-
1
-
-
0034557459
-
Research report: the evolving relationship between general and specific computer self-efficacy-an empirical assessment
-
Agarwal R., Sambamurthy V., and Stair R.M. Research report: the evolving relationship between general and specific computer self-efficacy-an empirical assessment. Information Systems Research 11 4 (2000) 418-430
-
(2000)
Information Systems Research
, vol.11
, Issue.4
, pp. 418-430
-
-
Agarwal, R.1
Sambamurthy, V.2
Stair, R.M.3
-
2
-
-
34249871944
-
A qualitative study of users' view on information security
-
Albrechtsen E. A qualitative study of users' view on information security. Computers & Security 26 (2007) 276-289
-
(2007)
Computers & Security
, vol.26
, pp. 276-289
-
-
Albrechtsen, E.1
-
5
-
-
54849213300
-
-
White paper, AOL/NCSA (American Online and National Cyber Security Alliance)
-
AOL/NCSA. Online safety study. White paper (2005), AOL/NCSA (American Online and National Cyber Security Alliance)
-
(2005)
Online safety study
-
-
-
8
-
-
0000018064
-
Self-regulatory mechanisms governing the impact of social comparison on complex decision making
-
Bandura A., and Jourden F.J. Self-regulatory mechanisms governing the impact of social comparison on complex decision making. Journal of Personality and Social Psychology 60 6 (1991) 941-951
-
(1991)
Journal of Personality and Social Psychology
, vol.60
, Issue.6
, pp. 941-951
-
-
Bandura, A.1
Jourden, F.J.2
-
9
-
-
78049400376
-
-
Technical Report, British Department of Business Enterprise & Regulatory Reform
-
BERR. 2008 Information security breaches survey. Technical Report (2008), British Department of Business Enterprise & Regulatory Reform
-
(2008)
2008 Information security breaches survey
-
-
BERR1
-
10
-
-
0031209960
-
The threat from the net
-
Bishop M., Cheung S., Frank J., and Hoagland S. The threat from the net. IEEE Spectrum 34 8 (1997) 56-63
-
(1997)
IEEE Spectrum
, vol.34
, Issue.8
, pp. 56-63
-
-
Bishop, M.1
Cheung, S.2
Frank, J.3
Hoagland, S.4
-
11
-
-
0003095695
-
The partial least squares approach for structural equation modeling
-
Marcoulides G.A. (Ed), Lawrence Erlbaum Associates, Hillsdale, N.J
-
Chin W. The partial least squares approach for structural equation modeling. In: Marcoulides G.A. (Ed). Modern methods for business research (1998), Lawrence Erlbaum Associates, Hillsdale, N.J
-
(1998)
Modern methods for business research
-
-
Chin, W.1
-
14
-
-
49149116092
-
Computer self-efficacy: development of a measure and initial test
-
Compeau D.R., and Higgins C.A. Computer self-efficacy: development of a measure and initial test. MIS Quarterly 19 2 (1995) 189-211
-
(1995)
MIS Quarterly
, vol.19
, Issue.2
, pp. 189-211
-
-
Compeau, D.R.1
Higgins, C.A.2
-
15
-
-
55349113388
-
Computer self-efficacy: a review
-
Human computer interaction and management information systems: foundations. Zhang P., and Galletta D. (Eds), M.E. Sharpe, NJ [edited by V. Zwass]
-
Compeau D., Gravill J., Haggerty N., and Kelley H. Computer self-efficacy: a review. In: Zhang P., and Galletta D. (Eds). Human computer interaction and management information systems: foundations. Advances in information systems series vol. 4 (2006), M.E. Sharpe, NJ [edited by V. Zwass]
-
(2006)
Advances in information systems series
, vol.4
-
-
Compeau, D.1
Gravill, J.2
Haggerty, N.3
Kelley, H.4
-
16
-
-
84936823933
-
User acceptance of computer technology: a comparison of two theoretical models
-
Davis F.D., Bagozzi R.P., and Warshaw P.R. User acceptance of computer technology: a comparison of two theoretical models. Management Science 35 8 (1989) 982-1003
-
(1989)
Management Science
, vol.35
, Issue.8
, pp. 982-1003
-
-
Davis, F.D.1
Bagozzi, R.P.2
Warshaw, P.R.3
-
17
-
-
0002698747
-
Information system security management in the new millennium
-
Dhillon G., and Backhouse J. Information system security management in the new millennium. Communications of the ACM 43 7 (2000) 125-128
-
(2000)
Communications of the ACM
, vol.43
, Issue.7
, pp. 125-128
-
-
Dhillon, G.1
Backhouse, J.2
-
19
-
-
51249172647
-
Resistance to technological innovations: an examination of the role of self-efficacy and performance satisfaction
-
Ellen P.S., Bearden W.O., and Sharma S. Resistance to technological innovations: an examination of the role of self-efficacy and performance satisfaction. Journal of the Academy of Marketing Science 19 4 (1991) 297-307
-
(1991)
Journal of the Academy of Marketing Science
, vol.19
, Issue.4
, pp. 297-307
-
-
Ellen, P.S.1
Bearden, W.O.2
Sharma, S.3
-
21
-
-
84931201972
-
The social psychology of self-efficacy
-
Gecas V. The social psychology of self-efficacy. Annual Review of Sociology 15 (1989) 291-316
-
(1989)
Annual Review of Sociology
, vol.15
, pp. 291-316
-
-
Gecas, V.1
-
22
-
-
0001240334
-
Self-efficacy: implications for organizational behavior and human resource management
-
Gist M.E. Self-efficacy: implications for organizational behavior and human resource management. Academy of Management Review 12 3 (1987) 472-485
-
(1987)
Academy of Management Review
, vol.12
, Issue.3
, pp. 472-485
-
-
Gist, M.E.1
-
23
-
-
0000806910
-
Self-efficacy: a theoretical analysis of its determinants and malleability
-
Gist M.E. Self-efficacy: a theoretical analysis of its determinants and malleability. Academy of Management Review 17 2 (1992) 183-211
-
(1992)
Academy of Management Review
, vol.17
, Issue.2
, pp. 183-211
-
-
Gist, M.E.1
-
24
-
-
26444447760
-
Effects of alternative training methods on self-efficacy and performance in computer software training
-
Gist M.E., Schwoerer C.E., and Rosen B. Effects of alternative training methods on self-efficacy and performance in computer software training. Journal of Applied Psychology 74 6 (1989) 884-891
-
(1989)
Journal of Applied Psychology
, vol.74
, Issue.6
, pp. 884-891
-
-
Gist, M.E.1
Schwoerer, C.E.2
Rosen, B.3
-
25
-
-
0038569169
-
Change in self in adulthood: the example of sense of control
-
Baltes P.B., and Brim O.G. (Eds), Academic Press, New York
-
Gurin P., and Brim Jr. O.G. Change in self in adulthood: the example of sense of control. In: Baltes P.B., and Brim O.G. (Eds). Life span development and behavior vol. 6 (1984), Academic Press, New York 28-334
-
(1984)
Life span development and behavior
, vol.6
, pp. 28-334
-
-
Gurin, P.1
Brim Jr., O.G.2
-
26
-
-
0003506109
-
-
Prentice-Hall, Upper Saddle River, NJ
-
Hair Jr. J.F., Anderson R.E., Tatham R.L., and Black W.C. Multivariate data analysis. 5th ed. (1998), Prentice-Hall, Upper Saddle River, NJ
-
(1998)
Multivariate data analysis. 5th ed.
-
-
Hair Jr., J.F.1
Anderson, R.E.2
Tatham, R.L.3
Black, W.C.4
-
28
-
-
0002704773
-
A structural equation model of end-user satisfaction with a computer-based medical information system
-
Henry J.W., and Stone R.W. A structural equation model of end-user satisfaction with a computer-based medical information system. Information Resources Management Journal 7 3 (1994) 21-33
-
(1994)
Information Resources Management Journal
, vol.7
, Issue.3
, pp. 21-33
-
-
Henry, J.W.1
Stone, R.W.2
-
29
-
-
4544246468
-
Internet self-efficacy and electronic service acceptance
-
Hsu M.H., and Chiu C.M. Internet self-efficacy and electronic service acceptance. Decision Support Systems 38 (2004) 369-381
-
(2004)
Decision Support Systems
, vol.38
, pp. 369-381
-
-
Hsu, M.H.1
Chiu, C.M.2
-
30
-
-
0037550861
-
Students as surrogates for managers in a decision-making environment: an experimental study
-
Hughes C.T., and Gibson M.L. Students as surrogates for managers in a decision-making environment: an experimental study. Journal of Management Information Systems 8 2 (1991) 153-166
-
(1991)
Journal of Management Information Systems
, vol.8
, Issue.2
, pp. 153-166
-
-
Hughes, C.T.1
Gibson, M.L.2
-
31
-
-
9744279768
-
Effects of the user participation in systems development by end users: a longitudinal field experiment
-
Hunton J.E., and Beeler J.D. Effects of the user participation in systems development by end users: a longitudinal field experiment. MIS Quarterly 21 4 (1997) 359-388
-
(1997)
MIS Quarterly
, vol.21
, Issue.4
, pp. 359-388
-
-
Hunton, J.E.1
Beeler, J.D.2
-
33
-
-
84900072340
-
-
National Institute of Standards and Technology, Technology Administration, U.S. Department of Commerce Special Report, p. 800-46
-
Kuhn D.R., Tracy M.C., and Frankel S.E. Security for telecommunicating and broadband communications (2002), National Institute of Standards and Technology, Technology Administration, U.S. Department of Commerce Special Report, p. 800-46
-
(2002)
Security for telecommunicating and broadband communications
-
-
Kuhn, D.R.1
Tracy, M.C.2
Frankel, S.E.3
-
34
-
-
0040436852
-
Development and validation of ethical computer self-efficacy measures: the case of soft lifting
-
Kuo F.Y., and Hsu M.H. Development and validation of ethical computer self-efficacy measures: the case of soft lifting. Journal of Business Ethics 32 4 (2001) 299-315
-
(2001)
Journal of Business Ethics
, vol.32
, Issue.4
, pp. 299-315
-
-
Kuo, F.Y.1
Hsu, M.H.2
-
35
-
-
23344453209
-
Investigating factors affecting adoption of anti-spyware systems
-
Lee Y., and Kozar A. Investigating factors affecting adoption of anti-spyware systems. Communications of the ACM 48 8 (2005) 72-77
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 72-77
-
-
Lee, Y.1
Kozar, A.2
-
36
-
-
0030194196
-
Evaluating ethical decision making and computer use
-
Loch K.D., and Conger S. Evaluating ethical decision making and computer use. Communication of the ACM 39 7 (1996) 74-83
-
(1996)
Communication of the ACM
, vol.39
, Issue.7
, pp. 74-83
-
-
Loch, K.D.1
Conger, S.2
-
38
-
-
0000729074
-
Social cognitive variables in the prediction of client motivation and attribution
-
Longo D.A., Lent R.W., and Brown S.D. Social cognitive variables in the prediction of client motivation and attribution. Journal of Counseling Psychology 39 4 (1992) 447-452
-
(1992)
Journal of Counseling Psychology
, vol.39
, Issue.4
, pp. 447-452
-
-
Longo, D.A.1
Lent, R.W.2
Brown, S.D.3
-
39
-
-
71949086030
-
-
Financial Times Limited, London, England
-
Mackenzie K. Employees may be opening the door to criminals (May 30, 2006), Financial Times Limited, London, England. http://www.ft.com/cms/s/458807fe-efec-11da-b80e-0000779e2340.html
-
(2006)
Employees may be opening the door to criminals
-
-
Mackenzie, K.1
-
40
-
-
0032341068
-
The multilevel and multifaceted characteristics of computer self-efficacy
-
Marakas G.M., Yi M.Y., and Johnson R.D. The multilevel and multifaceted characteristics of computer self-efficacy. Information Systems Research 9 2 (1998) 126-163
-
(1998)
Information Systems Research
, vol.9
, Issue.2
, pp. 126-163
-
-
Marakas, G.M.1
Yi, M.Y.2
Johnson, R.D.3
-
43
-
-
71949113937
-
-
National Cyber Security Alliance
-
NCSA. How safe are you? Interactive web document (2004), National Cyber Security Alliance. http://www.staysafeonline.info/home-quiz.html
-
(2004)
How safe are you? Interactive web document
-
-
NCSA1
-
44
-
-
0025395496
-
Mechanisms governing empowerment effects: a self-efficacy analysis
-
Ozer E.M., and Bandura A. Mechanisms governing empowerment effects: a self-efficacy analysis. Journal of Personality and Social Psychology 58 3 (1990) 472-486
-
(1990)
Journal of Personality and Social Psychology
, vol.58
, Issue.3
, pp. 472-486
-
-
Ozer, E.M.1
Bandura, A.2
-
45
-
-
0036567998
-
A field study of computer self-efficacy beliefs as an outcome of training: the role of computer playfulness, computer knowledge, and performance during training
-
Potosky D. A field study of computer self-efficacy beliefs as an outcome of training: the role of computer playfulness, computer knowledge, and performance during training. Computers in Human Behavior 18 3 (2002) 241-255
-
(2002)
Computers in Human Behavior
, vol.18
, Issue.3
, pp. 241-255
-
-
Potosky, D.1
-
47
-
-
55849105212
-
Information security awareness in higher education: an exploratory study
-
Rezgui Y., and Marks A. Information security awareness in higher education: an exploratory study. Computers & Security 27 (2008) 241-253
-
(2008)
Computers & Security
, vol.27
, pp. 241-253
-
-
Rezgui, Y.1
Marks, A.2
-
48
-
-
71949097968
-
-
Web document, CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University
-
Rogers L.R. The goal of computer security or what's yours until you say otherwise!. Web document (2004), CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University. http://www.cert.org/homeusers/goalof_computersecurity.html
-
(2004)
The goal of computer security or what's yours until you say otherwise!
-
-
Rogers, L.R.1
-
49
-
-
0003446268
-
-
Sage, Thousand Oaks, CA
-
Skinner E.A. Perceived control, motivation, and coping (1995), Sage, Thousand Oaks, CA
-
(1995)
Perceived control, motivation, and coping
-
-
Skinner, E.A.1
-
50
-
-
0003538232
-
Computer security-threats, vulnerabilities, and countermeasures
-
Smith M. Computer security-threats, vulnerabilities, and countermeasures. Information Age 11 4 (1989) 205-210
-
(1989)
Information Age
, vol.11
, Issue.4
, pp. 205-210
-
-
Smith, M.1
-
52
-
-
0002323214
-
Social cognitive theory and self-efficacy: going beyond traditional motivational and behavioral approaches
-
Stajkovic F.L., and Luthans B.C. Social cognitive theory and self-efficacy: going beyond traditional motivational and behavioral approaches. Organizational Dynamics 26 4 (1998) 62-74
-
(1998)
Organizational Dynamics
, vol.26
, Issue.4
, pp. 62-74
-
-
Stajkovic, F.L.1
Luthans, B.C.2
-
53
-
-
0033260584
-
A self-efficacy theory explanation for the management of remote workers in virtual organizations
-
Staples D.S., Hulland J.S., and Higgins C.A. A self-efficacy theory explanation for the management of remote workers in virtual organizations. Organization Science 10 6 (1999) 758-776
-
(1999)
Organization Science
, vol.10
, Issue.6
, pp. 758-776
-
-
Staples, D.S.1
Hulland, J.S.2
Higgins, C.A.3
-
55
-
-
0000280419
-
Effective IS security: an empirical study
-
Straub D.W. Effective IS security: an empirical study. Information Systems Research 1 3 (1990) 255-276
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
56
-
-
0001133137
-
Coping with systems risk: security planning models for management decision making
-
Straub D.W., and Welke R.J. Coping with systems risk: security planning models for management decision making. MIS Quarterly 22 4 (1998) 441-469
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
57
-
-
0000703119
-
Assessing IT usage: the role of prior experience
-
Taylor S., and Todd P. Assessing IT usage: the role of prior experience. MIS Quarterly 19 4 (1995) 561-570
-
(1995)
MIS Quarterly
, vol.19
, Issue.4
, pp. 561-570
-
-
Taylor, S.1
Todd, P.2
-
58
-
-
1042268474
-
An empirical examination of individual traits as antecedents to computer anxiety and computer self-efficacy
-
Thatcher J.B., and Perrewe P.L. An empirical examination of individual traits as antecedents to computer anxiety and computer self-efficacy. MIS Quarterly 26 4 (2002) 381-396
-
(2002)
MIS Quarterly
, vol.26
, Issue.4
, pp. 381-396
-
-
Thatcher, J.B.1
Perrewe, P.L.2
-
59
-
-
0032671610
-
Computer self-efficacy, training effectiveness and user attitudes: an empirical study
-
Torkzadeh R., Pflughoeft K., and Hall L. Computer self-efficacy, training effectiveness and user attitudes: an empirical study. Behavior and Information Technology 28 4 (1999) 299-309
-
(1999)
Behavior and Information Technology
, vol.28
, Issue.4
, pp. 299-309
-
-
Torkzadeh, R.1
Pflughoeft, K.2
Hall, L.3
-
60
-
-
23344447680
-
Why spyware poses multiple threats to security
-
Thompson R. Why spyware poses multiple threats to security. Communications of the ACM 48 8 (2005) 41-43
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 41-43
-
-
Thompson, R.1
-
61
-
-
1542382496
-
User acceptance of information technology: toward a unified view
-
Venkatesh V., Morris M.G., Davis F.D., and Davis G.B. User acceptance of information technology: toward a unified view. MIS Quarterly 27 3 (2003) 425-478
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.G.2
Davis, F.D.3
Davis, G.B.4
-
62
-
-
71949099784
-
American express warns of 'Security Measures' phishing scam
-
Washkuch F. American express warns of 'Security Measures' phishing scam. SC Magazine (May 25, 2006)
-
(2006)
SC Magazine
-
-
Washkuch, F.1
-
63
-
-
4243198165
-
Enemy at the gate: threats to information security
-
Whitman M.E. Enemy at the gate: threats to information security. Communications of the ACM 46 8 (August 2003) 91-95
-
(2003)
Communications of the ACM
, vol.46
, Issue.8
, pp. 91-95
-
-
Whitman, M.E.1
-
67
-
-
0000744744
-
Social cognitive theory of organizational management
-
Wood R., and Bandura A. Social cognitive theory of organizational management. Academy of Management Review 14 3 (1989) 361-384
-
(1989)
Academy of Management Review
, vol.14
, Issue.3
, pp. 361-384
-
-
Wood, R.1
Bandura, A.2
-
68
-
-
85007849857
-
Relationships among computer self-efficacy, attitude toward computers, and desirability of learning computing skills
-
Zhang Y., and Espinoza S. Relationships among computer self-efficacy, attitude toward computers, and desirability of learning computing skills. Journal of Research on Computing in Education 30 4 (1998) 420-436
-
(1998)
Journal of Research on Computing in Education
, vol.30
, Issue.4
, pp. 420-436
-
-
Zhang, Y.1
Espinoza, S.2
|