Follow
Spyridon Samonas
Title
Cited by
Cited by
Year
The CIA strikes back: Redefining confidentiality, integrity and availability in security.
S Samonas, D Coss
Journal of Information System Security 10 (3), 2014
3492014
Stakeholder perceptions of information security policy: Analyzing personal constructs
S Samonas, G Dhillon, A Almusharraf
International Journal of Information Management 50, 144-154, 2020
522020
Mitigating e-services avoidance: the role of government cybersecurity preparedness
M Abdelhamid, V Kisekka, S Samonas
Information & Computer Security 27 (1), 26-46, 2019
192019
Developing a human activity model for insider IS security breaches using action design research
G Dhillon, S Samonas, U Etudo
ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International …, 2016
172016
Insider fraud and routine activity theory
S Samonas
172013
Mismatched understanding of IS security policy: A RepGrid analysis
A Almusharraf, G Dhillon, S Samonas
132015
The Risk of Computerized Bureaucracy
IO Angell, S Samonas
Journal of Information System Security 5 (2), 3-25, 2009
112009
The Power of Discretion in IS Security
S Samonas, IO Angell
Journal of Information System Security 6 (2), 3-29, 2010
52010
Managing Computerized Bureaucracy: Opportunities and Hazards
S Samonas
Department of Management, LSE, 2012
22012
The Role of Security Beliefs in the Use of Personal Health Records (PHR)
M Abdelhamid, S Samonas
2018
Building a Theory of Socio-technical Fraud
S Samonas
2016
Mitigating risk in computerized bureaucracy
S Samonas
2010
Autonomy as a Necessary E-Ville
S Samonas
8th Annual Security Conference in Las Vegas, USA, 2009
2009
AMCIS2015 Puerto Rico Paper Submission Mismatched Understanding of IS Security Policy: A RepGrid Analysis
G Dhillon, A Almusharraf, S Samonas
Ebola as existential crisis: the realitization of security events
ND Baker, S Samonas
The system can't perform the operation now. Try again later.
Articles 1–15