Volume 34, Number 3 — September 2010

Special Issue: Information Systems Security

Special Issue Articles

Detecting Fake Websites: The Contribution of Statistical Learning Theory
Ahmed Abbasi, Zhu Zhang, David Zimbra, Hsinchun Chen, Jay F. Nunamaker Jr.
(pp. 435-461)

Circuits of Power: A Study of Mandated Compliance to an Information Systems Security De Jure Standard in a Government Organization
Stephen Smith, Donald Winchester, Deborah Bunker, Rodger Jaimeson
(pp. 463-486)

Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations
Mikko Siponen and Anthony Vance
(pp. 487-502)

User Participation in Information Systems Security Risk Management
Janine L. Spears and Henri Barki
(pp. 503-522)

Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
Burcu Bulgurcu, Hasan Cavusoglu, Izak Benbasat
(pp. 523-548)

Fear Appeals and Information Security Behaviors: An Empirical Study
Allen C. Johnston and Merrill Warkentin
(pp. 549-566)

Market Value of Voluntary Disclosures Concerning Information Security
Lawrence A. Gordon, Martin P. Loeb, and Tashfeen Sohail
(pp. 567-594)

The Impact of Malicious Agents on the Enterprise Software Industry
Michael R. Galbreth and Mikhael Shor
(pp. 595-612)

Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions
Catherine L. Anderson and Ritu Agarwal
(pp. 613-643)