-
1
-
-
44949274046
-
The Theory of Planned Behavior
-
Ajzen, I., "The Theory of Planned Behavior", Organizational Behavior and Human Decision Processes 50,2, 1991, 179-211.
-
(1991)
Organizational Behavior and Human Decision Processes
, vol.50
, Issue.2
, pp. 179-211
-
-
Ajzen, I.1
-
2
-
-
84914123837
-
A Research Model for Investigating Human Behavior Related to Computer Security
-
Tampa, FL, August 4-6
-
Aytes, K. and Connolly, T, "A Research Model for Investigating Human Behavior Related to Computer Security", Proceedings of the 2003 American Conference On Information Systems, Tampa, FL, August 4-6. 2003.
-
(2003)
Proceedings of the 2003 American Conference On Information Systems
-
-
Aytes, K.1
Connolly, T.2
-
3
-
-
2642549662
-
Computer and Risky Computing Practices: A Rational Choice Perspective
-
Aytes, K. and Connolly, T, "Computer and Risky Computing Practices: A Rational Choice Perspective", Journal of Organizational and End User Computing, 16,2, 2004, 22-40.
-
(2004)
Journal of Organizational and End User Computing
, vol.16
, Issue.2
, pp. 22-40
-
-
Aytes, K.1
Connolly, T.2
-
4
-
-
30744434347
-
An analysis of the growth of computer and Internet security breaches
-
Bagchi, K. and Udo, G., "An analysis of the growth of computer and Internet security breaches", Communications of AIS 12, 2003, 684-700.
-
(2003)
Communications of AIS 12
, pp. 684-700
-
-
Bagchi, K.1
Udo, G.2
-
5
-
-
0017472917
-
Self-Efficacy: Toward a Unifying Theory of Behaviour Change
-
Bandura, A., "Self-Efficacy: Toward a Unifying Theory of Behaviour Change", Psychological Review 84, 2, 1977, 191-215.
-
(1977)
Psychological Review
, vol.84
, Issue.2
, pp. 191-215
-
-
Bandura, A.1
-
7
-
-
0001301111
-
A Contingency theory of organizational crime
-
Finney, H.C. & Lesieur, H.R., (1992), A Contingency theory of organizational crime. Research in the Sociology of Organizations, vol. 1, pp. 255-299.
-
(1992)
Research in the Sociology of Organizations
, vol.1
, pp. 255-299
-
-
Finney, H.C.1
Lesieur, H.R.2
-
9
-
-
0003506109
-
-
5 ed: Upper Saddle River, New Jersey, Prentice Hall Inc
-
Hair, J.F.J., Anderson, R.E., Tatham, R.L., and Black, W. C., Multivariate data analysis. 5 ed: Upper Saddle River, New Jersey, Prentice Hall Inc. 1998.
-
(1998)
Multivariate data analysis
-
-
Hair, J.F.J.1
Anderson, R.E.2
Tatham, R.L.3
Black, W.C.4
-
10
-
-
0036299585
-
Security surveys spring crop
-
Hinde, S., "Security surveys spring crop", Computers & Security, 21, 4, 2002, 310-321.
-
(2002)
Computers & Security
, vol.21
, Issue.4
, pp. 310-321
-
-
Hinde, S.1
-
11
-
-
0001094004
-
Information technology adoption across time: A cross-sectional comparison of pre-adoption and post-adoption beliefs
-
Karahanna, E., Straub, D. W. and Chervany, N. L., "Information technology adoption across time: A cross-sectional comparison of pre-adoption and post-adoption beliefs", MIS Quarterly, 23,2, 1999, 183-213.
-
(1999)
MIS Quarterly
, vol.23
, Issue.2
, pp. 183-213
-
-
Karahanna, E.1
Straub, D.W.2
Chervany, N.L.3
-
12
-
-
73449149291
-
Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation
-
Moore, G.C. and Benbasat, I., "Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation". Information Systems Research, 1991. 2(3): p. 191-222.
-
(1991)
Information Systems Research
, vol.2
, Issue.3
, pp. 191-222
-
-
Moore, G.C.1
Benbasat, I.2
-
13
-
-
39749168050
-
Employees' Behavior towards IS Security Policy Compliance
-
January 3-6, Hilton Waikoloa Village on the Big Island, HI, USA
-
Pahnila, S., Siponen, M., Mahmood, A., "Employees' Behavior towards IS Security Policy Compliance", in Proceedings of the 2007 Hawaii International Conference on System Sciences (HICSS 40), January 3-6, 2007, Hilton Waikoloa Village on the Big Island, HI, USA.
-
(2007)
Proceedings of the 2007 Hawaii International Conference on System Sciences (HICSS 40)
-
-
Pahnila, S.1
Siponen, M.2
Mahmood, A.3
-
14
-
-
0002247369
-
Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation Theory
-
J. Cacioppo and R. Petty Eds, Guilford, New York
-
Rogers, R. W., "Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation Theory", in Social Psychophysiology, J. Cacioppo and R. Petty (Eds.), Guilford, New York, 1983.
-
(1983)
Social Psychophysiology
-
-
Rogers, R.W.1
-
15
-
-
0001045799
-
Protection motivation theory
-
D. S. Gochman Ed, New York, NY: Plenum Press
-
Rogers, R. W. and Prentice-Dunn, S, "Protection motivation theory", In D. S. Gochman (Ed.), Handbook of Health Behavior Research I: Personal and Social Determinants, New York, NY: Plenum Press, 1997, 113-132.
-
(1997)
Handbook of Health Behavior Research I: Personal and Social Determinants
, pp. 113-132
-
-
Rogers, R.W.1
Prentice-Dunn, S.2
-
16
-
-
0033683516
-
A Conceptual Foundation for Organizational Information Security Awareness
-
Siponen, M., "A Conceptual Foundation for Organizational Information Security Awareness", Information Management & Computer Security, 8, 1, 2000, 31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.1
-
17
-
-
55249123249
-
Validating Instruments in MIS Research
-
Straub, D. W., "Validating Instruments in MIS Research", MIS Quarterly, 13, 2, 1989, 147-169.
-
(1989)
MIS Quarterly
, vol.13
, Issue.2
, pp. 147-169
-
-
Straub, D.W.1
-
18
-
-
0000280419
-
Effective IS Security: An Empirical Study
-
Straub, D.W., "Effective IS Security: An Empirical Study", Information Systems Research, 1, 3, 1990, 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
19
-
-
0001133137
-
Coping with Systems Risk: Security Planning Models fir. Management Decision-Making
-
Straub, DW. and Welke, RJ., "Coping with Systems Risk: Security Planning Models fir. Management Decision-Making" , MIS Quarterly, 22, 4, 1998, 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
21
-
-
84869780575
-
A Protection Motivation Theory Approach to Home Wireless Security
-
Las Vegas
-
Woon, I. M. Y., Tan, G W. and Low, R. T., "A Protection Motivation Theory Approach to Home Wireless Security", Proceedings of the Twenty-Sixth International Conference on Information Systems, Las Vegas, 2005, 367-380.
-
(2005)
Proceedings of the Twenty-Sixth International Conference on Information Systems
, pp. 367-380
-
-
Woon, I.M.Y.1
Tan, G.W.2
Low, R.T.3
|