-
2
-
-
0003888032
-
-
Prentice-Hall, Englewood Cliffs, NJ
-
Ajzen, I. and Fishbein, M. (1980), Understanding Attitudes and Predicting Social Behavior, Prentice-Hall, Englewood Cliffs, NJ.
-
(1980)
Understanding Attitudes and Predicting Social Behavior
-
-
Ajzen, I.1
Fishbein, M.2
-
3
-
-
70349109546
-
-
AOL/NCSA (2005), AOL/NCSA online safety study, available at: www.staysafeonline.info/pdf/safety_study_2005.pdf
-
AOL/NCSA (2005), "AOL/NCSA online safety study", available at: www.staysafeonline.info/pdf/safety_study_2005.pdf
-
-
-
-
4
-
-
58149474368
-
-
USA Today Online, available at
-
Baig, E.C. (2004), "Keep Spies From Skulking into Your PC", USA Today Online, available at: www.usatoday.com/money/industries/ technology/2004-01-22-spy_x.htm
-
(2004)
Keep Spies From Skulking into Your PC
-
-
Baig, E.C.1
-
5
-
-
84986364572
-
The effects of health threat seriousness and personal efficacy upon intentions and behaviour
-
Beck, K.H. and Lund, A.K. (1981), "The effects of health threat seriousness and personal efficacy upon intentions and behaviour", Journal of Applied Social Psychology, Vol. 11 No. 5, pp. 401-15.
-
(1981)
Journal of Applied Social Psychology
, vol.11
, Issue.5
, pp. 401-415
-
-
Beck, K.H.1
Lund, A.K.2
-
6
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
Davis, F.D. (1989), "Perceived usefulness, perceived ease of use, and user acceptance of information technology", MIS Quarterly, Vol. 13 No. 3, pp. 319-40.
-
(1989)
MIS Quarterly
, vol.13
, Issue.3
, pp. 319-340
-
-
Davis, F.D.1
-
7
-
-
70349115522
-
-
Davis, J.P. (2007), Spyware protection, Journal of Accountancy 203 No. 4. Floyd, D.L., Prentice-Dunn, S. and Rogers, R.W. (2000), A meta-analysis of research on protection motivation theory, Journal of Applied Social Psychology, 30 No. 2, pp. 407-29.
-
Davis, J.P. (2007), "Spyware protection", Journal of Accountancy Vol. 203 No. 4. Floyd, D.L., Prentice-Dunn, S. and Rogers, R.W. (2000), "A meta-analysis of research on protection motivation theory", Journal of Applied Social Psychology, Vol. 30 No. 2, pp. 407-29.
-
-
-
-
8
-
-
0003506109
-
-
6th ed, Prentice-Hall PTR, Upper Saddle River, NJ, p, v
-
Hair, J.F., Tatham, R.L. and Anderson, R.E. (2002), Multivariate Data Analysis, 6th ed., Prentice-Hall PTR, Upper Saddle River, NJ, p. 1 v.
-
(2002)
Multivariate Data Analysis
, pp. 1
-
-
Hair, J.F.1
Tatham, R.L.2
Anderson, R.E.3
-
9
-
-
0003987805
-
-
MIT Press, Cambridge, MA
-
Hand, D., Mannila, H. and Smyth, P. (2001), Principles of Data Mining, MIT Press, Cambridge, MA.
-
(2001)
Principles of Data Mining
-
-
Hand, D.1
Mannila, H.2
Smyth, P.3
-
10
-
-
0032089314
-
The intention to give up smoking: Disease versus social dimensions
-
Ho, R. (1998), "The intention to give up smoking: Disease versus social dimensions", Journal of Social Psychology, Vol. 138 No. 3, pp. 368-80.
-
(1998)
Journal of Social Psychology
, vol.138
, Issue.3
, pp. 368-380
-
-
Ho, R.1
-
11
-
-
23344444212
-
Is spyware an internet nuisance or public menace?
-
Hu, Q. and Dinev, T. (2005), "Is spyware an internet nuisance or public menace?", Communications of the ACM, Vol. 48 No. 8, pp. 61-6.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 61-66
-
-
Hu, Q.1
Dinev, T.2
-
12
-
-
23344453209
-
Investigating factors affecting the adoption of anti-spyware systems
-
Lee, Y. and Kozar, K.A. (2005), "Investigating factors affecting the adoption of anti-spyware systems", Communications of the ACM, Vol. 48 No. 8, pp. 72-7.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 72-77
-
-
Lee, Y.1
Kozar, K.A.2
-
13
-
-
70349152526
-
A holistic approach for managing spyware
-
Luo, X. (2006), "A holistic approach for managing spyware", Information Systems Security, Vol. 15 No. 2.
-
(2006)
Information Systems Security
, vol.15
, Issue.2
-
-
Luo, X.1
-
14
-
-
0000242433
-
Protection motivation theory and self efficacy: A revised theory of fear appeals and attitude change
-
Maddux, J.E. and Stanley, M. (1983), "Protection motivation theory and self efficacy: A revised theory of fear appeals and attitude change", Journal of Experimental Social Psychology, Vol. 19, pp. 469-79.
-
(1983)
Journal of Experimental Social Psychology
, vol.19
, pp. 469-479
-
-
Maddux, J.E.1
Stanley, M.2
-
15
-
-
10844290435
-
Consumers' protection of online privacy and identity
-
Milne, G.R., Rohm, A.J. and Bahl, S. (2004), "Consumers' protection of online privacy and identity", The Journal of Consumer Affairs, Vol. 38 No. 2, pp. 217-32.
-
(2004)
The Journal of Consumer Affairs
, vol.38
, Issue.2
, pp. 217-232
-
-
Milne, G.R.1
Rohm, A.J.2
Bahl, S.3
-
16
-
-
0033622371
-
Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory
-
Milne, S., Sheeran, P. and Orbell, S. (2000), "Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory", Journal of Applied Social Psychology Vol. 30 No. 1, pp. 106-43.
-
(2000)
Journal of Applied Social Psychology
, vol.30
, Issue.1
, pp. 106-143
-
-
Milne, S.1
Sheeran, P.2
Orbell, S.3
-
17
-
-
0033653826
-
Protection motivation and risk communication
-
Neuwirth, K., Dunwoody, S. and Griffin, R.J. (2000), "Protection motivation and risk communication", Risk Analysis, Vol. 20 No. 5, pp. 721-34.
-
(2000)
Risk Analysis
, vol.20
, Issue.5
, pp. 721-734
-
-
Neuwirth, K.1
Dunwoody, S.2
Griffin, R.J.3
-
18
-
-
70349110823
-
-
Nunnally, J. (1978), Psychometric Theory, 2nd ed., McGraw-Hill, New York, NY. Poston, R., Stafford, T.F. and Hennington, A. (2005), Spyware: A view from the (online) street, Communications of the ACM, 48 No. 8, pp. 96-9.
-
Nunnally, J. (1978), Psychometric Theory, 2nd ed., McGraw-Hill, New York, NY. Poston, R., Stafford, T.F. and Hennington, A. (2005), "Spyware: A view from the (online) street", Communications of the ACM, Vol. 48 No. 8, pp. 96-9.
-
-
-
-
19
-
-
0023304222
-
Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat
-
Rippetoe, S. and Rogers, R.W. (1987), "Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat", Journal of Personality and Social Psychology, Vol. 52 No. 3, pp. 596-604.
-
(1987)
Journal of Personality and Social Psychology
, vol.52
, Issue.3
, pp. 596-604
-
-
Rippetoe, S.1
Rogers, R.W.2
-
20
-
-
0001840352
-
A protection motivation theory of fear appeals and attitude change
-
Rogers, R.W. (1975), "A protection motivation theory of fear appeals and attitude change", Journal of Psychology, Vol. 91, pp. 93-114.
-
(1975)
Journal of Psychology
, vol.91
, pp. 93-114
-
-
Rogers, R.W.1
-
21
-
-
0002247369
-
Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation theory
-
Cacioppo, J. and Petty, R, Eds, Guilford, New York, NY, pp
-
Rogers, R.W. (1983), "Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation theory", in Cacioppo, J. and Petty, R. (Eds), Social Psychophysiology, Guilford, New York, NY, pp. 153-76.
-
(1983)
Social Psychophysiology
, pp. 153-176
-
-
Rogers, R.W.1
-
22
-
-
23344441723
-
Spyware: A little knowledge is a wonderful thing
-
Schmidt, M.B. and Arnett, K.P. (2005), "Spyware: A little knowledge is a wonderful thing", Communications of the ACM, Vol. 48 No. 8, pp. 67-70.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 67-70
-
-
Schmidt, M.B.1
Arnett, K.P.2
-
23
-
-
0000560302
-
Risk-reduction processes in repetitive consumer behaviour
-
Sheth, J.N. and Venkatesan, M. (1968), "Risk-reduction processes in repetitive consumer behaviour", Journal of Marketing Research, Vol. 5 No. 3, pp. 307-10.
-
(1968)
Journal of Marketing Research
, vol.5
, Issue.3
, pp. 307-310
-
-
Sheth, J.N.1
Venkatesan, M.2
-
25
-
-
0002735809
-
The protection motivation model: A normative model of fear appeals
-
Tanner, J.F., Hunt, J.B. and Eppright, D.R. (1991), "The protection motivation model: A normative model of fear appeals", Journal of Marketing, Vol. 55, pp. 36-45.
-
(1991)
Journal of Marketing
, vol.55
, pp. 36-45
-
-
Tanner, J.F.1
Hunt, J.B.2
Eppright, D.R.3
-
26
-
-
23344447680
-
Why spyware poses multiple threats to security
-
Thompson, R. (2005), "Why spyware poses multiple threats to security", Communications of the ACM., Vol. 48 No. 8, pp. 41-3.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 41-43
-
-
Thompson, R.1
-
27
-
-
23344441842
-
A framework for spyware assessment
-
Warkentin, M., Luo, X. and Templeton, G.F. (2005), "A framework for spyware assessment", Communications of the ACM., Vol. 48 No. 8, pp. 79-84.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 79-84
-
-
Warkentin, M.1
Luo, X.2
Templeton, G.F.3
-
28
-
-
84869780575
-
A protection motivation theory approach to home wireless security
-
paper presented at, Las Vegas, NV
-
Woon, I.M.Y., Tan, G.W. and Low, R.T. (2005), "A protection motivation theory approach to home wireless security", paper presented at 26th International Conference on Information Systems, Las Vegas, NV.
-
(2005)
26th International Conference on Information Systems
-
-
Woon, I.M.Y.1
Tan, G.W.2
Low, R.T.3
|