default search action
Mikko T. Siponen
Person information
- affiliation: University of Alabama, AL, USA
- affiliation: University of Jyväskylä, Finland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j89]Naomi Woods, Mikko T. Siponen:
How memory anxiety can influence password security behavior. Comput. Secur. 137: 103589 (2024) - [j88]Yitian Xie, Mikko T. Siponen, Gabriella Laatikainen, Gregory D. Moody, Xiaosong Zheng:
Testing the dominant mediator in EPPM: An empirical study on household anti-malware software users. Comput. Secur. 140: 103776 (2024) - [j87]Emmanuel W. Ayaburi, Francis Kofi Andoh-Baidoo, Jaeung Lee, Mikko T. Siponen:
Investigating the use of protective technologies after data breach: The roles of psychological distance, technological service type and organizational justice. Comput. Secur. 143: 103900 (2024) - [j86]Mikko T. Siponen, Tuula Klaavuniemi, Quan Xiao:
Splitting versus lumping: narrowing a theory's scope may increase its value. Eur. J. Inf. Syst. 33(4): 561-570 (2024) - [j85]Alain Claude Tambe Ebot, Mikko T. Siponen, Volkan Topalli:
Towards a cybercontextual transmission model for online scamming. Eur. J. Inf. Syst. 33(4): 571-596 (2024) - [j84]Francis Kofi Andoh-Baidoo, Martin Otu Offei, Emmanuel W. Ayaburi, Mikko T. Siponen, Pavel Gladyshev:
How Do Real Cybercrime Syndicates Operate?: The Case of Online Romance Fraud Syndicates. IEEE Secur. Priv. 22(4): 124-128 (2024) - [j83]Sihua Chen, Weidong Wang, Xiang Wen, Han Qiu, Wei He, Mikko T. Siponen, Xiaoming Zhang:
Smart services and privacy, can we have both? Int. J. Prod. Res. 62(20): 7432-7446 (2024) - [j82]Faheem Ahmed Shaikh, Mikko T. Siponen:
Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions. Inf. Syst. Frontiers 26(3): 1109-1120 (2024) - [c54]Weijie Zhao, Allen C. Johnston, Mikko T. Siponen:
Intuition or Analysis? Investigation of Employees' Cognitive Mode of Information Security Policy Compliance. AMCIS 2024 - [c53]Mikko T. Siponen:
Stage Theorizing in Behavioral Information Systems Security Research. HICSS 2024: 4724-4733 - 2023
- [j81]Mingsong Mao, Mikko T. Siponen, Marco Nathan:
Popperian Falsificationism in IS: Major Confusions and Harmful Influences. Commun. Assoc. Inf. Syst. 53: 34 (2023) - [j80]Mikko T. Siponen, Mikko Rönkkö, Fufan Liu, Steffi Haag, Gabriella Laatikainen:
Protection Motivation Theory in Information Security Behavior Research: Reconsidering the Fundamentals. Commun. Assoc. Inf. Syst. 53: 47 (2023) - [j79]Faheem Ahmed Shaikh, Mikko T. Siponen:
Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity. Comput. Secur. 124: 102974 (2023) - [j78]Allen C. Johnston, Paul Michael Di Gangi, France Bélanger, Robert E. Crossler, Mikko T. Siponen, Merrill Warkentin, Tripti Singh:
Seeking rhetorical validity in fear appeal research: An application of rhetorical theory. Comput. Secur. 125: 103020 (2023) - [j77]Hemin Jiang, Mikko T. Siponen, Aggeliki Tsohou:
Personal use of technology at work: a literature review and a theoretical model for understanding how it affects employee job performance. Eur. J. Inf. Syst. 32(2): 331-345 (2023) - [j76]Xiuyan Shao, Hemin Jiang, Mikko T. Siponen, Cong Cao, Xiaohua Huang:
"Unus pro omnibus, omnes pro uno": understanding unauthorised file sharing in online communities from a public goods contribution perspective. Internet Res. 33(3): 1114-1133 (2023) - [c52]Hanna Paananen, Mikko T. Siponen:
Organization Members Developing Information Security Policies: a Case Study. ICIS 2023 - [e1]Patrick Chau, Jack Jing, Mikko T. Siponen, Andrew Burton-Jones, Chuan-Hoo Tan, Bo Sophia Xiao:
27th Pacific Asia Conference on Information Systems, PACIS 2023, Nanchang, China, July 9-12, 2023. 2023 [contents] - 2022
- [j75]Tong Xin, Mikko T. Siponen, Sihua Chen:
Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats. Behav. Inf. Technol. 41(13): 2835-2859 (2022) - [j74]Mikko T. Siponen, Wael Soliman, Anthony Vance:
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions. Data Base 53(1): 25-60 (2022) - [j73]Yitian Xie, Mikko T. Siponen, Greg D. Moody, Xiaosong Zheng:
Discovering the interplay between defensive avoidance and continued use intention of anti-malware software among experienced home users: A moderated mediation model. Inf. Manag. 59(2): 103586 (2022) - [j72]Ying Li, Tong Xin, Mikko T. Siponen:
Citizens' Cybersecurity Behavior: Some Major Challenges. IEEE Secur. Priv. 20(1): 54-61 (2022) - [j71]Quan Xiao, Mikko T. Siponen, Xing Zhang, Fucai Lu, Sihua Chen, Mingsong Mao:
Impacts of platform design on consumer commitment and online review intention: does use context matter in dual-platform e-commerce? Internet Res. 32(5): 1496-1531 (2022) - [c51]Wael Soliman, Mikko T. Siponen:
What Do We Really Mean by Rigor in Information Systems Research? HICSS 2022: 1-10 - 2021
- [j70]Steffi Haag, Mikko T. Siponen, Fufan Liu:
Protection Motivation Theory in Information Systems Security Research: A Review of the Past and a Road Map for the Future. Data Base 52(2): 25-67 (2021) - [j69]Mikko T. Siponen, Wael Soliman, Philipp Holtkamp:
Research Perspectives: Reconsidering the Role of Research Method Guidelines for Interpretive, Mixed Methods, and Design Science Research. J. Assoc. Inf. Syst. 22(4): 1 (2021) - [j68]Sihua Chen, Hua Xiao, Wei He, Jian Mou, Mikko T. Siponen, Han Qiu, Feng Xu:
Determinants of Individual Knowledge Innovation Behavior: A Perspective of Emotion, Knowledge Sharing, and Trust. J. Organ. End User Comput. 33(6): 1-24 (2021) - [j67]Pallab Sanyal, Nirup M. Menon, Mikko T. Siponen:
An Empirical Examination of the Economics of Mobile Application Security. MIS Q. 45(4): 2235-2260 (2021) - [c50]Kibrom Tadesse Ejigu, Mikko T. Siponen, Tilahun Muluneh Arage:
Investigating the Impact of Organizational Culture on Information Security Policy Compliance: The Case of Ethiopia. AMCIS 2021 - [c49]Mikko T. Siponen, Tuula Klaavuniemi:
The Primary Scientific Contribution is Hardly a Theory in Design Science Research. DESRIST 2021: 137-146 - [c48]Kibrom Ejigu, Mikko T. Siponen, Tilahun Muluneh:
Influence of Organizational Culture on Employees Information Security Policy Compliance in Ethiopian Companies. PACIS 2021: 158 - 2020
- [j66]Hanna Paananen, Michael Lapke, Mikko T. Siponen:
State of the art in information security policy development. Comput. Secur. 88 (2020) - [j65]Mikko T. Siponen, Petri Puhakainen, Anthony Vance:
Can individuals' neutralization techniques be overcome? A field experiment on password policy. Comput. Secur. 88 (2020) - [j64]Mari Karjalainen, Mikko T. Siponen, Suprateek Sarker:
Toward a stage theory of the development of employees' information security behavior. Comput. Secur. 93: 101782 (2020) - [j63]Xiuyan Shao, Mikko T. Siponen, Fufan Liu:
Shall we follow? Impact of reputation concern on information security managers' investment decisions. Comput. Secur. 97: 101961 (2020) - [j62]Nirup M. Menon, Mikko T. Siponen:
Executives' Commitment to Information Security: Interaction between the Preferred Subordinate Influence Approach (PSIA) and Proposal Characteristics. Data Base 51(2): 36-53 (2020) - [j61]Anthony Vance, Mikko T. Siponen, Detmar W. Straub:
Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures. Inf. Manag. 57(4): 103212 (2020) - [j60]Mikko T. Siponen, Tuula Klaavuniemi:
Why is the hypothetico-deductive (H-D) method in information systems not an H-D method? Inf. Organ. 30(1): 100287 (2020) - [j59]Hemin Jiang, Aggeliki Tsohou, Mikko T. Siponen, Ying Li:
Examining the side effects of organizational Internet monitoring on employees. Internet Res. 30(6): 1613-1630 (2020) - [j58]Mikko T. Siponen, Aggeliki Tsohou:
Demystifying the Influential IS Legends of Positivism: Response to Lee's Commentary. J. Assoc. Inf. Syst. 21(6): 1 (2020) - [c47]Mikko T. Siponen, Tuula Klaavuniemi, Marco Nathan:
Mechanistic Explanations and Deliberate Misrepresentations. HICSS 2020: 1-10
2010 – 2019
- 2019
- [j57]Ying Li, Nan (Andy) Zhang, Mikko T. Siponen:
Keeping secure to the end: a long-term perspective to understand employees' consequence-delayed information security violation. Behav. Inf. Technol. 38(5): 435-453 (2019) - [j56]Allen C. Johnston, Merrill Warkentin, Alan R. Dennis, Mikko T. Siponen:
Speak their Language: Designing Effective Messages to Improve Employees' Information Security Decision Making. Decis. Sci. 50(2): 245-284 (2019) - [j55]Naomi Woods, Mikko T. Siponen:
Improving password memorability, while not inconveniencing the user. Int. J. Hum. Comput. Stud. 128: 61-71 (2019) - [j54]Mari Karjalainen, Suprateek Sarker, Mikko T. Siponen:
Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective. Inf. Syst. Res. 30(2): 687-704 (2019) - [c46]Hemin Jiang, Mikko T. Siponen, Aggeliki Tsohou:
A field Experiment for Understanding the Unintended Impact of Internet Monitoring on Employees: Policy Satisfaction, Organizational Citizenship behaviour and Work Motivation. ECIS 2019 - [c45]Hojat Mohammadnazar, Hadi Ghanbari, Mikko T. Siponen:
Moral sensitivity in Information Security Dilemmas. ECIS 2019 - [c44]Philipp Holtkamp, Wael Soliman, Mikko T. Siponen:
Reconsidering the Role of Research Method Guidelines for Qualitative, Mixed-methods, and Design Science Research. HICSS 2019: 1-10 - [c43]Xiuyan Shao, Mikko T. Siponen, Seppo Pahnila:
To Calculate or To Follow Others: How Do Information Security Managers Make Investment Decisions? HICSS 2019: 1-10 - [c42]Mikko T. Siponen, Tuula Klaavuniemi:
Narrowing the Theory's or Study's Scope May Increase Practical Relevance. HICSS 2019: 1-10 - [c41]Mikko T. Siponen, Tuula Klaavuniemi:
How and Why 'Theory' Is Often Misunderstood in Information Systems Literature. ICIS 2019 - [i2]Pekka Abrahamsson, Nilay V. Oza, Mikko T. Siponen:
Agile Software Development Method, A Comparative Review1. CoRR abs/1903.10913 (2019) - [i1]Ville Vakkuri, Kai-Kristian Kemell, Joni Kultanen, Mikko T. Siponen, Pekka Abrahamsson:
Ethically Aligned Design of Autonomous Systems: Industry viewpoint and an empirical study. CoRR abs/1906.07946 (2019) - 2018
- [j53]Hadi Ghanbari, Tero Vartiainen, Mikko T. Siponen:
Omission of Quality Software Development Practices: A Systematic Literature Review. ACM Comput. Surv. 51(2): 38:1-38:27 (2018) - [j52]Naomi Woods, Mikko T. Siponen:
Too many passwords? How understanding our memory can increase password memorability. Int. J. Hum. Comput. Stud. 111: 36-48 (2018) - [j51]Mikko T. Siponen, Richard L. Baskerville:
Intervention Effect Rates as a Path to Research Relevance: Information Systems Security Example. J. Assoc. Inf. Syst. 19(4): 4 (2018) - [j50]Mikko T. Siponen, Aggeliki Tsohou:
Demystifying the Influential IS Legends of Positivism. J. Assoc. Inf. Syst. 19(7): 5 (2018) - [j49]Toni Taipalus, Mikko T. Siponen, Tero Vartiainen:
Errors and Complications in SQL Query Formulation. ACM Trans. Comput. Educ. 18(3): 15:1-15:29 (2018) - [j48]Gregory D. Moody, Mikko T. Siponen, Seppo Pahnila:
Toward a Unified Model of Information Security Policy Compliance. MIS Q. 42(1) (2018) - [c40]Mikko T. Siponen, Tuula Klaavuniemi:
Updating the Philosophy of Middle-Range Theories: Implications for IS. PACIS 2018: 128 - [c39]Hanna Kinnunen, Mikko T. Siponen:
Developing Organization-Specific Information Security Policies. PACIS 2018: 244 - 2017
- [j47]Sutirtha Chatterjee, Suprateek Sarker, Mikko T. Siponen:
How Do Mobile ICTs Enable Organizational Fluidity: Toward a Theoretical Framework. Inf. Manag. 54(1): 1-13 (2017) - [j46]Jungwon Kuem, Soumya Ray, Mikko T. Siponen, Sung S. Kim:
What Leads to Prosocial Behaviors on Social Networking Services: A Tripartite Model. J. Manag. Inf. Syst. 34(1): 40-70 (2017) - [j45]Lara Khansa, Jungwon Kuem, Mikko T. Siponen, Sung S. Kim:
To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls. J. Manag. Inf. Syst. 34(1): 141-176 (2017) - 2016
- [j44]Paul Benjamin Lowry, Jun Zhang, Chuang Wang, Mikko T. Siponen:
Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model. Inf. Syst. Res. 27(4): 962-986 (2016) - 2015
- [j43]Allen C. Johnston, Merrill Warkentin, Mikko T. Siponen:
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric. MIS Q. 39(1): 113-134 (2015) - 2014
- [j42]Mikko T. Siponen, Anthony Vance:
Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations. Eur. J. Inf. Syst. 23(3): 289-305 (2014) - [j41]Mikko T. Siponen, M. Adam Mahmood, Seppo Pahnila:
Employees' adherence to information security policies: An exploratory field study. Inf. Manag. 51(2): 217-224 (2014) - [c38]Jungwon Kuem, Mikko T. Siponen:
Short-Time Non-work-related Computing and Creative Performance. HICSS 2014: 3215-3223 - [c37]Alain Claude Tambe Ebot, Mikko T. Siponen:
Toward a Rational Choice Process Theory of Internet Scamming: The Offender's Perspective. ICIS 2014 - 2013
- [j40]Gregory D. Moody, Mikko T. Siponen:
Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work. Inf. Manag. 50(6): 322-335 (2013) - [c36]Katja Leiviskä, Mikko T. Siponen:
Understanding Why IS Students Drop Out: Toward A Process Theory. ECIS 2013: 62 - [c35]Mari Karjalainen, Mikko T. Siponen, Petri Puhakainen, Suprateek Sarker:
One Size Does Not Fit All: Different Cultures Require Different Information Systems Security Interventions. PACIS 2013: 98 - [c34]Seppo Pahnila, Mari Karjalainen, Mikko T. Siponen:
Information Security Behavior: Towards Multi-Stage Models. PACIS 2013: 102 - 2012
- [j39]Anthony Vance, Mikko T. Siponen, Seppo Pahnila:
Motivating IS security compliance: Insights from Habit and Protection Motivation Theory. Inf. Manag. 49(3-4): 190-198 (2012) - [j38]Mikko T. Siponen, Anthony Vance, Robert Willison:
New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs. Inf. Manag. 49(7-8): 334-341 (2012) - [j37]Mo Adam Mahmood, Mikko T. Siponen, Francisco J. López, Anthony Vance:
Measuring Electronic Commerce Technology-Enabled Business Value: An Empirical Investigation. J. Organ. Comput. Electron. Commer. 22(3): 256-279 (2012) - [j36]Anthony Vance, Mikko T. Siponen:
IS Security Policy Violations: A Rational Choice Perspective. J. Organ. End User Comput. 24(1): 21-41 (2012) - [c33]Tero Vartiainen, Mikko T. Siponen:
What Makes Information System Developers Produce Defective Information Systems For Their Clients? PACIS 2012: 107 - [c32]Paul Benjamin Lowry, Kamel Rouibah, Greg D. Moody, Mikko T. Siponen:
Towards A Cross-Cultural Model Of Online Whistle-Blowing Systems Use. PACIS 2012: 147 - 2011
- [j35]Mari Karjalainen, Mikko T. Siponen:
Toward a New Meta-Theory for Designing Information Systems (IS) Security Training Approaches. J. Assoc. Inf. Syst. 12(8): 3 (2011) - [j34]Tero Vartiainen, Mikko T. Siponen, Liisa Myyry:
The Effects of Teaching the Universality Thesis on Students' Integrative Complexity of Thought. J. Inf. Syst. Educ. 22(3): 261 (2011) - [j33]Seppo Pahnila, Mikko T. Siponen, Xiaosong Zheng:
Integrating Habit into UTAUT: The Chinese eBay Case. Pac. Asia J. Assoc. Inf. Syst. 3(2): 2 (2011) - [c31]Ying Li, Mikko T. Siponen:
A Call For Research On Home Users' Information Security Behaviour. PACIS 2011: 112 - [c30]Tero Vartiainen, Mikko T. Siponen, Gregory D. Moody:
Gray-Area Phenomenon In Information Systems Development: A Call For Research. PACIS 2011: 198 - 2010
- [j32]Mikko T. Siponen, Seppo Pahnila, M. Adam Mahmood:
Compliance with Information Security Policies: An Empirical Investigation. Computer 43(2): 64-71 (2010) - [j31]Tero Vartiainen, Mikko T. Siponen:
On IS Students' Intentions to Use Theories of Ethics in Resolving Moral Conflicts. J. Inf. Syst. Educ. 21(1): 33-42 (2010) - [j30]Mikko T. Siponen, Anthony Vance:
Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations. MIS Q. 34(3): 487-502 (2010) - [j29]Petri Puhakainen, Mikko T. Siponen:
Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study. MIS Q. 34(4): 757-778 (2010) - [j28]Katja Leiviskä, Mikko T. Siponen:
Attitudes of sixth form female students toward the IT field. SIGCAS Comput. Soc. 40(1): 34-49 (2010) - [c29]Seppo Pahnila, Mikko T. Siponen:
Implementation Intentions Explain How a Behavior Becomes Habitual: The Use of Online Newspapers. HICSS 2010: 1-11 - [c28]Mikko T. Siponen, Anthony Vance, Robert Willison:
New Insights for an Old Problem: Explaining Software Piracy through Neutralization Theory. HICSS 2010: 1-10 - [p1]Pekka Abrahamsson, Nilay V. Oza, Mikko T. Siponen:
Agile Software Development Methods: A Comparative Review1. Agile Software Development 2010: 31-59
2000 – 2009
- 2009
- [j27]Robert Willison, Mikko T. Siponen:
Overcoming the insider: reducing employee computer crime through Situational Crime Prevention. Commun. ACM 52(9): 133-137 (2009) - [j26]Mikko T. Siponen, M. Adam Mahmood, Seppo Pahnila:
Technical opinion - Are employees putting your company at risk by not following information security policies? Commun. ACM 52(12): 145-147 (2009) - [j25]Liisa Myyry, Mikko T. Siponen, Seppo Pahnila, Tero Vartiainen, Anthony Vance:
What levels of moral reasoning and values explain adherence to information security rules? An empirical study. Eur. J. Inf. Syst. 18(2): 126-139 (2009) - [j24]Mikko T. Siponen, Robert Willison:
Information security management standards: Problems and solutions. Inf. Manag. 46(5): 267-270 (2009) - 2008
- [j23]Mikko T. Siponen, Juhani Heikka:
Do secure information system design methods provide adequate modeling support? Inf. Softw. Technol. 50(9-10): 1035-1053 (2008) - [c27]Robert Willison, Mikko T. Siponen:
Software Piracy: Original Insights from a Criminological Perspective. HICSS 2008: 266 - [c26]Mikko T. Siponen, Robert Willison, Richard L. Baskerville:
Power and Practice in Information Systems Security Research. ICIS 2008: 26 - 2007
- [j22]Mikko T. Siponen, Harri Oinas-Kukkonen:
A review of information security issues and respective research contributions. Data Base 38(1): 60-80 (2007) - [j21]Mikko T. Siponen, Tero Vartiainen:
Unauthorized copying of software: an empirical study of reasons for and against. SIGCAS Comput. Soc. 37(1): 30-43 (2007) - [c25]Mikko T. Siponen, Robert Willison:
A Critical Assessment of IS Security Research between 1990-2004. ECIS 2007: 1551-1559 - [c24]Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood:
Employees' Behavior towards IS Security Policy Compliance. HICSS 2007: 156 - [c23]Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood:
Which Factors Explain Employees' Adherence to Information Security Policies? An Empirical Study. PACIS 2007: 73 - [c22]Mikko T. Siponen, Seppo Pahnila, M. Adam Mahmood:
Employees' Adherence to Information Security Policies: An Empirical Study. SEC 2007: 133-144 - 2006
- [j20]Timo Jokela, Mikko T. Siponen, Naotake Hirasawa, Jonathan Earthy:
A survey of usability capability maturity models: implications for practice and research. Behav. Inf. Technol. 25(3): 263-282 (2006) - [j19]Mikko T. Siponen:
Information security standards focus on the existence of process, not its content. Commun. ACM 49(8): 97-100 (2006) - [j18]Mikko T. Siponen:
Secure-system design methods: evolution and future directions. IT Prof. 8(3): 40-44 (2006) - [j17]Mikko T. Siponen:
Six Design Theories for IS Security Policies and Guidelines. J. Assoc. Inf. Syst. 7(7): 19 (2006) - [j16]Juhani Heikka, Richard L. Baskerville, Mikko T. Siponen:
A Design Theory for Secure Information Systems Design Methods. J. Assoc. Inf. Syst. 7(11): 31 (2006) - [j15]Mikko T. Siponen:
A justification for software rights. SIGCAS Comput. Soc. 36(3): 11-20 (2006) - [c21]Katja Leiviskä, Mikko T. Siponen:
Attitudes of sixth form female students towards the IT field. ECIS 2006: 859-872 - [c20]Gurpreet Dhillon, Mikko T. Siponen, Raj Sharman:
Minitrack Introduction. HICSS 2006 - [c19]Mikko T. Siponen, Carl Stucke:
Effective Anti-Spam Strategies in Companies: An International Study. HICSS 2006 - [c18]