Influencing information technology users' rule compliance: multiple studies in the security and business process context
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
Mannheim
2014
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | VI, 150, XXXVI Seiten Illustrationen 21 cm |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042065450 | ||
003 | DE-604 | ||
005 | 20160407 | ||
007 | t | ||
008 | 140909s2014 gw a||| m||| 00||| eng d | ||
015 | |a 14,H07 |2 dnb | ||
016 | 7 | |a 1052352324 |2 DE-101 | |
035 | |a (OCoLC)884287293 | ||
035 | |a (DE-599)DNB1052352324 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE | ||
049 | |a DE-188 |a DE-384 |a DE-355 |a DE-473 |a DE-703 | ||
082 | 0 | |a 658.05 |2 22/ger | |
084 | |a QP 340 |0 (DE-625)141861: |2 rvk | ||
084 | |a 650 |2 sdnb | ||
100 | 1 | |a Hadasch, Frank |d 1981- |e Verfasser |0 (DE-588)1050940261 |4 aut | |
245 | 1 | 0 | |a Influencing information technology users' rule compliance |b multiple studies in the security and business process context |c vorgelegt von Frank Hadasch |
264 | 1 | |a Mannheim |c 2014 | |
300 | |a VI, 150, XXXVI Seiten |b Illustrationen |c 21 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
502 | |b Dissertation |c Universität Mannheim |d 2014 | ||
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Prozessmanagement |0 (DE-588)4353072-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Compliance-System |0 (DE-588)4442497-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 0 | 1 | |a Prozessmanagement |0 (DE-588)4353072-2 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 3 | |a Compliance-System |0 (DE-588)4442497-8 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027506231&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-027506231 |
Datensatz im Suchindex
_version_ | 1804152506368917504 |
---|---|
adam_text | Titel: Influencing information technology users rule compliance
Autor: Hadasch, Frank
Jahr: 2014
Table of Contents
1 Introduction 1
1.1 Motivation.......................................................................................................1
1.2 Terminology...................................................................................................3
1.3 Research Gaps..............................................................................................12
1.4 Structure of the Thesis..................................................................................19
2 Study One: Exploring Users Awareness (Security Context) 21
2.1 Introduction...................................................................................................21
2.2 Related Work................................................................................................23
2.3 Research Methodology.................................................................................24
2.4 Data Analysis and Results............................................................................28
2.5 Summary of Study One................................................................................39
3 Study Two: Influencing Compliance Motivation (Security Context) 42
3.1 Introduction...................................................................................................42
3.2 Related Work................................................................................................44
3.3 Theoretical Foundations...............................................................................46
3.4 Research M ethodology.................................................................................60
3.5 Data Analysis and Results............................................................................65
3.6 Discussion.....................................................................................................70
3.7 Summary of Study Two................................................................................72
4 Study Three: Influencing Compliance Behavior (Security Context) 79
4.1 Introduction...................................................................................................79
4.2 Theoretical Foundations...............................................................................81
4.3 Research Methodology.................................................................................84
4.4 Data Analysis and Results............................................................................87
4.5 Summary of Study Three..............................................................................95
5 Study Four: Influencing Compliance Behavior (Business Process Context) 97
5.1 Introduction...................................................................................................97
5.2 Related Work..............................................................................................100
5.3 Theoretical Foundations.............................................................................102
5.4 Research Methodology...............................................................................112
5.5 Data Analysis and Results..........................................................................116
5.6 Summary of Study Four.............................................................................124
6 Conclusion 131
6.1 Overall Summary........................................................................................131
6.2 Contributions to Theory..............................................................................133
6.3 Contributions to Practice............................................................................137
6.4 Limitations..................................................................................................140
6.5 Future Research..........................................................................................141
7 Outlook: Towards Process Guidance Systems 143
7.1 Components of a Process Guidance System...............................................145
7.2 Concluding Remarks..................................................................................149
Appendix A: Publications xxi
Appendix B: Interview Guideline xxii
Appendix C: Field Experiment xxvii
Appendix D: Lab Experiment xxx
|
any_adam_object | 1 |
author | Hadasch, Frank 1981- |
author_GND | (DE-588)1050940261 |
author_facet | Hadasch, Frank 1981- |
author_role | aut |
author_sort | Hadasch, Frank 1981- |
author_variant | f h fh |
building | Verbundindex |
bvnumber | BV042065450 |
classification_rvk | QP 340 |
ctrlnum | (OCoLC)884287293 (DE-599)DNB1052352324 |
dewey-full | 658.05 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.05 |
dewey-search | 658.05 |
dewey-sort | 3658.05 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01904nam a2200457 c 4500</leader><controlfield tag="001">BV042065450</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160407 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">140909s2014 gw a||| m||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">14,H07</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1052352324</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)884287293</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1052352324</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-188</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-703</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.05</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 340</subfield><subfield code="0">(DE-625)141861:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">650</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hadasch, Frank</subfield><subfield code="d">1981-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1050940261</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Influencing information technology users' rule compliance</subfield><subfield code="b">multiple studies in the security and business process context</subfield><subfield code="c">vorgelegt von Frank Hadasch</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Mannheim</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VI, 150, XXXVI Seiten</subfield><subfield code="b">Illustrationen</subfield><subfield code="c">21 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="b">Dissertation</subfield><subfield code="c">Universität Mannheim</subfield><subfield code="d">2014</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Prozessmanagement</subfield><subfield code="0">(DE-588)4353072-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Compliance-System</subfield><subfield code="0">(DE-588)4442497-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Prozessmanagement</subfield><subfield code="0">(DE-588)4353072-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Compliance-System</subfield><subfield code="0">(DE-588)4442497-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027506231&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027506231</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV042065450 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:11:48Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027506231 |
oclc_num | 884287293 |
open_access_boolean | |
owner | DE-188 DE-384 DE-355 DE-BY-UBR DE-473 DE-BY-UBG DE-703 |
owner_facet | DE-188 DE-384 DE-355 DE-BY-UBR DE-473 DE-BY-UBG DE-703 |
physical | VI, 150, XXXVI Seiten Illustrationen 21 cm |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
record_format | marc |
spelling | Hadasch, Frank 1981- Verfasser (DE-588)1050940261 aut Influencing information technology users' rule compliance multiple studies in the security and business process context vorgelegt von Frank Hadasch Mannheim 2014 VI, 150, XXXVI Seiten Illustrationen 21 cm txt rdacontent n rdamedia nc rdacarrier Dissertation Universität Mannheim 2014 Informationstechnik (DE-588)4026926-7 gnd rswk-swf Prozessmanagement (DE-588)4353072-2 gnd rswk-swf Compliance-System (DE-588)4442497-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Informationstechnik (DE-588)4026926-7 s Prozessmanagement (DE-588)4353072-2 s Computersicherheit (DE-588)4274324-2 s Compliance-System (DE-588)4442497-8 s DE-604 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027506231&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Hadasch, Frank 1981- Influencing information technology users' rule compliance multiple studies in the security and business process context Informationstechnik (DE-588)4026926-7 gnd Prozessmanagement (DE-588)4353072-2 gnd Compliance-System (DE-588)4442497-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4026926-7 (DE-588)4353072-2 (DE-588)4442497-8 (DE-588)4274324-2 (DE-588)4113937-9 |
title | Influencing information technology users' rule compliance multiple studies in the security and business process context |
title_auth | Influencing information technology users' rule compliance multiple studies in the security and business process context |
title_exact_search | Influencing information technology users' rule compliance multiple studies in the security and business process context |
title_full | Influencing information technology users' rule compliance multiple studies in the security and business process context vorgelegt von Frank Hadasch |
title_fullStr | Influencing information technology users' rule compliance multiple studies in the security and business process context vorgelegt von Frank Hadasch |
title_full_unstemmed | Influencing information technology users' rule compliance multiple studies in the security and business process context vorgelegt von Frank Hadasch |
title_short | Influencing information technology users' rule compliance |
title_sort | influencing information technology users rule compliance multiple studies in the security and business process context |
title_sub | multiple studies in the security and business process context |
topic | Informationstechnik (DE-588)4026926-7 gnd Prozessmanagement (DE-588)4353072-2 gnd Compliance-System (DE-588)4442497-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Informationstechnik Prozessmanagement Compliance-System Computersicherheit Hochschulschrift |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027506231&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT hadaschfrank influencinginformationtechnologyusersrulecompliancemultiplestudiesinthesecurityandbusinessprocesscontext |