-
1
-
-
33746633350
-
Perceived Usefulness, Ease of Use, and Usage of Information Technology: A Replication
-
Adams, D. A., Nelson, R. R., and Todd, P. A. 1992. "Perceived Usefulness, Ease of Use, and Usage of Information Technology: A Replication," MIS Quarterly (16:2), pp. 227-247.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 227-247
-
-
Adams, D.A.1
Nelson, R.R.2
Todd, P.A.3
-
2
-
-
0034557459
-
Research Report: The Evolving Relationship Between General and Specific Computer Self-Efficacy - An Empirical Assessment
-
Agarwal, R., Sambamurthy, V., and Stair, R. M. 2000. "Research Report: The Evolving Relationship Between General and Specific Computer Self-Efficacy - An Empirical Assessment," Information Systems Research (11:4), pp. 418-430.
-
(2000)
Information Systems Research
, vol.11
, Issue.4
, pp. 418-430
-
-
Agarwal, R.1
Sambamurthy, V.2
Stair, R.M.3
-
5
-
-
30744434347
-
An Analysis of the Growth of Computer and Internet Security Breaches
-
Bagchi, K., and Udo, G. 2003. "An Analysis of the Growth of Computer and Internet Security Breaches," Communications of the AIS (12), pp. 684-700.
-
(2003)
Communications of the AIS
, vol.12
, pp. 684-700
-
-
Bagchi, K.1
Udo, G.2
-
6
-
-
0017472917
-
Self-Efficacy: Toward a Unifying Theory of Behavior Change
-
Bandura, A. 1977. "Self-Efficacy: Toward a Unifying Theory of Behavior Change," Psychological Review (84), pp. 191-215.
-
(1977)
Psychological Review
, vol.84
, pp. 191-215
-
-
Bandura, A.1
-
7
-
-
33746878674
-
Self-Efficacy Mechanism in Human Agency
-
Bandura, A. 1982. "Self-Efficacy Mechanism in Human Agency," American Psychologist (37), pp. 122-147.
-
(1982)
American Psychologist
, vol.37
, pp. 122-147
-
-
Bandura, A.1
-
8
-
-
0001099198
-
Preference Parameters and Behavioral Heterogeneity: An Experimental Approach in the Health and Retirement Study
-
Barsky, R. B., Juster, F. T., Kimball, M. S., and Shapiro, M. D. 1997. "Preference Parameters and Behavioral Heterogeneity: An Experimental Approach in the Health and Retirement Study," The Quarterly Journal of Economics (72:3), pp. 537-579.
-
(1997)
The Quarterly Journal of Economics
, vol.72
, Issue.3
, pp. 537-579
-
-
Barsky, R.B.1
Juster, F.T.2
Kimball, M.S.3
Shapiro, M.D.4
-
10
-
-
0013324190
-
Risk Analysis: An Interpretive Feasibility Tool in Justifying Information Systems Security
-
Baskerville, R. 1991a. "Risk Analysis: An Interpretive Feasibility Tool in Justifying Information Systems Security," European Journal of Information Systems (1:2), pp. 121-130.
-
(1991)
European Journal of Information Systems
, vol.1
, Issue.2
, pp. 121-130
-
-
Baskerville, R.1
-
11
-
-
0026398826
-
Risk Analysis as a Source of Professional Knowledge
-
Baskerville, R. 1991b. "Risk Analysis as a Source of Professional Knowledge," Computer & Security (10:8), pp. 749-764.
-
(1991)
Computer & Security
, vol.10
, Issue.8
, pp. 749-764
-
-
Baskerville, R.1
-
12
-
-
0027804413
-
Information Systems Security Design Methods: Implications for Information Systems Development
-
Baskerville, R. 1993. "Information Systems Security Design Methods: Implications for Information Systems Development," ACM Computing Surveys (25:4), pp. 375-414.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
13
-
-
33645301638
-
Understanding User Responses to Information Technology: A Coping Model of User Adaptation
-
Beaudry, A., and Pinsonneault, A. 2005. "Understanding User Responses to Information Technology: A Coping Model of User Adaptation," MIS Quarterly (29:3), pp. 493-524.
-
(2005)
MIS Quarterly
, vol.29
, Issue.3
, pp. 493-524
-
-
Beaudry, A.1
Pinsonneault, A.2
-
14
-
-
0000998647
-
Understanding Information Systems Continuance: An Expectation-Confirmation Model
-
Bhattacherjee, A. 2001. "Understanding Information Systems Continuance: An Expectation-Confirmation Model," MIS Quarterly (25:3), pp. 351-370.
-
(2001)
MIS Quarterly
, vol.25
, Issue.3
, pp. 351-370
-
-
Bhattacherjee, A.1
-
15
-
-
9744225129
-
Understanding Changes in Belief and Attitude Toward Information Technology Usage: A Theoretical Model and Longitudinal Test
-
Bhattacherjee, A., and Premkumar, G. 2004. "Understanding Changes in Belief and Attitude Toward Information Technology Usage: A Theoretical Model and Longitudinal Test," MIS Quarterly (28:2), pp. 229-254.
-
(2004)
MIS Quarterly
, vol.28
, Issue.2
, pp. 229-254
-
-
Bhattacherjee, A.1
Premkumar, G.2
-
16
-
-
0036922102
-
Do I Really Have To? User Acceptance of Mandated Technology
-
Brown, S.A., Massey, A. P., Montoya-Weiss, M. M., and Burkman, J. P. 2002. "Do I Really Have To? User Acceptance of Mandated Technology," European Journal of Information Systems (11), pp. 283-295.
-
(2002)
European Journal of Information Systems
, vol.11
, pp. 283-295
-
-
Brown, S.A.1
Massey, A.P.2
Montoya-Weiss, M.M.3
Burkman, J.P.4
-
17
-
-
0001639903
-
Informational and Normative Social Influence in Buyer Behavior
-
Burnkrant, R. E., and Cousineau, A. 1975. "Informational and Normative Social Influence in Buyer Behavior," Journal of Consumer Research (2), pp. 206-215.
-
(1975)
Journal of Consumer Research
, vol.2
, pp. 206-215
-
-
Burnkrant, R.E.1
Cousineau, A.2
-
18
-
-
33749634299
-
Approach, Avoidance, and the Self-Regulation of Affect and Action
-
Carver, C. S. 2006. "Approach, Avoidance, and the Self-Regulation of Affect and Action," Motivation and Emotion (30), pp. 105-110.
-
(2006)
Motivation and Emotion
, vol.30
, pp. 105-110
-
-
Carver, C.S.1
-
19
-
-
0020157678
-
Control Theory: A Useful Conceptual Framework for Personality-Social, Clinical, and Health Psychology
-
Carver, C. S., and Scheier, M. F. 1982. "Control Theory: A Useful Conceptual Framework for Personality-Social, Clinical, and Health Psychology," Psychological Bulletin (92:1), pp. 111-135.
-
(1982)
Psychological Bulletin
, vol.92
, Issue.1
, pp. 111-135
-
-
Carver, C.S.1
Scheier, M.F.2
-
20
-
-
38549137059
-
Behavioral Inhibition, Behavioral Activation, and Affective Responses to Impending Reward and Punishment: The BIS/BAS Scales
-
Carver, C. S., and White, T. L. 1994. "Behavioral Inhibition, Behavioral Activation, and Affective Responses to Impending Reward and Punishment: The BIS/BAS Scales," Journal of Personality and Social Psychology (67), pp. 319-333.
-
(1994)
Journal of Personality and Social Psychology
, vol.67
, pp. 319-333
-
-
Carver, C.S.1
White, T.L.2
-
21
-
-
0344527939
-
Influence of Computer Attitude and Self-Efficacy on IT Usage Behavior
-
Chau, P. Y. K. 2001. "Influence of Computer Attitude and Self-Efficacy on IT Usage Behavior," Journal of End User Computing (13:1), pp. 26-33.
-
(2001)
Journal of End User Computing
, vol.13
, Issue.1
, pp. 26-33
-
-
Chau, P.Y.K.1
-
22
-
-
49149116092
-
Computer Self-Efficacy: Development of a Measure and Initial Test
-
Compeau, D. R., and Higgins, C. A. 1995. "Computer Self-Efficacy: Development of a Measure and Initial Test," MIS Quarterly (19), pp. 189-211.
-
(1995)
MIS Quarterly (19)
, pp. 189-211
-
-
Compeau, D.R.1
Higgins, C.A.2
-
23
-
-
0000004470
-
Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal Study
-
Compeau, D. R., Higgins, C. A., and Huff, S. 1999. "Social Cognitive Theory and Individual Reactions to Computing Technology: A Longitudinal Study," MIS Quarterly (23:2), 1999, pp. 145-158.
-
(1999)
MIS Quarterly
, vol.23
, Issue.2
, pp. 145-158
-
-
Compeau, D.R.1
Higgins, C.A.2
Huff, S.3
-
24
-
-
60649090989
-
Computer Economics
-
September
-
Computer Economics. 2003. "Virus Attack Costs on the Rise-Again," September (http://www.computereconomics.com/article.cfm?id= 873).
-
(2003)
Virus Attack Costs on the Rise-Again
-
-
-
26
-
-
0001501223
-
How Did They Get My Name? An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use
-
Culnan, M. 1993. ""How Did They Get My Name?" An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use," MIS Quarterly (17:3), pp. 341-363.
-
(1993)
MIS Quarterly
, vol.17
, Issue.3
, pp. 341-363
-
-
Culnan, M.1
-
27
-
-
0033464665
-
Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation
-
Culnan, M., and Armstrong, P. 1999. "Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation," Organization Science (10:1), pp. 104-115.
-
(1999)
Organization Science
, vol.10
, Issue.1
, pp. 104-115
-
-
Culnan, M.1
Armstrong, P.2
-
28
-
-
0001217382
-
Cerebral Asymmetry, Emotion, and Affective Style
-
K. Hugdahl ed, Cambridge, MA: MIT Press
-
Davidson, R. 1995. "Cerebral Asymmetry, Emotion, and Affective Style," in Brain Asymmetry, K. Hugdahl (ed.), Cambridge, MA: MIT Press.
-
(1995)
Brain Asymmetry
-
-
Davidson, R.1
-
29
-
-
55249087535
-
Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology
-
Davis, F. D. 1989. "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology," MIS Quarterly (13:3), pp. 319-338.
-
(1989)
MIS Quarterly
, vol.13
, Issue.3
, pp. 319-338
-
-
Davis, F.D.1
-
30
-
-
84936823933
-
User Acceptance of Computer Technology: A Comparison of Two Theoretical Models
-
Davis, F. D., Bagozzi, R. P., and Warshaw, P. R. 1989. "User Acceptance of Computer Technology: A Comparison of Two Theoretical Models," Management Science (35:8), pp. 982-1003.
-
(1989)
Management Science
, vol.35
, Issue.8
, pp. 982-1003
-
-
Davis, F.D.1
Bagozzi, R.P.2
Warshaw, P.R.3
-
31
-
-
33846002705
-
A Study of Normative and Informational Social Influences upon Individual Judgment
-
Deutsch, M., and Gerard, H. B. 1955. "A Study of Normative and Informational Social Influences upon Individual Judgment," Journal of Abnormal and Social Psychology (51), pp. 629-636.
-
(1955)
Journal of Abnormal and Social Psychology
, vol.51
, pp. 629-636
-
-
Deutsch, M.1
Gerard, H.B.2
-
32
-
-
0002698747
-
Information System Security Management in the New Millennium
-
Dhillon, G., and Backhouse, J. 2000. "Information System Security Management in the New Millennium," Communications of the ACM (43:7), pp. 125-128.
-
(2000)
Communications of the ACM
, vol.43
, Issue.7
, pp. 125-128
-
-
Dhillon, G.1
Backhouse, J.2
-
33
-
-
0001285417
-
A Cybernetic Theory of Stress, Coping, and Well-Being in Organizations
-
Edwards, J. 1992. "A Cybernetic Theory of Stress, Coping, and Well-Being in Organizations," Academy of Management Review (17:2), pp. 238-274.
-
(1992)
Academy of Management Review
, vol.17
, Issue.2
, pp. 238-274
-
-
Edwards, J.1
-
34
-
-
33749613842
-
The Hierarchical Model of Approach-Avoidance Motivation
-
Elliot, A. J. 2006. "The Hierarchical Model of Approach-Avoidance Motivation," Motivation and Emotion (30), pp. 111-116.
-
(2006)
Motivation and Emotion
, vol.30
, pp. 111-116
-
-
Elliot, A.J.1
-
35
-
-
0035625841
-
Approach and Avoidance Motivation
-
Elliot, A. J., and Covington, M. V. 2001. "Approach and Avoidance Motivation," Educational Psychology Review (13:2), pp. 73-92.
-
(2001)
Educational Psychology Review
, vol.13
, Issue.2
, pp. 73-92
-
-
Elliot, A.J.1
Covington, M.V.2
-
36
-
-
34247852624
-
Risk Aversion and Personality Type
-
Filbeck, G., Hatfield, P., and Horvath, P. 2005. "Risk Aversion and Personality Type," Journal of Behavioral Finance (6:4), pp. 170-180.
-
(2005)
Journal of Behavioral Finance
, vol.6
, Issue.4
, pp. 170-180
-
-
Filbeck, G.1
Hatfield, P.2
Horvath, P.3
-
37
-
-
0003551671
-
-
Reading, MA: Addison-Wesley
-
Fishbein, M., and Ajzen, I. 1975. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Reading, MA: Addison-Wesley.
-
(1975)
Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research
-
-
Fishbein, M.1
Ajzen, I.2
-
38
-
-
21844487262
-
Protection Motivation Theory and Adherence to Medical Treatment Regimens for Muscular Dystrophy
-
Flynn, M. F., Lyman, R. D., and Prentice-Dunn, S. 1995. "Protection Motivation Theory and Adherence to Medical Treatment Regimens for Muscular Dystrophy," Journal of Social and Clinical Psychology 1995, pp. 61-75.
-
(1995)
Journal of Social and Clinical Psychology
, vol.1995
, pp. 61-75
-
-
Flynn, M.F.1
Lyman, R.D.2
Prentice-Dunn, S.3
-
40
-
-
0001823869
-
Security Concerns of System Users: A Study of Perceptions of the Adequacy of Security
-
Goodhue, D., and Straub, D. 1991. "Security Concerns of System Users: A Study of Perceptions of the Adequacy of Security," Information & Management (20), pp. 13-27.
-
(1991)
Information & Management
, vol.20
, pp. 13-27
-
-
Goodhue, D.1
Straub, D.2
-
41
-
-
33749646491
-
-
Computer Security Institute
-
Gordon, L. A., Loeb, M. P., Lucyshyn, W., and Richardson, R. 2006. "2006 CSI/FBI Computer Crime and Security Survey," Computer Security Institute (http://i.cmpnet.com/gocsi/db-area/pdfs/fbi/FBI2006.pdf).
-
(2006)
2006 CSI/FBI Computer Crime and Security Survey
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
42
-
-
0034373966
-
Financial Risk Tolerance and Additional Factors That Affect Risk Taking in Everyday Money Matters
-
Grable, J. 2000. "Financial Risk Tolerance and Additional Factors That Affect Risk Taking in Everyday Money Matters," Journal of Business and Psychology (14:4), pp. 625-630.
-
(2000)
Journal of Business and Psychology
, vol.14
, Issue.4
, pp. 625-630
-
-
Grable, J.1
-
43
-
-
60649102826
-
Risk Tolerance, Projection Bias, Vividness, and Equity Prices
-
Grable, J., Lytton, R. H., O'Neill, B., Joo, S., and Klock, D. 2006. "Risk Tolerance, Projection Bias, Vividness, and Equity Prices," Journal of Investing, (15:2), pp. 68-74.
-
(2006)
Journal of Investing
, vol.15
, Issue.2
, pp. 68-74
-
-
Grable, J.1
Lytton, R.H.2
O'Neill, B.3
Joo, S.4
Klock, D.5
-
45
-
-
0000299603
-
Cybernetics and Dependence: Reframing the Control Concept
-
Green, S. G., and Welsh, M. A. 1988. "Cybernetics and Dependence: Reframing the Control Concept," Academy of Management Review (13:2), pp. 287-301.
-
(1988)
Academy of Management Review
, vol.13
, Issue.2
, pp. 287-301
-
-
Green, S.G.1
Welsh, M.A.2
-
46
-
-
33646493500
-
An Empirical Investigation of Personal Financial Risk Tolerance
-
Hallahan, T. A., Faff, R. W., and McKenzie, M. D. 2004. "An Empirical Investigation of Personal Financial Risk Tolerance," Financial Service Review (13:1), pp. 57-78.
-
(2004)
Financial Service Review
, vol.13
, Issue.1
, pp. 57-78
-
-
Hallahan, T.A.1
Faff, R.W.2
McKenzie, M.D.3
-
47
-
-
0031304419
-
Beyond Pleasure and Pain
-
Higgins, E. T. 1997. "Beyond Pleasure and Pain," American Psychologist (52:12), pp. 1280-1300.
-
(1997)
American Psychologist
, vol.52
, Issue.12
, pp. 1280-1300
-
-
Higgins, E.T.1
-
48
-
-
0032089314
-
The Intention to Give up Smoking: Disease Versus Social Dimensions
-
Ho, R. 1998. "The Intention to Give up Smoking: Disease Versus Social Dimensions," Journal of Social Psychology (138), pp. 368-380.
-
(1998)
Journal of Social Psychology
, vol.138
, pp. 368-380
-
-
Ho, R.1
-
49
-
-
4243082092
-
Has the Internet Become Indispensable?
-
Hoffman, D. L., Novak, T. P., and Venkatesh, A. 2004. "Has the Internet Become Indispensable?," Communications of the ACM (47:7), pp. 37-42.
-
(2004)
Communications of the ACM
, vol.47
, Issue.7
, pp. 37-42
-
-
Hoffman, D.L.1
Novak, T.P.2
Venkatesh, A.3
-
50
-
-
0036999868
-
Computer Attack Trends Challenge Internet Security
-
Householder, A., Houle, K., and Dougherty, C. 2002. "Computer Attack Trends Challenge Internet Security," IEEE Computer (Supplement) (35:4), pp. 5-7.
-
(2002)
IEEE Computer (Supplement)
, vol.35
, Issue.4
, pp. 5-7
-
-
Householder, A.1
Houle, K.2
Dougherty, C.3
-
51
-
-
2942715005
-
New Threats This Year
-
Hunter, P. 2004. "New Threats This Year," Computer Fraud & Security (2004:11), pp. 12-13.
-
(2004)
Computer Fraud & Security
, vol.2004
, Issue.11
, pp. 12-13
-
-
Hunter, P.1
-
53
-
-
77956811393
-
Effects of Fear Arousal on Attitude Change: Recent Developments in Theory and Experimental Research
-
L. Berkowitz ed, New York: Academic Press, pp
-
Janis, M. 1967. "Effects of Fear Arousal on Attitude Change: Recent Developments in Theory and Experimental Research," in Advances in Experimental Social Psychology, L. Berkowitz (ed.), New York: Academic Press, pp. 166-224.
-
(1967)
Advances in Experimental Social Psychology
, pp. 166-224
-
-
Janis, M.1
-
54
-
-
0021397380
-
The Health Belief Model: A Decade Later
-
Janz, N. K., and Becker, M. H. 1984. "The Health Belief Model: A Decade Later," Health Education Quarterly (11:1), pp. 1-45.
-
(1984)
Health Education Quarterly
, vol.11
, Issue.1
, pp. 1-45
-
-
Janz, N.K.1
Becker, M.H.2
-
55
-
-
0000125532
-
Prospect Theory: An Analysis of Decision Under Risk
-
Kahneman, D., and Tversky, A. 1979. "Prospect Theory: An Analysis of Decision Under Risk," Econometrica (47:2), pp. 263-291.
-
(1979)
Econometrica
, vol.47
, Issue.2
, pp. 263-291
-
-
Kahneman, D.1
Tversky, A.2
-
56
-
-
0001094004
-
Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs
-
Karahanna, E., Straub, D., and Chervany, N. 1999. "Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs," MIS Quarterly (23:2), pp. 183-213.
-
(1999)
MIS Quarterly
, vol.23
, Issue.2
, pp. 183-213
-
-
Karahanna, E.1
Straub, D.2
Chervany, N.3
-
57
-
-
0038590049
-
Further Thoughts on the Processes of Compliance, Identification, and Internalization
-
J. T. Tedeschi ed, Chicago: Aldine, pp
-
Kelman, H. C. 1974. "Further Thoughts on the Processes of Compliance, Identification, and Internalization," in Perspectives on Social Power, J. T. Tedeschi (ed.), Chicago: Aldine, pp. 126-171.
-
(1974)
Perspectives on Social Power
, pp. 126-171
-
-
Kelman, H.C.1
-
58
-
-
0000886740
-
An Integrated Control Theory Model of Work Motivation
-
Klein, H. J. 1989. "An Integrated Control Theory Model of Work Motivation," Academy of Management Review (14:2), pp. 150-172.
-
(1989)
Academy of Management Review
, vol.14
, Issue.2
, pp. 150-172
-
-
Klein, H.J.1
-
59
-
-
0025455754
-
Emotion, Attention, and the Startle Reflex
-
Lang, P., Bradley, M., and Cuthbert, B. 1990. "Emotion, Attention, and the Startle Reflex," Psychological Review (97), pp. 377-395.
-
(1990)
Psychological Review
, vol.97
, pp. 377-395
-
-
Lang, P.1
Bradley, M.2
Cuthbert, B.3
-
61
-
-
0003418337
-
-
New York: Springer-Verlag
-
Lazarus, R., and Folkman, S. 1984. Stress, Coping, and Adaptation, New York: Springer-Verlag.
-
(1984)
Stress, Coping, and Adaptation
-
-
Lazarus, R.1
Folkman, S.2
-
62
-
-
0000133760
-
Threats to Information Systems: Today's Reality, Yesterday's Understanding
-
Loch, K. D., Carr, H. H., and Warkentin, M. E. 1992. "Threats to Information Systems: Today's Reality, Yesterday's Understanding," MIS Quarterly (16:2), pp. 173-186.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
63
-
-
0000242433
-
Protection Motivation and Self-Efficacy: A Revised Theory of Fear Appeals and Attitude Change
-
Maddus, J. E., and Rogers, R. W. 1983. "Protection Motivation and Self-Efficacy: A Revised Theory of Fear Appeals and Attitude Change," Journal of Experimental Social Psychology (19), pp. 469-479.
-
(1983)
Journal of Experimental Social Psychology
, vol.19
, pp. 469-479
-
-
Maddus, J.E.1
Rogers, R.W.2
-
64
-
-
73449149291
-
Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation
-
Moore, G. C., and Benbasat, I. 1991. "Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation," Information Systems Research (2:3), pp. 192-239.
-
(1991)
Information Systems Research
, vol.2
, Issue.3
, pp. 192-239
-
-
Moore, G.C.1
Benbasat, I.2
-
65
-
-
60649115838
-
Two Years Later, Blaster Worm Still Squirming
-
eWeek.com, December 5
-
Naraine, R. 2005. "Two Years Later, Blaster Worm Still Squirming," eWeek.com, December 5 (http://www.eweek.com/c/a/Security/Two- Years-Later-Blaster-Worm-Still-Squirming/).
-
(2005)
-
-
Naraine, R.1
-
67
-
-
84938050384
-
A Path Analysis of Preventive Health Care Decision Models
-
Oliver, R. L., and Berger, P. K. 1979. "A Path Analysis of Preventive Health Care Decision Models," Journal of Consumer Research (6:2), pp. 113-122.
-
(1979)
Journal of Consumer Research
, vol.6
, Issue.2
, pp. 113-122
-
-
Oliver, R.L.1
Berger, P.K.2
-
69
-
-
0037396112
-
What to Convey in Antismoking Advertisements for Adolescents: The Use of Protection Motivation Theory to Identify Effective Message Themes
-
Pechmann, C., Zhao, G., Goldberg, M. E., and Reibling, E. T. 2003. "What to Convey in Antismoking Advertisements for Adolescents: The Use of Protection Motivation Theory to Identify Effective Message Themes," Journal of Marketing (67), pp. 1-18.
-
(2003)
Journal of Marketing
, vol.67
, pp. 1-18
-
-
Pechmann, C.1
Zhao, G.2
Goldberg, M.E.3
Reibling, E.T.4
-
70
-
-
0002692710
-
Fear: The Potential of an Appeal Neglected by Marketing
-
Ray, M., and Wilkie, W. 1970. "Fear: The Potential of an Appeal Neglected by Marketing," Journal of Marketing (34:1), pp. 54-62.
-
(1970)
Journal of Marketing
, vol.34
, Issue.1
, pp. 54-62
-
-
Ray, M.1
Wilkie, W.2
-
71
-
-
0023304222
-
Effects of Components of Protection-Motivation Theory on Adaptive and Maladaptive Coping with a Health Threat
-
Rippetoe, P. A., and Rogers, R. W. 1987. "Effects of Components of Protection-Motivation Theory on Adaptive and Maladaptive Coping with a Health Threat," Journal of Personality and Social Psychology (52:3), pp. 596-604.
-
(1987)
Journal of Personality and Social Psychology
, vol.52
, Issue.3
, pp. 596-604
-
-
Rippetoe, P.A.1
Rogers, R.W.2
-
74
-
-
0001840352
-
A Protection Motivation Theory of Fear Appeals and Attitude Change
-
Rogers, R. W. 1975. "A Protection Motivation Theory of Fear Appeals and Attitude Change," Journal of Psychology (91), pp. 93-114.
-
(1975)
Journal of Psychology
, vol.91
, pp. 93-114
-
-
Rogers, R.W.1
-
75
-
-
0002247369
-
Cognitive and Physiological Process in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation
-
R. Petty ed, New York: Guilford Press, pp
-
Rogers, R. W. 1983. "Cognitive and Physiological Process in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation," in Social Psychophysiology: A Source Book, R. Petty (ed.), New York: Guilford Press, pp. 153-176.
-
(1983)
Social Psychophysiology: A Source Book
, pp. 153-176
-
-
Rogers, R.W.1
-
76
-
-
84973751588
-
The Health Belief Model and Preventive Health Behavior
-
Rosenstock, I. M. 1974. "The Health Belief Model and Preventive Health Behavior," Health education Monographs (2), pp. 354-386.
-
(1974)
Health education Monographs
, vol.2
, pp. 354-386
-
-
Rosenstock, I.M.1
-
77
-
-
0038780931
-
Pandora's Box: Spyware, Adware, Autoexecution, and NGSCB
-
Schultz, E. 2003. "Pandora's Box: Spyware, Adware, Autoexecution, and NGSCB," Computer & Security (22:5), pp. 366-367.
-
(2003)
Computer & Security (22:5)
, pp. 366-367
-
-
Schultz, E.1
-
78
-
-
0141458141
-
Spyware & Adware: The Risks Facing Businesses
-
Shaw, G. 2003. "Spyware & Adware: The Risks Facing Businesses," Network Security (2003:9), pp. 12-14.
-
(2003)
Network Security
, vol.2003
, Issue.9
, pp. 12-14
-
-
Shaw, G.1
-
79
-
-
15744395148
-
The Ethical and Legal Concerns of Spyware
-
Sipior, J. C., Ward, B. T., and Roselli, G. R. 2005. "The Ethical and Legal Concerns of Spyware," Information Systems Management (22:2), pp. 39-49.
-
(2005)
Information Systems Management
, vol.22
, Issue.2
, pp. 39-49
-
-
Sipior, J.C.1
Ward, B.T.2
Roselli, G.R.3
-
81
-
-
0000981743
-
Information Privacy: Measuring Individuals' Concerns about Organizational Practices
-
Smith, H., Milberg, S., and Burke, S. 1996. "Information Privacy: Measuring Individuals' Concerns about Organizational Practices," MIS Quarterly (20:2), pp. 167-196.
-
(1996)
MIS Quarterly
, vol.20
, Issue.2
, pp. 167-196
-
-
Smith, H.1
Milberg, S.2
Burke, S.3
-
83
-
-
33750414789
-
Integrating Theories of Motivation
-
Steel, P., and Konig, C. J. 2006. "Integrating Theories of Motivation," A cademy of Management Review (31:4), pp. 889-913.
-
(2006)
A cademy of Management Review
, vol.31
, Issue.4
, pp. 889-913
-
-
Steel, P.1
Konig, C.J.2
-
84
-
-
3142727216
-
The Future of Work Motivation Theory
-
Steers, R. M., Mowday, R. T., and Shapiro, D. L. 2004. "The Future of Work Motivation Theory," Academy of Management Review (29:3), pp. 379-387.
-
(2004)
Academy of Management Review
, vol.29
, Issue.3
, pp. 379-387
-
-
Steers, R.M.1
Mowday, R.T.2
Shapiro, D.L.3
-
85
-
-
0000920697
-
A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes across Several Types of Organizations
-
Stone, E., Gardner, D., Gueutal, H., and McClure, S. 1983. "A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes across Several Types of Organizations," Journal of Applied Psychology (68:3), pp. 459-468.
-
(1983)
Journal of Applied Psychology
, vol.68
, Issue.3
, pp. 459-468
-
-
Stone, E.1
Gardner, D.2
Gueutal, H.3
McClure, S.4
-
86
-
-
0000280419
-
Effective IS Security: An Empirical Study
-
Straub, D. 1990. "Effective IS Security: An Empirical Study," Information Systems Research (1:3), pp. 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.1
-
87
-
-
0002699431
-
Discovering and Disciplining Computer Abuse in Organizations: A Field Study
-
Straub, D., and Nance, W. 1990. "Discovering and Disciplining Computer Abuse in Organizations: A Field Study," MIS Quarterly (14:1), pp. 45-62.
-
(1990)
MIS Quarterly
, vol.14
, Issue.1
, pp. 45-62
-
-
Straub, D.1
Nance, W.2
-
88
-
-
0001133137
-
Coping with Systems Risk: Security Planning Models for Management Decision Making
-
Straub, D., and Welke, R. 1998. "Coping with Systems Risk: Security Planning Models for Management Decision Making," MIS Quarterly (22:4), pp. 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.1
Welke, R.2
-
89
-
-
0346938412
-
Prefrontal Brain Asymmetry: A Biological Substrate of the Behavioral Approach and Inhibition Systems
-
Sutton, S. K., and Davidson, R. 1997. "Prefrontal Brain Asymmetry: A Biological Substrate of the Behavioral Approach and Inhibition Systems," Psychological Science (8:3), pp. 204-210.
-
(1997)
Psychological Science
, vol.8
, Issue.3
, pp. 204-210
-
-
Sutton, S.K.1
Davidson, R.2
-
90
-
-
38249004423
-
Protection Motivation Theory: An Extension of Fear Appeals Theory in Communication
-
Tanner, J. F., Day, E., and Crask, M. R. 1989. "Protection Motivation Theory: an Extension of Fear Appeals Theory in Communication," Journal of Business Research (19), pp. 267-276.
-
(1989)
Journal of Business Research
, vol.19
, pp. 267-276
-
-
Tanner, J.F.1
Day, E.2
Crask, M.R.3
-
91
-
-
0002735809
-
The Protection Motivation Model: A Normative Model of Fear Appeals
-
Tanner, J. F., Hunt, J. B., and Eppright, D. R. 1991. "The Protection Motivation Model: a Normative Model of Fear Appeals," Journal of Marketing (55), pp. 36-45.
-
(1991)
Journal of Marketing
, vol.55
, pp. 36-45
-
-
Tanner, J.F.1
Hunt, J.B.2
Eppright, D.R.3
-
92
-
-
73549120882
-
Understanding Information Technology Usage: A Test of Competing Models
-
Taylor, S., and Todd, P. A. 1995. "Understanding Information Technology Usage: A Test of Competing Models," Information Systems Research (6:2), pp. 144-177.
-
(1995)
Information Systems Research
, vol.6
, Issue.2
, pp. 144-177
-
-
Taylor, S.1
Todd, P.A.2
-
94
-
-
0040176028
-
The Past Explains the Present: Emotional Adaptions and the Structure of Ancestral Environments
-
Tooby, J., and Cosmides, L. 1990. "The Past Explains the Present: Emotional Adaptions and the Structure of Ancestral Environments," Ethology and Sociobiology (11), pp. 375-424.
-
(1990)
Ethology and Sociobiology
, vol.11
, pp. 375-424
-
-
Tooby, J.1
Cosmides, L.2
-
95
-
-
0016264378
-
Judgment under Uncertainty: Heuristics and Biases
-
Tversky, A., and Kahneman, D. 1974. "Judgment under Uncertainty: Heuristics and Biases," Science (185:4157), pp. 1124-1131.
-
(1974)
Science
, vol.185
, Issue.4157
, pp. 1124-1131
-
-
Tversky, A.1
Kahneman, D.2
-
96
-
-
31744450082
-
Advances in Prospect Theory: Cumulative Representation of Uncertainty
-
Tversky, A., and Kahneman, D. 1992. "Advances in Prospect Theory: Cumulative Representation of Uncertainty," Journal of Risk and Uncertainty (5), pp. 297-323.
-
(1992)
Journal of Risk and Uncertainty
, vol.5
, pp. 297-323
-
-
Tversky, A.1
Kahneman, D.2
-
97
-
-
9744271731
-
User Acceptance of Hedonic Information Systems
-
van der Heijden, H. 2004. "User Acceptance of Hedonic Information Systems," MIS Quarterly (28:4), pp. 695-704.
-
(2004)
MIS Quarterly
, vol.28
, Issue.4
, pp. 695-704
-
-
van der Heijden, H.1
-
98
-
-
0034559541
-
Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model
-
Venkatesh, V. 2000. "Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model," Information Systems Research (11:4), pp. 342-365.
-
(2000)
Information Systems Research
, vol.11
, Issue.4
, pp. 342-365
-
-
Venkatesh, V.1
-
99
-
-
0002888544
-
A Longitudinal Investigation of Personal Computers in Homes: Adoption Determinants and Emerging Challenges
-
Venkatesh, V., and Brown, S. 2001. "A Longitudinal Investigation of Personal Computers in Homes: Adoption Determinants and Emerging Challenges," MIS Quarterly (25:1), pp. 71-102.
-
(2001)
MIS Quarterly
, vol.25
, Issue.1
, pp. 71-102
-
-
Venkatesh, V.1
Brown, S.2
-
100
-
-
0033872521
-
A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies
-
Venkatesh, V., and Davis, F. D. 2000. "A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies," Management Science (46:2), pp. 186-204.
-
(2000)
Management Science
, vol.46
, Issue.2
, pp. 186-204
-
-
Venkatesh, V.1
Davis, F.D.2
-
101
-
-
1542382496
-
User Acceptance of Information Technology: Toward a Unified View
-
Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D. 2003. "User Acceptance of Information Technology: Toward a Unified View," MIS Quarterly (27:3), pp. 425-478.
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.G.2
Davis, G.B.3
Davis, F.D.4
-
103
-
-
0027633395
-
Testing Four Competing Theories of Health-Protective Behavior
-
Weinstein, N. D. 1993. "Testing Four Competing Theories of Health-Protective Behavior," Health Psychology (12:4), pp. 324-333.
-
(1993)
Health Psychology
, vol.12
, Issue.4
, pp. 324-333
-
-
Weinstein, N.D.1
-
104
-
-
0033768584
-
Perceived Probability, Perceived Severity, and Health-Protective Behavior
-
Weinstein, N. D. 2000. "Perceived Probability, Perceived Severity, and Health-Protective Behavior," Health Psychology (19:1), pp. 65-74.
-
(2000)
Health Psychology
, vol.19
, Issue.1
, pp. 65-74
-
-
Weinstein, N.D.1
-
106
-
-
0001268563
-
What Constitutes a Theoretical Contribution?
-
Whetten, D. 1989. "What Constitutes a Theoretical Contribution?," Academy of Management Review (14:4), pp. 190-195.
-
(1989)
Academy of Management Review
, vol.14
, Issue.4
, pp. 190-195
-
-
Whetten, D.1
-
108
-
-
33747733159
-
Changes in Financial Risk Tolerance, 1983-2001
-
Yao, R., Hanna, S. D., and Lindamood, S. 2004. "Changes in Financial Risk Tolerance, 1983-2001," Financial Services Review (13:4), pp. 249-266.
-
(2004)
Financial Services Review
, vol.13
, Issue.4
, pp. 249-266
-
-
Yao, R.1
Hanna, S.D.2
Lindamood, S.3
|