Bifulco, A., & Santoro, R. (2005, September). A conceptual framework for “Professional Virtual Communities”. In Working Conference on Virtual Enterprises (pp. 417-424). Springer, Boston, MA.
Elahi, S., Taheri, M., & Hassanzadeh, A. (2021). A Framework for the Role of Human Factors In information Systemsâ Security.Management Research in Iran, 13(2), 1-22.
Fathian, M,. & Mahdavi Noor, H. (2015). Information Technology: Fundation and Management, Tehran: Iran University of Science & Technology. (In Persian).
Farazmand, H., Mashayekh, M, & Hesami, K. (2012). The Relationship between Information Technology and Manpower Productivity and Capital in Companies Listed in Tehran Stock Exchange. The Journal of Social Development, 7(3), 63-78. (In Persian).
Forrester, V. V. (2019). User Information Security Behavior in Professional Virtual Communities: A Technology Threat Avoidance Approach (Doctoral dissertation, Nova Southeastern University). Giwah, A. D., Wang, L., Levy, Y., & Hur, I. (2019). Empirical assessment of mobile device users’ information security behavior towards data breach: Leveraging protection motivation theory.Journal of Intellectual Capital.
Jackson, B. A., Greenfield, V. A., Morral, A. R., & Hollywood, J. S. (2014). Police department investments in information technology systems: challenges assessing their payoff.
Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS quarterly, 549-566.
Karjalainen, M., Siponen, M., & Sarker, S. (2020). Toward a stage theory of the development of employees’ information security behavior. Computers & Security, 93, 101782.
Keikha, F. (2018). Interpersonal trust factors affecting members’ knowledge sharing behavior in virtual communities. Iran. J. Inf. Process. Manag, 34, 275-300.
Kheirgoo, M., & Shukuhy, J. (2017). Identification and ranking of key factors influencing the effectiveness of information systems in State-Owned Organizations. Iranian Journal of Information processing and Management, 32(3), 695-712.
Nadri, Gh. & Bakhshayesh, A (2020). Investigating the Impact of Virtual Social Networks on Social Security of Iran with a policy approach. Protectiv and Society researchs, 7(25), 125-154. (In Persian)
Nia, M. G., Harandi, M. F., & de Vries, M. J. (2019). Technology development as a normative practice: A meaning-based approach to learning about values in engineering—Damming as a case study. Science and engineering ethics, 25(1), 55-82.
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The journal of psychology, 91(1), 93-114.
Rogers, R. W. (1983). Cognitive and psychological processes in fear appeals and attitude change: A revised theory of protection motivation. Social psychophysiology: A sourcebook, 153-176.
Samtani, S., Chinn, R., Chen, H., & Nunamaker Jr, J. F. (2017). Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence. Journal of Management Information Systems, 34(4), 1023-1053.
Shamala, P., Ahmad, R., Zolait, A., & Sedek, M. (2017). Integrating information quality dimensions into information security risk management (ISRM). Journal of Information Security and Applications, 36, 1-10.
Van Schaik, P., Jansen, J., Onibokun, J., Camp, J., & Kusev, P. (2018). Security and privacy in online social networking: Risk perceptions and precautionary behaviour. Computers in Human Behavior, 78, 283-297.
Yousefi Zenouz, R., Hassanpoor, A., & Mousavi, P. (2015). A model to Prioritizing Organizational Information security risks using by Fuzzy AHP and Bayesian Networks in the banking industry. Industrial Management Studies, 13(37), 161-185. (In Persian).
Yudatama, U., Hidayanto, A. N., Nazief, B. A., & Phusavat, K. (2019). Data to model the effect of awareness on the success of IT Governance implementation: A partial least squares structural equation modeling approach (PLS-SEM). Data in brief, 25, 104333.