메뉴 건너뛰기




Volumn 46, Issue 1, 2008, Pages 254-264

Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software firewalls

Author keywords

e Commerce; Firewalls; IS security; Privacy; Security protection technologies

Indexed keywords

COMMERCE; COMPUTER PRIVACY; COMPUTER SOFTWARE; COMPUTER SYSTEM FIREWALLS; ELECTRONIC COMMERCE; INTERNET; INTERNET SERVICE PROVIDERS; TECHNOLOGY;

EID: 56049103535     PISSN: 01679236     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dss.2008.06.010     Document Type: Article
Times cited : (65)

References (39)
  • 1
    • 0036015953 scopus 로고    scopus 로고
    • Assessing a firm's web presence: a heuristic evaluation procedure for the measurement of usability
    • Agarwal R., and Venkatesh V. Assessing a firm's web presence: a heuristic evaluation procedure for the measurement of usability. Information Systems Research 13 2 (2002) 168-188
    • (2002) Information Systems Research , vol.13 , Issue.2 , pp. 168-188
    • Agarwal, R.1    Venkatesh, V.2
  • 3
    • 56049123977 scopus 로고    scopus 로고
    • AOL/NCSA, Online Safety Study, 2004, last accessed on, at: http://www.staysafeonline.info/news/safety_study_v04.pdf.
    • AOL/NCSA, Online Safety Study, 2004, last accessed on, at: http://www.staysafeonline.info/news/safety_study_v04.pdf.
  • 5
    • 84867973432 scopus 로고    scopus 로고
    • Trustworthiness in electronic commerce: the role of privacy, security, and site attributes
    • Belanger F., Hiller J.S., and Smith W.J. Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems 11 (2002) 245-270
    • (2002) Journal of Strategic Information Systems , vol.11 , pp. 245-270
    • Belanger, F.1    Hiller, J.S.2    Smith, W.J.3
  • 9
    • 56049092639 scopus 로고    scopus 로고
    • CERT/CC, 2004 E-Crime Watch Survey: Summary of Findings, CSO Magazine and Computer Emergency Response Team/Coordination Center, Carnegie Mellon Software Engineering Institute, 2004.
    • CERT/CC, 2004 E-Crime Watch Survey: Summary of Findings, CSO Magazine and Computer Emergency Response Team/Coordination Center, Carnegie Mellon Software Engineering Institute, 2004.
  • 10
    • 33750478684 scopus 로고    scopus 로고
    • Adoption of Internet banking: an empirical study in Hong Kong
    • Cheng T.C.E., Lam D.Y.C., and Yeung A.C.L. Adoption of Internet banking: an empirical study in Hong Kong. Decision Support Systems 42 3 (2006) 1558-1572
    • (2006) Decision Support Systems , vol.42 , Issue.3 , pp. 1558-1572
    • Cheng, T.C.E.1    Lam, D.Y.C.2    Yeung, A.C.L.3
  • 11
    • 0000004470 scopus 로고    scopus 로고
    • Social cognitive theory and individual reactions to computing technology: a longitudinal study
    • Compeau D. Social cognitive theory and individual reactions to computing technology: a longitudinal study. MIS Quarterly 23 2 (1999) 145-158
    • (1999) MIS Quarterly , vol.23 , Issue.2 , pp. 145-158
    • Compeau, D.1
  • 12
    • 0001501223 scopus 로고
    • "How did they get my name?": an exploratory investigation of consumer attitudes toward secondary information use
    • Culnan M.J. "How did they get my name?": an exploratory investigation of consumer attitudes toward secondary information use. MIS Quarterly 17 3 (1993) 341
    • (1993) MIS Quarterly , vol.17 , Issue.3 , pp. 341
    • Culnan, M.J.1
  • 13
    • 0033464665 scopus 로고    scopus 로고
    • Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation
    • Culnan M.J., and Armstrong P.K. Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organization Science 10 1 (1999)
    • (1999) Organization Science , vol.10 , Issue.1
    • Culnan, M.J.1    Armstrong, P.K.2
  • 14
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    • Davis F.D. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly 13 3 (1989) 319-339
    • (1989) MIS Quarterly , vol.13 , Issue.3 , pp. 319-339
    • Davis, F.D.1
  • 16
    • 1642443437 scopus 로고    scopus 로고
    • Hacking begins at home: are company networks at risk from home computers?
    • Furnell S.M. Hacking begins at home: are company networks at risk from home computers?. Computer Fraud & Security 1 (2004) 4-7
    • (2004) Computer Fraud & Security , Issue.1 , pp. 4-7
    • Furnell, S.M.1
  • 17
    • 0000201126 scopus 로고
    • Variables affecting perception of invasion of privacy in personnel selection situation
    • Fusilier M.R., and Hoyer W.D. Variables affecting perception of invasion of privacy in personnel selection situation. Journal of Applied Psychology 65 5 (1980) 623
    • (1980) Journal of Applied Psychology , vol.65 , Issue.5 , pp. 623
    • Fusilier, M.R.1    Hoyer, W.D.2
  • 18
    • 0000426285 scopus 로고
    • Privacy: recognition of a consumer right
    • Goodwin C. Privacy: recognition of a consumer right. Journal of Public Policy & Marketing 10 1 (1991) 149-166
    • (1991) Journal of Public Policy & Marketing , vol.10 , Issue.1 , pp. 149-166
    • Goodwin, C.1
  • 23
    • 36249020892 scopus 로고    scopus 로고
    • A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents
    • Kim D.J., Ferrin D.L., and Rao H.R. A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents. Decision Support Systems 44 2 (2008) 544-564
    • (2008) Decision Support Systems , vol.44 , Issue.2 , pp. 544-564
    • Kim, D.J.1    Ferrin, D.L.2    Rao, H.R.3
  • 24
    • 0036015968 scopus 로고    scopus 로고
    • Applying the technology acceptance model and flow theory to online consumer behavior
    • Koufaris M. Applying the technology acceptance model and flow theory to online consumer behavior. Information Systems Research 13 2 (2002) 205-223
    • (2002) Information Systems Research , vol.13 , Issue.2 , pp. 205-223
    • Koufaris, M.1
  • 25
    • 34547692964 scopus 로고    scopus 로고
    • Perceived risks, counter-beliefs, and intentions to use anti-/counter-terrorism websites: an exploratory study of government-citizens online interactions in a turbulent environment
    • Lee J., and Rao H.R. Perceived risks, counter-beliefs, and intentions to use anti-/counter-terrorism websites: an exploratory study of government-citizens online interactions in a turbulent environment. Decision Support Systems 43 4 (2007) 1431-1449
    • (2007) Decision Support Systems , vol.43 , Issue.4 , pp. 1431-1449
    • Lee, J.1    Rao, H.R.2
  • 26
    • 4544359599 scopus 로고    scopus 로고
    • Beyond concern: a privacy-trust-behavioral intention model of electronic commerce
    • Liua C., Marchewkaa J.T., Lub J., and Yub C.-S. Beyond concern: a privacy-trust-behavioral intention model of electronic commerce. Information & Management 42 1 (2004) 127-142
    • (2004) Information & Management , vol.42 , Issue.1 , pp. 127-142
    • Liua, C.1    Marchewkaa, J.T.2    Lub, J.3    Yub, C.-S.4
  • 27
    • 55249097295 scopus 로고
    • Four ethical issues of the information age
    • Mason R.O. Four ethical issues of the information age. MIS Quarterly 10 1 (1986) 5-12
    • (1986) MIS Quarterly , vol.10 , Issue.1 , pp. 5-12
    • Mason, R.O.1
  • 29
    • 0000981743 scopus 로고    scopus 로고
    • Information privacy: measuring individuals' concerns about organizational practices
    • Smith H.J., Milberg S.J., and Burke S.J. Information privacy: measuring individuals' concerns about organizational practices. MIS Quarterly 20 2 (1996) 167
    • (1996) MIS Quarterly , vol.20 , Issue.2 , pp. 167
    • Smith, H.J.1    Milberg, S.J.2    Burke, S.J.3
  • 30
    • 0036004583 scopus 로고    scopus 로고
    • An empirical examination of the concern for information privacy instrument
    • Stewart K.A., and Segars A.H. An empirical examination of the concern for information privacy instrument. Information Systems Research 13 1 (2002) 36-49
    • (2002) Information Systems Research , vol.13 , Issue.1 , pp. 36-49
    • Stewart, K.A.1    Segars, A.H.2
  • 31
    • 56049098628 scopus 로고    scopus 로고
    • B. Tedeschi, Poll Says Identity Theft Concerns Rose after High-Profile Breaches, in: The New York Times, New York, 2005.
    • B. Tedeschi, Poll Says Identity Theft Concerns Rose after High-Profile Breaches, in: The New York Times, New York, 2005.
  • 32
    • 1042268474 scopus 로고    scopus 로고
    • An empirical examination of individual traits as antecedents to computer anxiety and computer self-efficacy
    • Thatcher J.B., and Perrewé P.L. An empirical examination of individual traits as antecedents to computer anxiety and computer self-efficacy. MIS Quarterly 26 4 (2002) 381-396
    • (2002) MIS Quarterly , vol.26 , Issue.4 , pp. 381-396
    • Thatcher, J.B.1    Perrewé, P.L.2
  • 33
    • 0037412301 scopus 로고    scopus 로고
    • Privacy on the web: an examination of user concerns, technology, and implications for business organizations and individuals
    • Turner E.C., and Dasgupta S. Privacy on the web: an examination of user concerns, technology, and implications for business organizations and individuals. Information Systems Management 20 1 (2003) 8-18
    • (2003) Information Systems Management , vol.20 , Issue.1 , pp. 8-18
    • Turner, E.C.1    Dasgupta, S.2
  • 34
    • 9744271731 scopus 로고    scopus 로고
    • User acceptance of hedonic information systems
    • van der Heijden H. User acceptance of hedonic information systems. MIS Quarterly 28 4 (2004) 695-704
    • (2004) MIS Quarterly , vol.28 , Issue.4 , pp. 695-704
    • van der Heijden, H.1
  • 35
    • 0033872521 scopus 로고    scopus 로고
    • A theoretical extension of the technology acceptance model: four longitudinal field studies
    • Venkatesh V., and Davis F. A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science 46 2 (2000) 186-204
    • (2000) Management Science , vol.46 , Issue.2 , pp. 186-204
    • Venkatesh, V.1    Davis, F.2
  • 36
    • 1542382496 scopus 로고    scopus 로고
    • User acceptance of information technology: toward a unified view
    • Venkatesh V., Morris M.G., Davis G.B., and Davis F.D. User acceptance of information technology: toward a unified view. MIS Quarterly 27 3 (2003) 425-478
    • (2003) MIS Quarterly , vol.27 , Issue.3 , pp. 425-478
    • Venkatesh, V.1    Morris, M.G.2    Davis, G.B.3    Davis, F.D.4
  • 37
    • 18944367029 scopus 로고    scopus 로고
    • A theoretical integration of user satisfaction and technology acceptance
    • Wixom B., and Todd P. A theoretical integration of user satisfaction and technology acceptance. Information Systems Research 16 1 (2005) 85-102
    • (2005) Information Systems Research , vol.16 , Issue.1 , pp. 85-102
    • Wixom, B.1    Todd, P.2
  • 38
    • 4243066338 scopus 로고    scopus 로고
    • It's all about attitude: revisiting the technology acceptance model
    • Yang H.-d., and Yoo Y. It's all about attitude: revisiting the technology acceptance model. Decision Support Systems 38 1 (2004) 19-31
    • (2004) Decision Support Systems , vol.38 , Issue.1 , pp. 19-31
    • Yang, H.-d.1    Yoo, Y.2
  • 39
    • 34548477450 scopus 로고    scopus 로고
    • Network externalities, layered protection and it security risk management
    • Yue W.T., Cakanyildirim M., Ryu Y.U., and Liu D. Network externalities, layered protection and it security risk management. Decision Support Systems 44 1 (2007) 1-16
    • (2007) Decision Support Systems , vol.44 , Issue.1 , pp. 1-16
    • Yue, W.T.1    Cakanyildirim, M.2    Ryu, Y.U.3    Liu, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.