 - [c8]Mikko T. Siponen:
New Directions on IS Security Methods. SEC 2003: 325-336 - 2002
- [b1]Mikko T. Siponen:
Designing secure information systems and software:critical evaluation of the existing approaches and a new paradigm. University of Oulu, Finland, 2002 - [j8]Mikko T. Siponen:
Database Security and the Problem of Polyinstantiation: a moral scrutiny. Australas. J. Inf. Syst. 10(1) (2002) - [j7]Mikko T. Siponen, Tero Vartiainen:
Teaching End-User Ethics: Issues and a Solution Based on Universalizability. Commun. Assoc. Inf. Syst. 8: 29 (2002) - [j6]Mikko T. Siponen:
Towards maturity of information security maturity criteria: six lessons learned from software maturity criteria. Inf. Manag. Comput. Secur. 10(5): 210-224 (2002) - [c7]Mikko T. Siponen:
Maturity Criteria for Developing Secure IS and SW: Limits, and Prospects. SEC 2002: 91-108 - 2001
- [j5]Mikko T. Siponen:
The relevance of software rights: An anthology of the divergence of sociopolitical doctrines. AI Soc. 15(1-2): 128-148 (2001) - [j4]Mikko T. Siponen:
On the Role of Human Mortality in Information System Security: From the Problems of Descriptivism to Non-Descriptive Foundations. Inf. Resour. Manag. J. 14(4): 15-23 (2001) - [j3]Mikko T. Siponen:
Five dimensions of information security awareness. SIGCAS Comput. Soc. 31(2): 24-29 (2001) - [c6]Mikko T. Siponen, Tero Vartiainen:
End-User Ethics Teaching: Issues and a Solution based on Universalization. HICSS 2001 - [c5]Mikko T. Siponen, Richard L. Baskerville:
A New Paradigm for Adding Security Into IS Development Methods. Conference on Information Security Management & Small Systems Security 2001: 99-112 - [c4]Mikko T. Siponen:
A Paradigmatic Analysis of Conventional Approaches for Developing and Managing Secure IS. SEC 2001: 437-452 - 2000
- [j2]Mikko T. Siponen:
A conceptual foundation for organizational information security awareness. Inf. Manag. Comput. Secur. 8(1): 31-41 (2000) - [j1]Mikko T. Siponen:
Critical analysis of different approaches to minimizing user-related faults in information systems security: implications for research and practice. Inf. Manag. Comput. Secur. 8(5): 197-209 (2000) - [c3]Mikko T. Siponen:
Policies for Construction of Information Systems' Security Guidelines: Five Approaches. SEC 2000: 111-120 - [c2]Mikko T. Siponen:
On the Role of Human Morality in Information System Security: The Problems of Descriptivism and Non-descriptive Foundations. SEC 2000: 401-410
1990 – 1999
- 1998
- [c1]Mikko T. Siponen, Jorma Kajava:
Ontology of Organizational IT Security Awareness - From Theoretical Foundations to Practical Framework. WETICE 1998: 327-333
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint