메뉴 건너뛰기




Volumn 8, Issue 3-4, 2009, Pages 180-197

Am i really at risk? Determinants of online users' intentions to use strong passwords

Author keywords

Password protection; Privacy; Protection motivation theory; Security

Indexed keywords


EID: 77951655145     PISSN: 15332861     EISSN: 1533287X     Source Type: Journal    
DOI: 10.1080/15332860903467508     Document Type: Article
Times cited : (76)

References (47)
  • 2
    • 7744228242 scopus 로고    scopus 로고
    • Passwords reveal your personality
    • (accessed February 17, 2009)
    • Andrews, L. W. 2002. Passwords reveal your personality. Psychology Today. http://www.psychologytoday.com/articles/pto-20020101-000006.html (accessed February 17, 2009).
    • (2002) Psychology Today
    • Andrews, L.W.1
  • 3
    • 84986364572 scopus 로고
    • The effects of health threat seriousness and personal efficacy upon intentions and behavior
    • Beck, K. H., and A. K. Lund. 1981. The effects of health threat seriousness and personal efficacy upon intentions and behavior. Journal of Applied Social Psychology 11:401-415.
    • (1981) Journal of Applied Social Psychology , vol.11 , pp. 401-415
    • Beck, K.H.1    Lund, A.K.2
  • 4
    • 77951662387 scopus 로고    scopus 로고
    • User behaviors associated with password security and management
    • Bryant, K., and J. Campbell. 2006. User behaviors associated with password security and management. Australian Journal of Information Systems 14 (1): 81-100.
    • (2006) Australian Journal of Information Systems , vol.14 , Issue.1 , pp. 81-100
    • Bryant, K.1    Campbell, J.2
  • 5
    • 67650124268 scopus 로고    scopus 로고
    • The good and not so good of enforcing password composition rules
    • Campbell, J., D. Kleeman, and W. Ma. 2007. The good and not so good of enforcing password composition rules. Information Systems Security 16 (1): 2-8.
    • (2007) Information Systems Security , vol.16 , Issue.1 , pp. 2-8
    • Campbell, J.1    Kleeman, D.2    Ma, W.3
  • 7
    • 18544374846 scopus 로고    scopus 로고
    • Evaluation of the human impact of password authentication practices on information security
    • Carstens, D. S., R. P. McCauley-Bell, and R. F. DeMara. 2004. Evaluation of the human impact of password authentication practices on information security. Information Science Journal 7:67-85.
    • (2004) Information Science Journal , vol.7 , pp. 67-85
    • Carstens, D.S.1    McCauley-Bell, R.P.2    Demara, R.F.3
  • 8
    • 85001728633 scopus 로고    scopus 로고
    • Password security: An empirical investigation into e-commerce passwords and their crack times
    • Cazier, J. A., and B. D. Medlin. 2006. Password security: An empirical investigation into e-commerce passwords and their crack times. Information Systems Security 15 (6): 45-55.
    • (2006) Information Systems Security , vol.15 , Issue.6 , pp. 45-55
    • Cazier, J.A.1    Medlin, B.D.2
  • 9
    • 33845945922 scopus 로고
    • Coefficient alpha and the internal structure of tests
    • Cronbach, L. J. 1951. Coefficient alpha and the internal structure of tests. Psychometrika 16:297-334.
    • (1951) Psychometrika , vol.16 , pp. 297-334
    • Cronbach, L.J.1
  • 10
    • 85084161493 scopus 로고    scopus 로고
    • Déjà vu: A user study using images for authentication
    • August 14-17, Denver, CO
    • Dhamija, R., and A. Perrig. 2000. Déjà vu: A user study using images for authentication. Proceedings of 9th USENIX Security Symposium, August 14-17, 45-58. Denver, CO.
    • (2000) Proceedings of 9th USENIX Security Symposium , pp. 45-58
    • Dhamija, R.1    Perrig, A.2
  • 11
    • 35348884906 scopus 로고    scopus 로고
    • A large-scale study of web password habits
    • May 8-12, Banff, Alberta, Canada
    • Florêncio, D., and C. Herley. 2007. A large-scale study of web password habits. Proceedings of WWW 2007, May 8-12, Banff, Alberta, Canada.
    • (2007) Proceedings of WWW 2007
    • Florêncio, D.1    Herley, C.2
  • 14
    • 70349151365 scopus 로고    scopus 로고
    • Consumer motivation in taking action against spyware: An empirical investigation
    • Gurung, A., X. Luo, and Q. Liao. 2009. Consumer motivation in taking action against spyware: An empirical investigation. Information Management and Computer Security 17 (3): 276-289.
    • (2009) Information Management and Computer Security , vol.17 , Issue.3 , pp. 276-289
    • Gurung, A.1    Luo, X.2    Liao, Q.3
  • 16
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organizations
    • Herath, T., and H. R. Rao. 2009. Protection motivation and deterrence: A framework for security policy compliance in organizations. European Journal of Information Systems 18:106-125.
    • (2009) European Journal of Information Systems , vol.18 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 18
    • 77956811393 scopus 로고
    • Effects of fear arousal on attitude change: Recent development in theory and experimental research
    • ed. L. Berkowitz, San Diego, CA: Academic Press
    • Janis, I. L. 1967. Effects of fear arousal on attitude change: Recent development in theory and experimental research. In Advances in experimental social psychology (Vol. 3), ed. L. Berkowitz, 166-224. San Diego, CA: Academic Press.
    • (1967) Advances In Experimental Social Psychology , vol.3 , pp. 166-224
    • Janis, I.L.1
  • 19
    • 84976998771 scopus 로고
    • The application of electronic computers to factor analysis
    • Kaiser, H. F. 1960. The application of electronic computers to factor analysis. Education and Psychological Measurement 20:141-151.
    • (1960) Education and Psychological Measurement , vol.20 , pp. 141-151
    • Kaiser, H.F.1
  • 20
    • 0001863378 scopus 로고    scopus 로고
    • There are threats and (maybe) fear-caused arousal: Theory and confusions of appeals to fear and fear arousal itself
    • LaTour, M. S., and H. J. Rotfeld. 1997. There are threats and (maybe) fear-caused arousal: Theory and confusions of appeals to fear and fear arousal itself. Journal of Advertising 26:45-59.
    • (1997) Journal of Advertising , vol.26 , pp. 45-59
    • Latour, M.S.1    Rotfeld, H.J.2
  • 21
    • 51749090174 scopus 로고    scopus 로고
    • Keeping our network safe: A model of online protection behavior
    • Lee, D., R. Larose, and N. Rifon. 2008. Keeping our network safe: A model of online protection behavior. Behavior and Information Technology 27:445-454.
    • (2008) Behavior and Information Technology , vol.27 , pp. 445-454
    • Lee, D.1    Larose, R.2    Rifon, N.3
  • 22
    • 67650166189 scopus 로고    scopus 로고
    • Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software
    • Lee, Y., and K. R. Larsen. 2009. Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software. European Journal of Information Systems 18: 177-187.
    • (2009) European Journal of Information Systems , vol.18 , pp. 177-187
    • Lee, Y.1    Larsen, K.R.2
  • 23
    • 33750301341 scopus 로고    scopus 로고
    • Consumer perceptions and willingness to pay for intrinsically motivated online content
    • Lopes, A. B., and D. F. Galletta. 2006. Consumer perceptions and willingness to pay for intrinsically motivated online content. Journal of Management Information Systems 23 (2): 203-231.
    • (2006) Journal of Management Information Systems , vol.23 , Issue.2 , pp. 203-231
    • Lopes, A.B.1    Galletta, D.F.2
  • 24
    • 0000242433 scopus 로고
    • Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change
    • Maddux, J. E., and R. W. Rogers. 1983. Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology 19 (5): 469-479.
    • (1983) Journal of Experimental Social Psychology , vol.19 , Issue.5 , pp. 469-479
    • Maddux, J.E.1    Rogers, R.W.2
  • 25
    • 0000225960 scopus 로고
    • The nature of attitudes and attitude change
    • 2nd ed., eds. G. Lindzey, and E. Aronson, Reading, MA: Addison-Wesley
    • McGuire, W. J. 1969. The nature of attitudes and attitude change. In Handbook of social psychology, Vol. 3, 2nd ed., eds. G. Lindzey, and E. Aronson, 136-314. Reading, MA: Addison-Wesley.
    • (1969) Handbook of Social Psychology , vol.3 , pp. 136-314
    • McGuire, W.J.1
  • 26
    • 39749093168 scopus 로고
    • The magical number seven, plus or minus two: Some limits on our capacity for processing information
    • Miller, G. A. 1956. The magical number seven, plus or minus two: Some limits on our capacity for processing information. Psychological Review 63:81-97.
    • (1956) Psychological Review , vol.63 , pp. 81-97
    • Miller, G.A.1
  • 27
    • 0036106081 scopus 로고    scopus 로고
    • Combining motivational and volitional interventions to promote exercise participation: Protection motivation theory and implementation intentions
    • Milne, S., S. Orbell, and P. Sheeran. 2002. Combining motivational and volitional interventions to promote exercise participation: Protection motivation theory and implementation intentions. British Journal of Health Psychology 7:163-184.
    • (2002) British Journal of Health Psychology , vol.7 , pp. 163-184
    • Milne, S.1    Orbell, S.2    Sheeran, P.3
  • 28
    • 0033622371 scopus 로고    scopus 로고
    • Prediction and intervention in healthrelated behavior: A meta-analytic review of protection motivation theory
    • Milne, S., P. Sheeran, and S. Orbell. 2000. Prediction and intervention in healthrelated behavior: A meta-analytic review of protection motivation theory. Journal of Applied Social Psychology 30 (1): 106-143.
    • (2000) Journal of Applied Social Psychology , vol.30 , Issue.1 , pp. 106-143
    • Milne, S.1    Sheeran, P.2    Orbell, S.3
  • 29
    • 0033432325 scopus 로고    scopus 로고
    • An application of protection motivation theory to riskier single-occasion drinking
    • Murgraff, V., D. White, and K. Phillips. 1999. An application of protection motivation theory to riskier single-occasion drinking. Psychology and Health 14:339-350.
    • (1999) Psychology and Health , vol.14 , pp. 339-350
    • Murgraff, V.1    White, D.2    Phillips, K.3
  • 30
    • 0037396112 scopus 로고    scopus 로고
    • What to convey in antismoking advertisements for adolescents: The use of protection motivation theory to identify effective message theme
    • Pechmann, C., C. Zhao, M. E. Goldberg, and E. T. Reibling. 2003. What to convey in antismoking advertisements for adolescents: The use of protection motivation theory to identify effective message theme. Journal of Marketing 67:1-18.
    • (2003) Journal of Marketing , vol.67 , pp. 1-18
    • Pechmann, C.1    Zhao, C.2    Goldberg, M.E.3    Reibling, E.T.4
  • 31
    • 0036172609 scopus 로고    scopus 로고
    • Protection motivation theory and exercise behavior change for the prevention of coronary heart disease in a high-risk, Australian representative community sample of adults
    • Plotnikoff, R. C., and N. Higginbotham. 2002. Protection motivation theory and exercise behavior change for the prevention of coronary heart disease in a high-risk, Australian representative community sample of adults. Psychology, Health and Medicine 7 (1): 87-98.
    • (2002) Psychology, Health and Medicine , vol.7 , Issue.1 , pp. 87-98
    • Plotnikoff, R.C.1    Higginbotham, N.2
  • 32
    • 0001840352 scopus 로고
    • A protection motivation theory of fear appeals and attitude change
    • Rogers, R. W. 1975. A protection motivation theory of fear appeals and attitude change. Journal of Psychology 91:277-287.
    • (1975) Journal of Psychology , vol.91 , pp. 277-287
    • Rogers, R.W.1
  • 33
    • 0002795580 scopus 로고
    • Facts versus fears: Understanding perceived risks
    • eds. D. Kahneman, P. Slovic, and A. Tversky, New York: Cambridge University Press
    • Slovic, P., B. Fischhoff, and S. Lichtenstein. 1986. Facts versus fears: Understanding perceived risks. In Judgment under uncertainty: Heuristics and biases, eds. D. Kahneman, P. Slovic, and A. Tversky, 463-489. New York: Cambridge University Press.
    • (1986) Judgment Under Uncertainty: Heuristics and Biases , pp. 463-489
    • Slovic, P.1    Fischhoff, B.2    Lichtenstein, S.3
  • 34
    • 1142268188 scopus 로고    scopus 로고
    • Risk behavior of Internet shopping: Comparison of college students' versus non-student adults
    • September 30-October 3, Pittsburgh, PA
    • Su, B. 2003. Risk behavior of Internet shopping: comparison of college students' versus non-student adults. Proceedings of the 5th International Conference on Electronic Commerce, September 30-October 3, 181-185, Pittsburgh, PA.
    • (2003) Proceedings of The 5th International Conference On Electronic Commerce , pp. 181-185
    • Su, B.1
  • 35
    • 0002566719 scopus 로고
    • Fear-arousing communications: A critical examination of theory and research
    • ed. J. R. Eiser, London: Wiley
    • Sutton, S. R. 1982. Fear-arousing communications: a critical examination of theory and research. In Social psychology and behavioral medicine, ed. J. R. Eiser, 303-337. London: Wiley.
    • (1982) Social Psychology and Behavioral Medicine , pp. 303-337
    • Sutton, S.R.1
  • 37
    • 0002735809 scopus 로고
    • The protection motivation model: A normative model of fear appeals
    • Tanner, J. F., J. B. Hunt, and D. R. Eppright. 1991. The protection motivation model: A normative model of fear appeals. Journal of Marketing 55:36-45.
    • (1991) Journal of Marketing , vol.55 , pp. 36-45
    • Tanner, J.F.1    Hunt, J.B.2    Eppright, D.R.3
  • 39
    • 0242708745 scopus 로고    scopus 로고
    • Pretty good persuasion: A first step towards effective password security in the real world
    • Cloudscrofl, NM, September
    • Weirich, D., and M. A. Sasse. 2001. Pretty good persuasion: A first step towards effective password security in the real world. Proceedings of the 2001 Workshop on New Security Paradigms, Cloudscrofl, NM, September 10-13.
    • (2001) Proceedings of The 2001 Workshop On New Security Paradigms , pp. 10-13
    • Weirich, D.1    Sasse, M.A.2
  • 40
    • 42149161709 scopus 로고    scopus 로고
    • The psychology of security
    • West, R. 2008. The psychology of security. Communications of the ACM 51 (4): 34-41.
    • (2008) Communications of The ACM , vol.51 , Issue.4 , pp. 34-41
    • West, R.1
  • 42
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • Workman, M., W. H. Bommer, and D. Straub. 2008. Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior 24:2799-2816.
    • (2008) Computers In Human Behavior , vol.24 , pp. 2799-2816
    • Workman, M.1    Bommer, W.H.2    Straub, D.3
  • 43
    • 0023464691 scopus 로고
    • Relative contributions of protection motivation theory components in predicting exercise intentions and behavior
    • Wurtele, S. K., and J. E. Maddux. 1987. Relative contributions of protection motivation theory components in predicting exercise intentions and behavior. Health Psychology 6:453-466.
    • (1987) Health Psychology , vol.6 , pp. 453-466
    • Wurtele, S.K.1    Maddux, J.E.2
  • 44
    • 84870326620 scopus 로고    scopus 로고
    • Increasing the Persuasiveness of IT Security Communication: Effects of Fear Appeals and Self-View
    • Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA
    • Xu, H., M. B. Rosson, and J. M. Carroll. 2007. "Increasing the Persuasiveness of IT Security Communication: Effects of Fear Appeals and Self-View," Workshop on Usable IT Security Management, Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA.
    • (2007) Workshop On Usable it Security Management
    • Xu, H.1    Rosson, M.B.2    Carroll, J.M.3
  • 46
    • 33745608975 scopus 로고    scopus 로고
    • The role of impulsiveness in a TAM-based online purchasing behavior model
    • Zhang, X., V. R. Prybutok, and C. E. Koh. 2006. The role of impulsiveness in a TAM-based online purchasing behavior model. Information Resource Management Journal 19 (2): 54-68.
    • (2006) Information Resource Management Journal , vol.19 , Issue.2 , pp. 54-68
    • Zhang, X.1    Prybutok, V.R.2    Koh, C.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.