-
1
-
-
33749564877
-
The health belief model
-
Conner M., and Norman P. (Eds), Open University Press, UK
-
Abraham C., and Sheeran P. The health belief model. In: Conner M., and Norman P. (Eds). Predicting Health Behaviour, Ch. 2 (2005), Open University Press, UK
-
(2005)
Predicting Health Behaviour, Ch. 2
-
-
Abraham, C.1
Sheeran, P.2
-
2
-
-
9144256095
-
Predictors of health behaviors in college students
-
Ah D.V., Ebert S., Ngamvitroj A., Park N., and Kang D.-H. Predictors of health behaviors in college students. Journal of Advanced Nursing 48 5 (2004)
-
(2004)
Journal of Advanced Nursing
, vol.48
, Issue.5
-
-
Ah, D.V.1
Ebert, S.2
Ngamvitroj, A.3
Park, N.4
Kang, D.-H.5
-
5
-
-
0017472917
-
Self-efficacy: towards a unifying theory of behavioral change
-
Bandura A. Self-efficacy: towards a unifying theory of behavioral change. Psychological Review 84 2 (1977)
-
(1977)
Psychological Review
, vol.84
, Issue.2
-
-
Bandura, A.1
-
6
-
-
0021415884
-
Instrument development for health belief model constructs
-
Champion V.L. Instrument development for health belief model constructs. Advances in Nursing Science 6 3 (1984)
-
(1984)
Advances in Nursing Science
, vol.6
, Issue.3
-
-
Champion, V.L.1
-
7
-
-
61349159889
-
Perceptions of information security in the workplace: linking information security climate to compliant behavior
-
Chan M., Woon I., and Kankanhalli A. Perceptions of information security in the workplace: linking information security climate to compliant behavior. Journal of Information Privacy and Security 1 3 (2005)
-
(2005)
Journal of Information Privacy and Security
, vol.1
, Issue.3
-
-
Chan, M.1
Woon, I.2
Kankanhalli, A.3
-
9
-
-
0001878819
-
A paradigm for developing better measures of marketing constructs
-
Churchill Jr. G.A. A paradigm for developing better measures of marketing constructs. Journal of Marketing Research 6 1 (1979)
-
(1979)
Journal of Marketing Research
, vol.6
, Issue.1
-
-
Churchill Jr., G.A.1
-
10
-
-
0003519438
-
-
L/ Erlbaum Associates, Mahwah, N.J.
-
Cohen J., Cohen P., West S.G., and Aiken L.S. Applied Multiple Regression/Correlation Analysis for the Behavioral Sciences. 3rd ed. (2003), L/ Erlbaum Associates, Mahwah, N.J.
-
(2003)
Applied Multiple Regression/Correlation Analysis for the Behavioral Sciences. 3rd ed.
-
-
Cohen, J.1
Cohen, P.2
West, S.G.3
Aiken, L.S.4
-
11
-
-
21344456569
-
Application of social cognitive theory to training for computer skills
-
Compeau D.R., and Higgins C. Application of social cognitive theory to training for computer skills. Information Systems Research 6 2 (1995)
-
(1995)
Information Systems Research
, vol.6
, Issue.2
-
-
Compeau, D.R.1
Higgins, C.2
-
12
-
-
49149116092
-
Computer self-efficacy: development of a measure and initial test
-
Compeau D.R., and Higgins C. Computer self-efficacy: development of a measure and initial test. MIS Quarterly 19 2 (1995)
-
(1995)
MIS Quarterly
, vol.19
, Issue.2
-
-
Compeau, D.R.1
Higgins, C.2
-
13
-
-
42449156682
-
Predicting health behaviour: a social cognition approach
-
Conner M., and Norman P. (Eds), Open University Press
-
Conner M., and Norman P. Predicting health behaviour: a social cognition approach. In: Conner M., and Norman P. (Eds). Predicting Health Behaviour, Ch. 1 (2005), Open University Press
-
(2005)
Predicting Health Behaviour, Ch. 1
-
-
Conner, M.1
Norman, P.2
-
14
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
Davis F.D. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly 13 3 (1989)
-
(1989)
MIS Quarterly
, vol.13
, Issue.3
-
-
Davis, F.D.1
-
15
-
-
49049114397
-
The centrality of awareness in the formation of user behavioral intention toward protective information technologies
-
Dinev T., and Hu Q. The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems 8 7 (2007)
-
(2007)
Journal of the Association for Information Systems
, vol.8
, Issue.7
-
-
Dinev, T.1
Hu, Q.2
-
18
-
-
3242808612
-
-
Computer Security Institute (July 2006). Accessed 9 Nov 2006 at http://www.gocsi.com/forms/fbi/csi_fbi_survey.jhtml
-
Gordon L.A., Loeb M.P., Lucyshyn W., and Richardson R. CSI/FBI Computer Crime and Security Survey (2006), Computer Security Institute. http://www.gocsi.com/forms/fbi/csi_fbi_survey.jhtml (July 2006). Accessed 9 Nov 2006 at http://www.gocsi.com/forms/fbi/csi_fbi_survey.jhtml
-
(2006)
CSI/FBI Computer Crime and Security Survey
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
19
-
-
15744391114
-
-
National Institute of Standards and Technology Special Publication 800-61. Accessed 29 Sept 2006 at http://csrc.nist.gov/publications/nistpubs/800-61/sp800-61.pdf
-
Grance T., Kent K., and Kim B. Computer Security Incident Handling Guide (Jan 2004), National Institute of Standards and Technology. http://csrc.nist.gov/publications/nistpubs/800-61/sp800-61.pdf Special Publication 800-61. Accessed 29 Sept 2006 at http://csrc.nist.gov/publications/nistpubs/800-61/sp800-61.pdf
-
(2004)
Computer Security Incident Handling Guide
-
-
Grance, T.1
Kent, K.2
Kim, B.3
-
20
-
-
80053465036
-
Migration of the Health Belief Model (HBM): Effects of psychosocial and migrant network characteristics on emigration intentions in five countries in West Africa and the Mediterranean Region
-
Groenewold G., Bruijn B., and Bilsborrow R. Migration of the Health Belief Model (HBM): Effects of psychosocial and migrant network characteristics on emigration intentions in five countries in West Africa and the Mediterranean Region. The Population Association of America 2006 Annual Meeting, March 30-April 1, Los Angeles, CA (2006)
-
(2006)
The Population Association of America 2006 Annual Meeting, March 30-April 1, Los Angeles, CA
-
-
Groenewold, G.1
Bruijn, B.2
Bilsborrow, R.3
-
21
-
-
0003506109
-
-
Prentice-Hall, Englewood Cliffs, NJ
-
Hair J.F., Anderson R.E., Tatham R.L., and Black W.C. Multivariate Data Analysis. 5th ed (1998), Prentice-Hall, Englewood Cliffs, NJ
-
(1998)
Multivariate Data Analysis. 5th ed
-
-
Hair, J.F.1
Anderson, R.E.2
Tatham, R.L.3
Black, W.C.4
-
22
-
-
61349103034
-
The effects of piracy in foreign markets on U.S. business
-
Hedrick A.M. The effects of piracy in foreign markets on U.S. business. Journal of International Business Studies 21 4 (1990)
-
(1990)
Journal of International Business Studies
, vol.21
, Issue.4
-
-
Hedrick, A.M.1
-
23
-
-
0003618132
-
Interaction effects in multiple regression
-
Sage Publications, Thousand Oaks, CA
-
Jaccard J., Turrisi R., and Wan C.K. Interaction effects in multiple regression. Series: Quantitative Applications in the Social Sciences, No. 72 (1990), Sage Publications, Thousand Oaks, CA
-
(1990)
Series: Quantitative Applications in the Social Sciences, No. 72
-
-
Jaccard, J.1
Turrisi, R.2
Wan, C.K.3
-
25
-
-
0032330901
-
The antecedents of preventive health care behavior: an empirical study
-
Jayanti R.K., and Burns A.C. The antecedents of preventive health care behavior: an empirical study. Academy of Marketing Science Journal 26 1 (1998)
-
(1998)
Academy of Marketing Science Journal
, vol.26
, Issue.1
-
-
Jayanti, R.K.1
Burns, A.C.2
-
30
-
-
0033622371
-
Prediction and intervention in health-related behavior: a meta-analytic review of protection motivation theory
-
Milne S., Sheeran P., and Orbell S. Prediction and intervention in health-related behavior: a meta-analytic review of protection motivation theory. Journal of Applied Social Psychology 30 1 (2000)
-
(2000)
Journal of Applied Social Psychology
, vol.30
, Issue.1
-
-
Milne, S.1
Sheeran, P.2
Orbell, S.3
-
31
-
-
73449149291
-
Development of an instrument to measure the perceptions of adopting an information technology innovation
-
Moore G.C., and Benbasat I. Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research 2 (1991)
-
(1991)
Information Systems Research
, vol.2
-
-
Moore, G.C.1
Benbasat, I.2
-
35
-
-
34249671060
-
Operations security awareness: the mind has no firewall
-
Rhodes K. Operations security awareness: the mind has no firewall. Computer Security Journal 18 3 (2001)
-
(2001)
Computer Security Journal
, vol.18
, Issue.3
-
-
Rhodes, K.1
-
37
-
-
0039416218
-
Closing the knowledge-behavior gap in health promotion: the mediating role of self-efficacy
-
Rimal R.N. Closing the knowledge-behavior gap in health promotion: the mediating role of self-efficacy. Health Communication 12 3 (2000)
-
(2000)
Health Communication
, vol.12
, Issue.3
-
-
Rimal, R.N.1
-
38
-
-
33645905380
-
-
Accessed 19 September 2006 at http://www.cert.org/homeusers/HomeComputerSecurity/
-
Rogers L. Home Computer Security, CERT Coordination Centre (2002). http://www.cert.org/homeusers/HomeComputerSecurity/ Accessed 19 September 2006 at http://www.cert.org/homeusers/HomeComputerSecurity/
-
(2002)
Home Computer Security, CERT Coordination Centre
-
-
Rogers, L.1
-
40
-
-
84973751588
-
The health belief model and preventive health behavior
-
Rosenstock I.M. The health belief model and preventive health behavior. Health Education Monographs 2 (1974)
-
(1974)
Health Education Monographs
, vol.2
-
-
Rosenstock, I.M.1
-
45
-
-
55249123249
-
Validating instruments in MIS research
-
Straub D.W. Validating instruments in MIS research. MIS Quarterly 13 2 (1989)
-
(1989)
MIS Quarterly
, vol.13
, Issue.2
-
-
Straub, D.W.1
-
46
-
-
0001133137
-
Coping with systems risk: security planning models for management decision making
-
Straub D.W., and Welke R.J. Coping with systems risk: security planning models for management decision making. MIS Quarterly 22 4 (1998)
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
-
-
Straub, D.W.1
Welke, R.J.2
-
49
-
-
0020119801
-
Beyond expectancy theory: an integrative motivational model from health care
-
Walker L.R., and Thomas K.W. Beyond expectancy theory: an integrative motivational model from health care. Academy of Management Review 7 2 (1982)
-
(1982)
Academy of Management Review
, vol.7
, Issue.2
-
-
Walker, L.R.1
Thomas, K.W.2
-
50
-
-
0034296795
-
A meta-analysis of fear appeals: implications for effective public health campaigns
-
Witte K., and Allen M. A meta-analysis of fear appeals: implications for effective public health campaigns. Health Education Behavior 27 5 (2000)
-
(2000)
Health Education Behavior
, vol.27
, Issue.5
-
-
Witte, K.1
Allen, M.2
-
51
-
-
84869780575
-
A protection motivation theory approach to home wireless security
-
Woon I.M.Y., Tan G.W., and Low R.T. A protection motivation theory approach to home wireless security. Proceedings of the Twenty-Sixth International Conference on Information Systems, Las Vegas, Nevada, USA (2005)
-
(2005)
Proceedings of the Twenty-Sixth International Conference on Information Systems, Las Vegas, Nevada, USA
-
-
Woon, I.M.Y.1
Tan, G.W.2
Low, R.T.3
-
52
-
-
34548477450
-
Network externalities, layered protection and IT security risk management
-
Yue W.T., Cakanyilidrim M., Ryu Y.U., and Liu D. Network externalities, layered protection and IT security risk management. Decision Support Systems 44 (2007)
-
(2007)
Decision Support Systems
, vol.44
-
-
Yue, W.T.1
Cakanyilidrim, M.2
Ryu, Y.U.3
Liu, D.4
|