-
1
-
-
0036299585
-
Security surveys spring crop
-
S. Hinde, "Security Surveys Spring Crop," Computers & Security, vol.21, no.4, 2002, pp. 310-321.
-
(2002)
Computers & Security
, vol.21
, Issue.4
, pp. 310-321
-
-
Hinde, S.1
-
2
-
-
23044525969
-
Current directions in information security research: Toward socio-organizational Perspectives
-
G. Dhillon and J. Backhouse, "Current Directions in Information Security Research: Toward Socio-Organizational Perspectives," Information Systems J., vol.11, no.2, 2001, pp. 127-153
-
(2001)
Information Systems J.
, vol.11
, Issue.2
, pp. 127-153
-
-
Dhillon, G.1
Backhouse, J.2
-
3
-
-
17844366573
-
An Analysis of end user security behaviors
-
J.M. Stanton et al., "An Analysis of End User Security Behaviors," Computers & Security, vol.24, 2005, pp. 124-133.
-
(2005)
Computers & Security
, vol.24
, pp. 124-133
-
-
Stanton, J.M.1
-
5
-
-
80053473856
-
Which factors explain employees' adherence to information security policies? An empirical study
-
S. Pahnila, M.T. Siponen, and M.A. Mahmood, "Which Factors Explain Employees' Adherence to Information Security Policies? An Empirical Study," Proc. Pacific Asia Conf. Information Systems (PACIS 07), 2007, pp. 1-12.
-
(2007)
Proc. Pacific Asia Conf. Information Systems (PACIS 07)
, pp. 1-12
-
-
Pahnila, S.1
Siponen, M.T.2
Mahmood, M.A.3
-
6
-
-
39749168050
-
Employees' behavior towards is security policy compliance
-
IEEE CS Press
-
M.T. Siponen, S. Pahnila, and M.A. Mahmood, "Employees' Behavior Towards IS Security Policy Compliance," Proc. 40th Ann. Hawaii Int'l. Conf. System Sciences (HICSS-40), IEEE CS Press, 2007, p. 1561.
-
(2007)
Proc. 40th Ann. Hawaii int'L. Conf. System Sciences (HICSS-40)
, pp. 1561
-
-
Siponen, M.T.1
Pahnila, S.2
Mahmood, M.A.3
-
9
-
-
44949274046
-
The Theory of planned behavior
-
I. Ajzen, "The Theory of Planned Behavior," Organizational Behavior and Human Decision Processes, vol.50, no.2, 1991, pp. 179-211.
-
(1991)
Organizational Behavior and Human Decision Processes
, vol.50
, Issue.2
, pp. 179-211
-
-
Ajzen, I.1
-
10
-
-
0002247369
-
Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation theory
-
J. Cacioppo and R. Petty, eds., Guilford Press
-
R.W. Rogers, "Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation Theory," Social Psychophysiology, J. Cacioppo and R. Petty, eds., Guilford Press, 1983, pp. 153-176.
-
(1983)
Social Psychophysiology
, pp. 153-176
-
-
Rogers, R.W.1
-
11
-
-
0001045799
-
Protection motivation theory
-
D.S. Gochman, ed., Plenum Press
-
R.W. Rogers and S. Prentice-Dunn, "Protection Motivation Theory," Handbook of Health Behavior Research I: Personal and Social Determinants, D.S. Gochman, ed., Plenum Press, 1997, pp. 113-132.
-
(1997)
Handbook of Health Behavior Research I: Personal and Social Determinants
, pp. 113-132
-
-
Rogers, R.W.1
Prentice-Dunn, S.2
-
12
-
-
0023304222
-
Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat
-
S. Rippetoe and R.W. Rogers, "Effects of Components of Protection-Motivation Theory on Adaptive and Maladaptive Coping with a Health Threat," J. Personality and Social Psychology, vol.52, no.3, 1987, pp. 596-604.
-
(1987)
J. Personality and Social Psychology
, vol.52
, Issue.3
, pp. 596-604
-
-
Rippetoe, S.1
Rogers, R.W.2
-
13
-
-
57049117189
-
Persuasion as education for computer security
-
AACE
-
A. Forget, S. Chiasson, and R. Biddle, "Persuasion as Education for Computer Security," Proc. E-Learn 2007, AACE, 2007, pp. 822-829.
-
(2007)
Proc. E-Learn 2007
, pp. 822-829
-
-
Forget, A.1
Chiasson, S.2
Biddle, R.3
-
14
-
-
0017472917
-
Self-Efficacy: Toward a unifying theory of behaviour change
-
A. Bandura, "Self-Efficacy: Toward a Unifying Theory of Behaviour Change," Psychological Rev., vol.84, no.2, 1977, pp. 191-215.
-
(1977)
Psychological Rev.
, vol.84
, Issue.2
, pp. 191-215
-
-
Bandura, A.1
-
15
-
-
29444455377
-
An application of deterrence theory to software piracy
-
G.E. Higgins, A.L. Wilson, and B.D. Fell, "An Application of Deterrence Theory to Software Piracy," J. Criminal Justice and Popular Culture, vol.12, no.3, 2005, pp. 166-184.
-
(2005)
J. Criminal Justice and Popular Culture
, vol.12
, Issue.3
, pp. 166-184
-
-
Higgins, G.E.1
Wilson, A.L.2
Fell, B.D.3
-
18
-
-
1542382496
-
User acceptance of information technology: Toward a unified view
-
V. Venkatesh et al., "User Acceptance of Information Technology: Toward a Unified View," MIS Quarterly, vol.27, no.3, 2003, pp. 425-478.
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. 425-478
-
-
Venkatesh, V.1
|