-
1
-
-
0003506668
-
-
available at: (accessed April 6, 2009)
-
Adams, J. (1999), Cars, Cholera, and Cows: The Management of Risk and Uncertainty, available at: www.cato.org/pubs/pas/pa335.pdf (accessed April 6, 2009).
-
(1999)
Cars, Cholera, and Cows: The Management of Risk and Uncertainty
-
-
Adams, J.1
-
2
-
-
0002305454
-
From intentions to action: A theory of planned behavior
-
Kukl, J. and Beckman, J. (Eds), Springer, New York, NY
-
Ajzen, I. (1985), "From intentions to action: a theory of planned behavior", in Kukl, J. and Beckman, J. (Eds), Action Control: From Cognitions to Behaviors, Springer, New York, NY, pp. 11-39.
-
(1985)
Action Control: From Cognitions to Behaviors
, pp. 11-39
-
-
Ajzen, I.1
-
4
-
-
0035999319
-
Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior
-
Ajzen, I. (2002), "Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior", Journal of Applied Social Psychology, Vol.32 No.4, pp. 665-683
-
(2002)
Journal of Applied Social Psychology
, vol.32
, Issue.4
, pp. 665-683
-
-
Ajzen, I.1
-
5
-
-
0032590244
-
Distinguishing perceptions of control from self-efficacy: Predicting consumption of a low-fat diet using the theory of planned behavior
-
Armitage, C.J. and Conner, M. (1999a), "Distinguishing perceptions of control from self-efficacy: predicting consumption of a low-fat diet using the theory of planned behavior", Journal of Applied Social Psychology, Vol.29 No.1, pp. 72-90.
-
(1999)
Journal of Applied Social Psychology
, vol.29
, Issue.1
, pp. 72-90
-
-
Armitage, C.J.1
Conner, M.2
-
6
-
-
0033423024
-
The theory of planned behaviour: Assessment of predictive validity and 'perceived control
-
Armitage, C.J. and Conner, M. (1999b), "The theory of planned behaviour: assessment of predictive validity and 'perceived control'", British Journal of Social Psychology, Vol.38 No.1, pp. 35-54.
-
(1999)
British Journal of Social Psychology
, vol.38
, Issue.1
, pp. 35-54
-
-
Armitage, C.J.1
Conner, M.2
-
7
-
-
51249177591
-
On the evaluation of structural equation models
-
Bagozzi, R.P. and Yi, Y. (1988), "On the evaluation of structural equation models", Journal of the Academy of Marketing Science, Vol.16 No.1, pp. 74-94.
-
(1988)
Journal of the Academy of Marketing Science
, vol.16
, Issue.1
, pp. 74-94
-
-
Bagozzi, R.P.1
Yi, Y.2
-
8
-
-
0037599474
-
The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
-
Campbell, K., Gordon, L.A., Loeb, M.P. and Zhou, L. (2003), "The economic cost of publicly announced information security breaches: empirical evidence from the stock market", Journal of Computer Security, Vol.11 No.3, pp. 431-448
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 431-448
-
-
Campbell, K.1
Gordon, L.A.2
Loeb, M.P.3
Zhou, L.4
-
9
-
-
0042242856
-
A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic mail adoption study
-
Chin, W.W., Marcolin, B.L. and Newsted, P.R. (2003), "A partial least squares latent variable modeling approach for measuring interaction effects: results from a Monte Carlo simulation study and an electronic mail adoption study", Information Systems Research, Vol.14 No.2, pp. 189-217.
-
(2003)
Information Systems Research
, vol.14
, Issue.2
, pp. 189-217
-
-
Chin, W.W.1
Marcolin, B.L.2
Newsted, P.R.3
-
10
-
-
76649092131
-
-
DTT available at: (accessed April 6, 2009)
-
DTT (2009), Protecting What Matters: The 6th Annual Global Security Survey, available at: www. deloitte.com/dtt/cda/doc/content/dtt-fsi- GlobalSecuritySurvey-0901.pdf (accessed April 6, 2009).
-
(2009)
Protecting What Matters: The 6th Annual Global Security Survey
-
-
-
11
-
-
0000009769
-
Evaluating structural equation models with unobservable variables and measurement error
-
Fornell, C. and Larcker, D. (1981), "Evaluating structural equation models with unobservable variables and measurement error", Journal of Marketing Research, Vol.18 No.1, pp. 39-50.
-
(1981)
Journal of Marketing Research
, vol.18
, Issue.1
, pp. 39-50
-
-
Fornell, C.1
Larcker, D.2
-
12
-
-
0031128568
-
An investigation of behavioral adaptation to airbags and antilock brakes among taxi drivers
-
Fosser, S., Saetermo, I. and Sagberg, F. (1997), "An investigation of behavioral adaptation to airbags and antilock brakes among taxi drivers", Accident Analysis and Prevention, Vol.29 No.3, pp. 293-302.
-
(1997)
Accident Analysis and Prevention
, vol.29
, Issue.3
, pp. 293-302
-
-
Fosser, S.1
Saetermo, I.2
Sagberg, F.3
-
13
-
-
29444460597
-
A practical guide to factorial validity using PLS-Graph: Tutorial and annotated example
-
Gefen, D. and Straub, D. (2005), "A practical guide to factorial validity using PLS-Graph: Tutorial and annotated example", Communications of the AIS, Vol.16 No.5, pp. 91-109.
-
(2005)
Communications of the AIS
, vol.16
, Issue.5
, pp. 91-109
-
-
Gefen, D.1
Straub, D.2
-
14
-
-
0043249504
-
Awareness and challenges of internet security
-
Hawkins, S., Yen, D.C. and Chou, D.C. (2000), "Awareness and challenges of internet security", Information Management & Computer Security, Vol.8 No.3, pp. 131-143
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.3
, pp. 131-143
-
-
Hawkins, S.1
Yen, D.C.2
Chou, D.C.3
-
15
-
-
0030851774
-
Application of Ajzen's theory of planned behavior to predict sunbathing, tanning salon use, and sunscreen use intentions and behaviors
-
Hillhouse, J.J., Adler, C.M., Drinnon, J. and Turrist, R. (1997), "Application of Ajzen's theory of planned behavior to predict sunbathing, tanning salon use, and sunscreen use intentions and behaviors", Journal of Behavioral Medicine, Vol.20 No.4, pp. 365-378
-
(1997)
Journal of Behavioral Medicine
, vol.20
, Issue.4
, pp. 365-378
-
-
Hillhouse, J.J.1
Adler, C.M.2
Drinnon, J.3
Turrist, R.4
-
16
-
-
0042573985
-
A qualitative and quantitative review of antecedents of counterproductive behavior in organizations
-
Lau, V.C.S., Au, W.T. and Ho, J.M.C. (2003), "A qualitative and quantitative review of antecedents of counterproductive behavior in organizations", Journal of Business and Psychology, Vol.18 No.1, pp. 73-99.
-
(2003)
Journal of Business and Psychology
, vol.18
, Issue.1
, pp. 73-99
-
-
Lau, V.C.S.1
Au, W.T.2
Ho, J.M.C.3
-
17
-
-
0036064934
-
A holistic model of computer abuse within organizations
-
Lee, J. and Lee, Y. (2002), "A holistic model of computer abuse within organizations", Information Management & Computer Security, Vol.10 No.2, pp. 57-63.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.2
, pp. 57-63
-
-
Lee, J.1
Lee, Y.2
-
19
-
-
2442701031
-
A model for information assurance: An integrated approach
-
United State Military Academy, IEEE, West Point, NY
-
Maconachy, W.V., Schou, C.D., Ragsdale, D. and Welch, D. (2001), "A model for information assurance: an integrated approach", Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United State Military Academy, IEEE, West Point, NY, pp. 306-310
-
(2001)
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
, pp. 306-310
-
-
MacOnachy, W.V.1
Schou, C.D.2
Ragsdale, D.3
Welch, D.4
-
20
-
-
61349092288
-
Studying users' computer security behavior: A health belief perspective
-
Ng, B.Y., Kankanhalli, A. and Xu, Y.C. (2008), "Studying users' computer security behavior: a health belief perspective", Decision Support Systems, Vol.46 No.4, pp. 815-825
-
(2008)
Decision Support Systems
, vol.46
, Issue.4
, pp. 815-825
-
-
Ng, B.Y.1
Kankanhalli, A.2
Xu, Y.C.3
-
21
-
-
39749168050
-
Employees' behavior towards IS security policy compliance
-
IEEE, Hawaii
-
Pahnila, S., Siponen, M. and Mahmood, A. (2007), "Employees' behavior towards IS security policy compliance", Proceedings of the 40th Hawaii International Conference on System Sciences, 2007, IEEE, Hawaii.
-
(2007)
Proceedings of the 40th Hawaii International Conference on System Sciences, 2007
-
-
Pahnila, S.1
Siponen, M.2
Mahmood, A.3
-
23
-
-
0000851466
-
The effects of automobile safety regulation
-
Peltzman, S. (1975), "The effects of automobile safety regulation", Journal of Political Economy, Vol.83 No.4, pp. 677-725.
-
(1975)
Journal of Political Economy
, vol.83
, Issue.4
, pp. 677-725
-
-
Peltzman, S.1
-
24
-
-
0001354917
-
Ethical decision making in the medical profession: An application of the theory of planned behavior
-
Randall, D.M. and Gibson, A.M. (1991), "Ethical decision making in the medical profession: an application of the theory of planned behavior", Journal of Business Ethics, Vol.10 No.2, pp. 111-122
-
(1991)
Journal of Business Ethics
, vol.10
, Issue.2
, pp. 111-122
-
-
Randall, D.M.1
Gibson, A.M.2
-
25
-
-
76649107261
-
The people, policy, technology (PPT) model: Core elements of the security process
-
Schlarman, S. (2001), "The people, policy, technology (PPT) model: core elements of the security process", Information Security Journal, Vol.10 No.5, pp. 1-6.
-
(2001)
Information Security Journal
, vol.10
, Issue.5
, pp. 1-6
-
-
Schlarman, S.1
-
26
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Siponen, M.T. (2000), "A conceptual foundation for organizational information security awareness", Information Management & Computer Security, Vol.8 No.1, pp. 31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.T.1
-
27
-
-
53049103906
-
Five dimensions of information security awareness
-
Siponen, M.T. (2001), "Five dimensions of information security awareness", ACM SIGCAS Computers and Society, Vol.31 No.2, pp. 24-29
-
(2001)
ACM SIGCAS Computers and Society
, vol.31
, Issue.2
, pp. 24-29
-
-
Siponen, M.T.1
-
29
-
-
84914140899
-
Behavioral information security: Two end user survey studies of motivation and security practices
-
New York, NY
-
Stanton, J.M., Mastrangelo, P.R., Stam, K.R. and Jolton, J. (2004), "Behavioral information security: two end user survey studies of motivation and security practices", Proceedings of the Tenth Americas Conference on Information Systems, New York, NY.
-
(2004)
Proceedings of the Tenth Americas Conference on Information Systems
-
-
Stanton, J.M.1
Mastrangelo, P.R.2
Stam, K.R.3
Jolton, J.4
-
30
-
-
3042857071
-
On risk: Perception and direction
-
Stewart, A. (2004), "On risk: perception and direction", Computers & Security, Vol.23 No.5, pp. 362-370
-
(2004)
Computers & Security
, vol.23
, Issue.5
, pp. 362-370
-
-
Stewart, A.1
-
31
-
-
0242517401
-
Information security awareness: Educating your users effectively
-
Thomson, M.E. and von Solms, R. (1998), "Information security awareness: educating your users effectively", Information Management & Computer Security, Vol.6 No.4, pp. 167-173
-
(1998)
Information Management & Computer Security
, vol.6
, Issue.4
, pp. 167-173
-
-
Thomson, M.E.1
Von Solms, R.2
-
32
-
-
0011465779
-
-
unpublished manuscript, Institute for Social Research, University of Michigan, Ann Arbor, MI
-
van Ryn, M. and Vinokur, A.D. (1990), "The role of experimentally manipulated self-efficacy in determining job-search behavior among the unemployed", unpublished manuscript, Institute for Social Research, University of Michigan, Ann Arbor, MI.
-
(1990)
The Role of Experimentally Manipulated Self-efficacy in Determining Job-search Behavior among the Unemployed
-
-
Van Ryn, M.1
Vinokur, A.D.2
-
33
-
-
0033872521
-
A theoretical extension of the technology acceptance model: Four longitudinal field studies
-
Venkatesh, V. and Davis, F.D. (2000), "A theoretical extension of the technology acceptance model: four longitudinal field studies", Management Science, Vol.46 No.2, pp. 186-204.
-
(2000)
Management Science
, vol.46
, Issue.2
, pp. 186-204
-
-
Venkatesh, V.1
Davis, F.D.2
-
34
-
-
2942564710
-
From policies to culture
-
von Solms, R. and von Solms, B. (2004), "From policies to culture", Computers & Security, Vol.23 No.4, pp. 275-279
-
(2004)
Computers & Security
, vol.23
, Issue.4
, pp. 275-279
-
-
Von Solms, R.1
Von Solms, B.2
-
35
-
-
42149161709
-
The psychology of security
-
West, R. (2008), "The psychology of security", Communications of the ACM, Vol.51 No.4, pp. 34-40.
-
(2008)
Communications of the ACM
, vol.51
, Issue.4
, pp. 34-40
-
-
West, R.1
-
36
-
-
33846344673
-
Punishment and ethics deterrents: A study of insider security contravention
-
Workman, M. and Gathegi, J. (2007), "Punishment and ethics deterrents: a study of insider security contravention", Journal of the American Society for Information Science and Technology, Vol.58 No.2, pp. 212-222
-
(2007)
Journal of the American Society for Information Science and Technology
, vol.58
, Issue.2
, pp. 212-222
-
-
Workman, M.1
Gathegi, J.2
|