Seppo Pahnila

According to our database1, Seppo Pahnila authored at least 24 papers between 2004 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
To Calculate or To Follow Others: How Do Information Security Managers Make Investment Decisions?
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Toward a Unified Model of Information Security Policy Compliance.
MIS Q., 2018

2015
A Cultural Comparison of Open Innovation in Online Brand Communities.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

2014
Employees' adherence to information security policies: An exploratory field study.
Inf. Manag., 2014

2013
Information Security Behavior: Towards Multi-Stage Models.
Proceedings of the 17th Pacific Asia Conference on Information Systems, 2013

2012
Motivating IS security compliance: Insights from Habit and Protection Motivation Theory.
Inf. Manag., 2012

Assessing The Factors That Have An Impact On Stickiness In Online Game Communities.
Proceedings of the 16th Pacific Asia Conference on Information Systems, 2012

Open Innovation In Online Brand Communities.
Proceedings of the 16th Pacific Asia Conference on Information Systems, 2012

2011
Integrating Habit into UTAUT: The Chinese eBay Case.
Pac. Asia J. Assoc. Inf. Syst., 2011

Incremental persuasion through microblogging: a survey of Twitter users in Latvia.
Proceedings of the 6th International Conference on Persuasive Technology, 2011

2010
Compliance with Information Security Policies: An Empirical Investigation.
Computer, 2010

Online shopping viewed from a habit and value perspective.
Behav. Inf. Technol., 2010

Implementation Intentions Explain How a Behavior Becomes Habitual: The Use of Online Newspapers.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
What levels of moral reasoning and values explain adherence to information security rules? An empirical study.
Eur. J. Inf. Syst., 2009

Technical opinion - Are employees putting your company at risk by not following information security policies?
Commun. ACM, 2009

Measuring Effectiveness of Information Systems Security: An Empirical Research.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
Finding Kairos in Quitting Smoking: Smokers' Perceptions of Warning Pictures.
Proceedings of the Persuasive Technology, Third International Conference, 2008

2007
Employees' Adherence to Information Security Policies: An Empirical Study.
Proceedings of the New Approaches for Security, 2007

Which Factors Explain Employees' Adherence to Information Security Policies? An Empirical Study.
Proceedings of the Pacific Asia Conference on Information Systems, 2007

Assessing the User Attitude Toward Personalized Services.
Proceedings of the ICEIS 2007, 2007

Employees' Behavior towards IS Security Policy Compliance.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2006
A New Model for Understanding Users' IS Security Compliance.
Proceedings of the Pacific Asia Conference on Information Systems, 2006

2004
Consumer acceptance of online banking: an extension of the technology acceptance model.
Internet Res., 2004

Predicting the User Acceptance of Personalized Information Systems: Case Medical Portal.
Proceedings of the ICEIS 2004, 2004


  Loading...