메뉴 건너뛰기




Volumn 17, Issue 3, 2009, Pages 276-289

Consumer motivations in taking action against spyware: An empirical investigation

Author keywords

Computer software; Consumer behaviour; Data security; Motivation (psychology)

Indexed keywords

ANTI-SPYWARES; BEHAVIORAL CHANGES; BUSINESS MANAGERS; CONSUMER BEHAVIOUR; DATA SECURITY; DEPENDENT VARIABLES; DESIGN/METHODOLOGY/APPROACH; EASE OF USE; EMPIRICAL FINDINGS; EMPIRICAL INVESTIGATION; END-USERS; FACTOR ANALYSIS; INFORMATION SECURITY PROFESSIONALS; IS ADOPTION; IT ADOPTION; LOGISTIC REGRESSIONS; MOTIVATION (PSYCHOLOGY); ONLINE SURVEYS; PROTECTION MOTIVATION THEORY; RESEARCH MODELS; SECURITY MECHANISM; SECURITY THREATS; SELF EFFICACY; SPY-WARE; SURVEY INSTRUMENTS; TECHNOLOGY ACCEPTANCE MODEL; TECHNOLOGY ADOPTION; THEORY OF PLANNED BEHAVIOR; THEORY OF REASONED ACTION;

EID: 70349151365     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220910978112     Document Type: Review
Times cited : (60)

References (28)
  • 3
    • 70349109546 scopus 로고    scopus 로고
    • AOL/NCSA (2005), AOL/NCSA online safety study, available at: www.staysafeonline.info/pdf/safety_study_2005.pdf
    • AOL/NCSA (2005), "AOL/NCSA online safety study", available at: www.staysafeonline.info/pdf/safety_study_2005.pdf
  • 4
    • 58149474368 scopus 로고    scopus 로고
    • USA Today Online, available at
    • Baig, E.C. (2004), "Keep Spies From Skulking into Your PC", USA Today Online, available at: www.usatoday.com/money/industries/ technology/2004-01-22-spy_x.htm
    • (2004) Keep Spies From Skulking into Your PC
    • Baig, E.C.1
  • 5
    • 84986364572 scopus 로고
    • The effects of health threat seriousness and personal efficacy upon intentions and behaviour
    • Beck, K.H. and Lund, A.K. (1981), "The effects of health threat seriousness and personal efficacy upon intentions and behaviour", Journal of Applied Social Psychology, Vol. 11 No. 5, pp. 401-15.
    • (1981) Journal of Applied Social Psychology , vol.11 , Issue.5 , pp. 401-415
    • Beck, K.H.1    Lund, A.K.2
  • 6
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    • Davis, F.D. (1989), "Perceived usefulness, perceived ease of use, and user acceptance of information technology", MIS Quarterly, Vol. 13 No. 3, pp. 319-40.
    • (1989) MIS Quarterly , vol.13 , Issue.3 , pp. 319-340
    • Davis, F.D.1
  • 7
    • 70349115522 scopus 로고    scopus 로고
    • Davis, J.P. (2007), Spyware protection, Journal of Accountancy 203 No. 4. Floyd, D.L., Prentice-Dunn, S. and Rogers, R.W. (2000), A meta-analysis of research on protection motivation theory, Journal of Applied Social Psychology, 30 No. 2, pp. 407-29.
    • Davis, J.P. (2007), "Spyware protection", Journal of Accountancy Vol. 203 No. 4. Floyd, D.L., Prentice-Dunn, S. and Rogers, R.W. (2000), "A meta-analysis of research on protection motivation theory", Journal of Applied Social Psychology, Vol. 30 No. 2, pp. 407-29.
  • 10
    • 0032089314 scopus 로고    scopus 로고
    • The intention to give up smoking: Disease versus social dimensions
    • Ho, R. (1998), "The intention to give up smoking: Disease versus social dimensions", Journal of Social Psychology, Vol. 138 No. 3, pp. 368-80.
    • (1998) Journal of Social Psychology , vol.138 , Issue.3 , pp. 368-380
    • Ho, R.1
  • 11
    • 23344444212 scopus 로고    scopus 로고
    • Is spyware an internet nuisance or public menace?
    • Hu, Q. and Dinev, T. (2005), "Is spyware an internet nuisance or public menace?", Communications of the ACM, Vol. 48 No. 8, pp. 61-6.
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 61-66
    • Hu, Q.1    Dinev, T.2
  • 12
    • 23344453209 scopus 로고    scopus 로고
    • Investigating factors affecting the adoption of anti-spyware systems
    • Lee, Y. and Kozar, K.A. (2005), "Investigating factors affecting the adoption of anti-spyware systems", Communications of the ACM, Vol. 48 No. 8, pp. 72-7.
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 72-77
    • Lee, Y.1    Kozar, K.A.2
  • 13
    • 70349152526 scopus 로고    scopus 로고
    • A holistic approach for managing spyware
    • Luo, X. (2006), "A holistic approach for managing spyware", Information Systems Security, Vol. 15 No. 2.
    • (2006) Information Systems Security , vol.15 , Issue.2
    • Luo, X.1
  • 14
    • 0000242433 scopus 로고
    • Protection motivation theory and self efficacy: A revised theory of fear appeals and attitude change
    • Maddux, J.E. and Stanley, M. (1983), "Protection motivation theory and self efficacy: A revised theory of fear appeals and attitude change", Journal of Experimental Social Psychology, Vol. 19, pp. 469-79.
    • (1983) Journal of Experimental Social Psychology , vol.19 , pp. 469-479
    • Maddux, J.E.1    Stanley, M.2
  • 15
    • 10844290435 scopus 로고    scopus 로고
    • Consumers' protection of online privacy and identity
    • Milne, G.R., Rohm, A.J. and Bahl, S. (2004), "Consumers' protection of online privacy and identity", The Journal of Consumer Affairs, Vol. 38 No. 2, pp. 217-32.
    • (2004) The Journal of Consumer Affairs , vol.38 , Issue.2 , pp. 217-232
    • Milne, G.R.1    Rohm, A.J.2    Bahl, S.3
  • 16
    • 0033622371 scopus 로고    scopus 로고
    • Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory
    • Milne, S., Sheeran, P. and Orbell, S. (2000), "Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory", Journal of Applied Social Psychology Vol. 30 No. 1, pp. 106-43.
    • (2000) Journal of Applied Social Psychology , vol.30 , Issue.1 , pp. 106-143
    • Milne, S.1    Sheeran, P.2    Orbell, S.3
  • 17
    • 0033653826 scopus 로고    scopus 로고
    • Protection motivation and risk communication
    • Neuwirth, K., Dunwoody, S. and Griffin, R.J. (2000), "Protection motivation and risk communication", Risk Analysis, Vol. 20 No. 5, pp. 721-34.
    • (2000) Risk Analysis , vol.20 , Issue.5 , pp. 721-734
    • Neuwirth, K.1    Dunwoody, S.2    Griffin, R.J.3
  • 18
    • 70349110823 scopus 로고    scopus 로고
    • Nunnally, J. (1978), Psychometric Theory, 2nd ed., McGraw-Hill, New York, NY. Poston, R., Stafford, T.F. and Hennington, A. (2005), Spyware: A view from the (online) street, Communications of the ACM, 48 No. 8, pp. 96-9.
    • Nunnally, J. (1978), Psychometric Theory, 2nd ed., McGraw-Hill, New York, NY. Poston, R., Stafford, T.F. and Hennington, A. (2005), "Spyware: A view from the (online) street", Communications of the ACM, Vol. 48 No. 8, pp. 96-9.
  • 19
    • 0023304222 scopus 로고
    • Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat
    • Rippetoe, S. and Rogers, R.W. (1987), "Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat", Journal of Personality and Social Psychology, Vol. 52 No. 3, pp. 596-604.
    • (1987) Journal of Personality and Social Psychology , vol.52 , Issue.3 , pp. 596-604
    • Rippetoe, S.1    Rogers, R.W.2
  • 20
    • 0001840352 scopus 로고
    • A protection motivation theory of fear appeals and attitude change
    • Rogers, R.W. (1975), "A protection motivation theory of fear appeals and attitude change", Journal of Psychology, Vol. 91, pp. 93-114.
    • (1975) Journal of Psychology , vol.91 , pp. 93-114
    • Rogers, R.W.1
  • 21
    • 0002247369 scopus 로고
    • Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation theory
    • Cacioppo, J. and Petty, R, Eds, Guilford, New York, NY, pp
    • Rogers, R.W. (1983), "Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation theory", in Cacioppo, J. and Petty, R. (Eds), Social Psychophysiology, Guilford, New York, NY, pp. 153-76.
    • (1983) Social Psychophysiology , pp. 153-176
    • Rogers, R.W.1
  • 22
    • 23344441723 scopus 로고    scopus 로고
    • Spyware: A little knowledge is a wonderful thing
    • Schmidt, M.B. and Arnett, K.P. (2005), "Spyware: A little knowledge is a wonderful thing", Communications of the ACM, Vol. 48 No. 8, pp. 67-70.
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 67-70
    • Schmidt, M.B.1    Arnett, K.P.2
  • 23
    • 0000560302 scopus 로고
    • Risk-reduction processes in repetitive consumer behaviour
    • Sheth, J.N. and Venkatesan, M. (1968), "Risk-reduction processes in repetitive consumer behaviour", Journal of Marketing Research, Vol. 5 No. 3, pp. 307-10.
    • (1968) Journal of Marketing Research , vol.5 , Issue.3 , pp. 307-310
    • Sheth, J.N.1    Venkatesan, M.2
  • 25
    • 0002735809 scopus 로고
    • The protection motivation model: A normative model of fear appeals
    • Tanner, J.F., Hunt, J.B. and Eppright, D.R. (1991), "The protection motivation model: A normative model of fear appeals", Journal of Marketing, Vol. 55, pp. 36-45.
    • (1991) Journal of Marketing , vol.55 , pp. 36-45
    • Tanner, J.F.1    Hunt, J.B.2    Eppright, D.R.3
  • 26
    • 23344447680 scopus 로고    scopus 로고
    • Why spyware poses multiple threats to security
    • Thompson, R. (2005), "Why spyware poses multiple threats to security", Communications of the ACM., Vol. 48 No. 8, pp. 41-3.
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 41-43
    • Thompson, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.