-
2
-
-
7744228242
-
Passwords reveal your personality
-
(accessed February 17, 2009)
-
Andrews, L. W. 2002. Passwords reveal your personality. Psychology Today. http://www.psychologytoday.com/articles/pto-20020101-000006.html (accessed February 17, 2009).
-
(2002)
Psychology Today
-
-
Andrews, L.W.1
-
3
-
-
84986364572
-
The effects of health threat seriousness and personal efficacy upon intentions and behavior
-
Beck, K. H., and A. K. Lund. 1981. The effects of health threat seriousness and personal efficacy upon intentions and behavior. Journal of Applied Social Psychology 11:401-415.
-
(1981)
Journal of Applied Social Psychology
, vol.11
, pp. 401-415
-
-
Beck, K.H.1
Lund, A.K.2
-
4
-
-
77951662387
-
User behaviors associated with password security and management
-
Bryant, K., and J. Campbell. 2006. User behaviors associated with password security and management. Australian Journal of Information Systems 14 (1): 81-100.
-
(2006)
Australian Journal of Information Systems
, vol.14
, Issue.1
, pp. 81-100
-
-
Bryant, K.1
Campbell, J.2
-
5
-
-
67650124268
-
The good and not so good of enforcing password composition rules
-
Campbell, J., D. Kleeman, and W. Ma. 2007. The good and not so good of enforcing password composition rules. Information Systems Security 16 (1): 2-8.
-
(2007)
Information Systems Security
, vol.16
, Issue.1
, pp. 2-8
-
-
Campbell, J.1
Kleeman, D.2
Ma, W.3
-
6
-
-
67650176091
-
Applying chunking theory in organizational human factors password guidelines
-
Carstens, D. S., L. Malone, and P. Bell. 2006. Applying chunking theory in organizational human factors password guidelines. Journal of Information, Information Technology, and Organization 1:97-114.
-
(2006)
Journal of Information, Information Technology, and Organization
, vol.1
, pp. 97-114
-
-
Carstens, D.S.1
Malone, L.2
Bell, P.3
-
7
-
-
18544374846
-
Evaluation of the human impact of password authentication practices on information security
-
Carstens, D. S., R. P. McCauley-Bell, and R. F. DeMara. 2004. Evaluation of the human impact of password authentication practices on information security. Information Science Journal 7:67-85.
-
(2004)
Information Science Journal
, vol.7
, pp. 67-85
-
-
Carstens, D.S.1
McCauley-Bell, R.P.2
Demara, R.F.3
-
8
-
-
85001728633
-
Password security: An empirical investigation into e-commerce passwords and their crack times
-
Cazier, J. A., and B. D. Medlin. 2006. Password security: An empirical investigation into e-commerce passwords and their crack times. Information Systems Security 15 (6): 45-55.
-
(2006)
Information Systems Security
, vol.15
, Issue.6
, pp. 45-55
-
-
Cazier, J.A.1
Medlin, B.D.2
-
9
-
-
33845945922
-
Coefficient alpha and the internal structure of tests
-
Cronbach, L. J. 1951. Coefficient alpha and the internal structure of tests. Psychometrika 16:297-334.
-
(1951)
Psychometrika
, vol.16
, pp. 297-334
-
-
Cronbach, L.J.1
-
10
-
-
85084161493
-
Déjà vu: A user study using images for authentication
-
August 14-17, Denver, CO
-
Dhamija, R., and A. Perrig. 2000. Déjà vu: A user study using images for authentication. Proceedings of 9th USENIX Security Symposium, August 14-17, 45-58. Denver, CO.
-
(2000)
Proceedings of 9th USENIX Security Symposium
, pp. 45-58
-
-
Dhamija, R.1
Perrig, A.2
-
11
-
-
35348884906
-
A large-scale study of web password habits
-
May 8-12, Banff, Alberta, Canada
-
Florêncio, D., and C. Herley. 2007. A large-scale study of web password habits. Proceedings of WWW 2007, May 8-12, Banff, Alberta, Canada.
-
(2007)
Proceedings of WWW 2007
-
-
Florêncio, D.1
Herley, C.2
-
13
-
-
34250729756
-
Password management strategies for online accounts
-
July 12-14, Pittsburgh, PA
-
Gaw, S., and E. W. Felten. 2006. Password management strategies for online accounts. Proceedings of the Second Symposium on Usable Privacy and Security, July 12-14, 44-55. Pittsburgh, PA.
-
(2006)
Proceedings of The Second Symposium On Usable Privacy and Security
, pp. 44-55
-
-
Gaw, S.1
Felten, E.W.2
-
14
-
-
70349151365
-
Consumer motivation in taking action against spyware: An empirical investigation
-
Gurung, A., X. Luo, and Q. Liao. 2009. Consumer motivation in taking action against spyware: An empirical investigation. Information Management and Computer Security 17 (3): 276-289.
-
(2009)
Information Management and Computer Security
, vol.17
, Issue.3
, pp. 276-289
-
-
Gurung, A.1
Luo, X.2
Liao, Q.3
-
16
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organizations
-
Herath, T., and H. R. Rao. 2009. Protection motivation and deterrence: A framework for security policy compliance in organizations. European Journal of Information Systems 18:106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
18
-
-
77956811393
-
Effects of fear arousal on attitude change: Recent development in theory and experimental research
-
ed. L. Berkowitz, San Diego, CA: Academic Press
-
Janis, I. L. 1967. Effects of fear arousal on attitude change: Recent development in theory and experimental research. In Advances in experimental social psychology (Vol. 3), ed. L. Berkowitz, 166-224. San Diego, CA: Academic Press.
-
(1967)
Advances In Experimental Social Psychology
, vol.3
, pp. 166-224
-
-
Janis, I.L.1
-
19
-
-
84976998771
-
The application of electronic computers to factor analysis
-
Kaiser, H. F. 1960. The application of electronic computers to factor analysis. Education and Psychological Measurement 20:141-151.
-
(1960)
Education and Psychological Measurement
, vol.20
, pp. 141-151
-
-
Kaiser, H.F.1
-
20
-
-
0001863378
-
There are threats and (maybe) fear-caused arousal: Theory and confusions of appeals to fear and fear arousal itself
-
LaTour, M. S., and H. J. Rotfeld. 1997. There are threats and (maybe) fear-caused arousal: Theory and confusions of appeals to fear and fear arousal itself. Journal of Advertising 26:45-59.
-
(1997)
Journal of Advertising
, vol.26
, pp. 45-59
-
-
Latour, M.S.1
Rotfeld, H.J.2
-
21
-
-
51749090174
-
Keeping our network safe: A model of online protection behavior
-
Lee, D., R. Larose, and N. Rifon. 2008. Keeping our network safe: A model of online protection behavior. Behavior and Information Technology 27:445-454.
-
(2008)
Behavior and Information Technology
, vol.27
, pp. 445-454
-
-
Lee, D.1
Larose, R.2
Rifon, N.3
-
22
-
-
67650166189
-
Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software
-
Lee, Y., and K. R. Larsen. 2009. Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software. European Journal of Information Systems 18: 177-187.
-
(2009)
European Journal of Information Systems
, vol.18
, pp. 177-187
-
-
Lee, Y.1
Larsen, K.R.2
-
23
-
-
33750301341
-
Consumer perceptions and willingness to pay for intrinsically motivated online content
-
Lopes, A. B., and D. F. Galletta. 2006. Consumer perceptions and willingness to pay for intrinsically motivated online content. Journal of Management Information Systems 23 (2): 203-231.
-
(2006)
Journal of Management Information Systems
, vol.23
, Issue.2
, pp. 203-231
-
-
Lopes, A.B.1
Galletta, D.F.2
-
24
-
-
0000242433
-
Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change
-
Maddux, J. E., and R. W. Rogers. 1983. Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology 19 (5): 469-479.
-
(1983)
Journal of Experimental Social Psychology
, vol.19
, Issue.5
, pp. 469-479
-
-
Maddux, J.E.1
Rogers, R.W.2
-
25
-
-
0000225960
-
The nature of attitudes and attitude change
-
2nd ed., eds. G. Lindzey, and E. Aronson, Reading, MA: Addison-Wesley
-
McGuire, W. J. 1969. The nature of attitudes and attitude change. In Handbook of social psychology, Vol. 3, 2nd ed., eds. G. Lindzey, and E. Aronson, 136-314. Reading, MA: Addison-Wesley.
-
(1969)
Handbook of Social Psychology
, vol.3
, pp. 136-314
-
-
McGuire, W.J.1
-
26
-
-
39749093168
-
The magical number seven, plus or minus two: Some limits on our capacity for processing information
-
Miller, G. A. 1956. The magical number seven, plus or minus two: Some limits on our capacity for processing information. Psychological Review 63:81-97.
-
(1956)
Psychological Review
, vol.63
, pp. 81-97
-
-
Miller, G.A.1
-
27
-
-
0036106081
-
Combining motivational and volitional interventions to promote exercise participation: Protection motivation theory and implementation intentions
-
Milne, S., S. Orbell, and P. Sheeran. 2002. Combining motivational and volitional interventions to promote exercise participation: Protection motivation theory and implementation intentions. British Journal of Health Psychology 7:163-184.
-
(2002)
British Journal of Health Psychology
, vol.7
, pp. 163-184
-
-
Milne, S.1
Orbell, S.2
Sheeran, P.3
-
28
-
-
0033622371
-
Prediction and intervention in healthrelated behavior: A meta-analytic review of protection motivation theory
-
Milne, S., P. Sheeran, and S. Orbell. 2000. Prediction and intervention in healthrelated behavior: A meta-analytic review of protection motivation theory. Journal of Applied Social Psychology 30 (1): 106-143.
-
(2000)
Journal of Applied Social Psychology
, vol.30
, Issue.1
, pp. 106-143
-
-
Milne, S.1
Sheeran, P.2
Orbell, S.3
-
29
-
-
0033432325
-
An application of protection motivation theory to riskier single-occasion drinking
-
Murgraff, V., D. White, and K. Phillips. 1999. An application of protection motivation theory to riskier single-occasion drinking. Psychology and Health 14:339-350.
-
(1999)
Psychology and Health
, vol.14
, pp. 339-350
-
-
Murgraff, V.1
White, D.2
Phillips, K.3
-
30
-
-
0037396112
-
What to convey in antismoking advertisements for adolescents: The use of protection motivation theory to identify effective message theme
-
Pechmann, C., C. Zhao, M. E. Goldberg, and E. T. Reibling. 2003. What to convey in antismoking advertisements for adolescents: The use of protection motivation theory to identify effective message theme. Journal of Marketing 67:1-18.
-
(2003)
Journal of Marketing
, vol.67
, pp. 1-18
-
-
Pechmann, C.1
Zhao, C.2
Goldberg, M.E.3
Reibling, E.T.4
-
31
-
-
0036172609
-
Protection motivation theory and exercise behavior change for the prevention of coronary heart disease in a high-risk, Australian representative community sample of adults
-
Plotnikoff, R. C., and N. Higginbotham. 2002. Protection motivation theory and exercise behavior change for the prevention of coronary heart disease in a high-risk, Australian representative community sample of adults. Psychology, Health and Medicine 7 (1): 87-98.
-
(2002)
Psychology, Health and Medicine
, vol.7
, Issue.1
, pp. 87-98
-
-
Plotnikoff, R.C.1
Higginbotham, N.2
-
32
-
-
0001840352
-
A protection motivation theory of fear appeals and attitude change
-
Rogers, R. W. 1975. A protection motivation theory of fear appeals and attitude change. Journal of Psychology 91:277-287.
-
(1975)
Journal of Psychology
, vol.91
, pp. 277-287
-
-
Rogers, R.W.1
-
33
-
-
0002795580
-
Facts versus fears: Understanding perceived risks
-
eds. D. Kahneman, P. Slovic, and A. Tversky, New York: Cambridge University Press
-
Slovic, P., B. Fischhoff, and S. Lichtenstein. 1986. Facts versus fears: Understanding perceived risks. In Judgment under uncertainty: Heuristics and biases, eds. D. Kahneman, P. Slovic, and A. Tversky, 463-489. New York: Cambridge University Press.
-
(1986)
Judgment Under Uncertainty: Heuristics and Biases
, pp. 463-489
-
-
Slovic, P.1
Fischhoff, B.2
Lichtenstein, S.3
-
34
-
-
1142268188
-
Risk behavior of Internet shopping: Comparison of college students' versus non-student adults
-
September 30-October 3, Pittsburgh, PA
-
Su, B. 2003. Risk behavior of Internet shopping: comparison of college students' versus non-student adults. Proceedings of the 5th International Conference on Electronic Commerce, September 30-October 3, 181-185, Pittsburgh, PA.
-
(2003)
Proceedings of The 5th International Conference On Electronic Commerce
, pp. 181-185
-
-
Su, B.1
-
35
-
-
0002566719
-
Fear-arousing communications: A critical examination of theory and research
-
ed. J. R. Eiser, London: Wiley
-
Sutton, S. R. 1982. Fear-arousing communications: a critical examination of theory and research. In Social psychology and behavioral medicine, ed. J. R. Eiser, 303-337. London: Wiley.
-
(1982)
Social Psychology and Behavioral Medicine
, pp. 303-337
-
-
Sutton, S.R.1
-
36
-
-
77951653992
-
Password practices: A study on attitude towards password usage among undergraduate students in Klang Valley, Malaysia
-
Tamil, E. M., A. H. Othman, S. A. Z. Abidin, M. Y. I. Idris, and O. Zakaria. 2007. Password practices: A study on attitude towards password usage among undergraduate students in Klang Valley, Malaysia. Journal of the Advancement of Science and Arts 3:37-42.
-
(2007)
Journal of The Advancement of Science and Arts
, vol.3
, pp. 37-42
-
-
Tamil, E.M.1
Othman, A.H.2
Abidin, S.A.Z.3
Idris, M.Y.I.4
Zakaria, O.5
-
37
-
-
0002735809
-
The protection motivation model: A normative model of fear appeals
-
Tanner, J. F., J. B. Hunt, and D. R. Eppright. 1991. The protection motivation model: A normative model of fear appeals. Journal of Marketing 55:36-45.
-
(1991)
Journal of Marketing
, vol.55
, pp. 36-45
-
-
Tanner, J.F.1
Hunt, J.B.2
Eppright, D.R.3
-
39
-
-
0242708745
-
Pretty good persuasion: A first step towards effective password security in the real world
-
Cloudscrofl, NM, September
-
Weirich, D., and M. A. Sasse. 2001. Pretty good persuasion: A first step towards effective password security in the real world. Proceedings of the 2001 Workshop on New Security Paradigms, Cloudscrofl, NM, September 10-13.
-
(2001)
Proceedings of The 2001 Workshop On New Security Paradigms
, pp. 10-13
-
-
Weirich, D.1
Sasse, M.A.2
-
40
-
-
42149161709
-
The psychology of security
-
West, R. 2008. The psychology of security. Communications of the ACM 51 (4): 34-41.
-
(2008)
Communications of The ACM
, vol.51
, Issue.4
, pp. 34-41
-
-
West, R.1
-
41
-
-
84869780575
-
A protection motivation theory approach to home wireless security
-
Las Vegas, NV, December 11-14
-
Woon, I. M. Y., G. W. Tan, and R. T. Low. 2005. A protection motivation theory approach to home wireless security. Proceedings of the 26th International Conference on Information Systems, Las Vegas, NV, December 11-14, 367-380.
-
(2005)
Proceedings of The 26th International Conference On Information Systems
, pp. 367-380
-
-
Woon, I.M.Y.1
Tan, G.W.2
Low, R.T.3
-
42
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
Workman, M., W. H. Bommer, and D. Straub. 2008. Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior 24:2799-2816.
-
(2008)
Computers In Human Behavior
, vol.24
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.H.2
Straub, D.3
-
43
-
-
0023464691
-
Relative contributions of protection motivation theory components in predicting exercise intentions and behavior
-
Wurtele, S. K., and J. E. Maddux. 1987. Relative contributions of protection motivation theory components in predicting exercise intentions and behavior. Health Psychology 6:453-466.
-
(1987)
Health Psychology
, vol.6
, pp. 453-466
-
-
Wurtele, S.K.1
Maddux, J.E.2
-
44
-
-
84870326620
-
Increasing the Persuasiveness of IT Security Communication: Effects of Fear Appeals and Self-View
-
Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA
-
Xu, H., M. B. Rosson, and J. M. Carroll. 2007. "Increasing the Persuasiveness of IT Security Communication: Effects of Fear Appeals and Self-View," Workshop on Usable IT Security Management, Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA.
-
(2007)
Workshop On Usable it Security Management
-
-
Xu, H.1
Rosson, M.B.2
Carroll, J.M.3
-
45
-
-
12844275960
-
Password memorability and security: Empirical results
-
Yan, J., A. Blackwell, R. Anderson, and A. Grant. 2004. Password memorability and security: Empirical results. IEEE Security and Privacy, 2:25-31.
-
(2004)
IEEE Security and Privacy
, vol.2
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
46
-
-
33745608975
-
The role of impulsiveness in a TAM-based online purchasing behavior model
-
Zhang, X., V. R. Prybutok, and C. E. Koh. 2006. The role of impulsiveness in a TAM-based online purchasing behavior model. Information Resource Management Journal 19 (2): 54-68.
-
(2006)
Information Resource Management Journal
, vol.19
, Issue.2
, pp. 54-68
-
-
Zhang, X.1
Prybutok, V.R.2
Koh, C.E.3
|