-
1
-
-
33845275228
-
Who are the victims of identity theft? The effect of demographics
-
Anderson, K. B., 2006. Who are the victims of identity theft? The effect of demographics. Journal of Public Policy and Marketing, 25 (2), 160-171.
-
(2006)
Journal of Public Policy and Marketing
, vol.25
, Issue.2
, pp. 160-171
-
-
Anderson, K.B.1
-
2
-
-
33750440197
-
The economics of information security
-
Anderson, R. and Moore, T., 2006. The economics of information security. Science, 314, 610-613.
-
(2006)
Science
, vol.314
, pp. 610-613
-
-
Anderson, R.1
Moore, T.2
-
4
-
-
0023020183
-
The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations
-
Baron, R. and Kenny, D., 1986. The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology, 51 (6), 1173-1182.
-
(1986)
Journal of Personality and Social Psychology
, vol.51
, Issue.6
, pp. 1173-1182
-
-
Baron, R.1
Kenny, D.2
-
6
-
-
33846367309
-
People - often the weakest link in security, but one of the best places to start: Without awareness and training, security compliance is not possible
-
Bresz, F. P., 2004. People - often the weakest link in security, but one of the best places to start: without awareness and training, security compliance is not possible. Journal of Health Care Compliance, 6 (4), 57-61.
-
(2004)
Journal of Health Care Compliance
, vol.6
, Issue.4
, pp. 57-61
-
-
Bresz, F.P.1
-
7
-
-
77952001229
-
Controlling authentication in a health care environment: Multi-factor mechanisms may be one option for your organization
-
Bresz, F. P. and Villacres, C., 2004. Controlling authentication in a health care environment: multi-factor mechanisms may be one option for your organization. Journal of Health Care Compliance, 6 (6), 52-54.
-
(2004)
Journal of Health Care Compliance
, vol.6
, Issue.6
, pp. 52-54
-
-
Bresz, F.P.1
Villacres, C.2
-
8
-
-
77951662387
-
User behaviours associated with password security and management
-
Bryant, K. and Campbell, J., 2006. User behaviours associated with password security and management. Australasian Journal of Information System, 14 (1), 81-100.
-
(2006)
Australasian Journal of Information System
, vol.14
, Issue.1
, pp. 81-100
-
-
Bryant, K.1
Campbell, J.2
-
9
-
-
33846047871
-
Unrealistic optimism in internet events
-
Campbell, J., et al., 2007. Unrealistic optimism in internet events. Computers in Human Behaviour, 23, 1273-1284.
-
(2007)
Computers in Human Behaviour
, vol.23
, pp. 1273-1284
-
-
Campbell, J.1
-
10
-
-
12344331343
-
Passwordbased authentication: A system perspective
-
Conklin, A., Dietrich, G., and Walz, D., 2004. Passwordbased authentication: a system perspective. In: Proceedings of the 37th Hawaii International Conference on System Sciences, 1-10.
-
(2004)
Proceedings of the 37th Hawaii International Conference on System Sciences
, pp. 1-10
-
-
Conklin, A.1
Dietrich, G.2
Walz, D.3
-
11
-
-
77951986850
-
Security expert: User education is pointless
-
Online. Available from
-
Evers, J., 2006. Security expert: user education is pointless. CNet News [Online]. Available from: http://news.com. com/2102-7350-3-6125213.html
-
(2006)
CNet News
-
-
Evers, J.1
-
12
-
-
2542595586
-
The pros and cons of temporally near and distant action
-
Eyal, T., et al., 2004. The pros and cons of temporally near and distant action. Journal of Personality and Social Psychology, 86 (6), 781-795.
-
(2004)
Journal of Personality and Social Psychology
, vol.86
, Issue.6
, pp. 781-795
-
-
Eyal, T.1
-
13
-
-
33644773926
-
Is that authentic or artificial? Understanding consumer perceptions of risk in e-service encounters
-
Featherman, M. S., Valacich, J. S., and Wells, J. D., 2006. Is that authentic or artificial? Understanding consumer perceptions of risk in e-service encounters. Information Systems Journal, 16, 107-134.
-
(2006)
Information Systems Journal
, vol.16
, pp. 107-134
-
-
Featherman, M.S.1
Valacich, J.S.2
Wells, J.D.3
-
14
-
-
32444433117
-
The challenges of understanding and using security: A survey of end-users
-
Furnell, S., Jusoh, A., and Katsabas, D., 2006. The challenges of understanding and using security: a survey of end-users. Computers & Security, 25, 27-35.
-
(2006)
Computers & Security
, vol.25
, pp. 27-35
-
-
Furnell, S.1
Jusoh, A.2
Katsabas, D.3
-
15
-
-
35248846782
-
Password management strategies for online accounts
-
July, Pittsburgh, PA, USA
-
Gaw, S. and Felten, E. W., 2006. Password management strategies for online accounts. In: Symposium on Usable Privacy and Security (SOUPS), July 12-14, Pittsburgh, PA, USA.
-
(2006)
Symposium on Usable Privacy and Security (SOUPS)
, pp. 12-14
-
-
Gaw, S.1
Felten, E.W.2
-
17
-
-
33746363214
-
From the editor: Passwords and passion
-
July/Aug
-
Harrison, W., 2006. From the editor: passwords and passion. IEEE Software, July/Aug. 5-7.
-
(2006)
IEEE Software
, pp. 5-7
-
-
Harrison, W.1
-
18
-
-
33751168960
-
The usability of passphrases for authentication: An empirical field study
-
Keith, M., Shao, B., and Steinbart, P. J., 2007. The usability of passphrases for authentication: an empirical field study. International Journal of Human-Computer Studies, 65 (1), 17-28.
-
(2007)
International Journal of Human-Computer Studies
, vol.65
, Issue.1
, pp. 17-28
-
-
Keith, M.1
Shao, B.2
Steinbart, P.J.3
-
19
-
-
77951996550
-
Four in ten security staffers write down passwords
-
June 13
-
Millman, R., 2006. Four in ten security staffers write down passwords. SC Magazine, June 13.
-
(2006)
SC Magazine
-
-
Millman, R.1
-
20
-
-
77951999292
-
Googling for ATM masters passwords
-
21 Sept
-
Naraine, R., 2006. Googling for ATM masters passwords. eWeek.com, 21 Sept.
-
(2006)
EWeek.com
-
-
Naraine, R.1
-
22
-
-
77951984499
-
How security breaches impact your brand
-
31 Oct
-
Powell, J., 2006. How security breaches impact your brand. Enterprise Systems, 31 Oct.
-
(2006)
Enterprise Systems
-
-
Powell, J.1
-
25
-
-
74049121475
-
-
Online. Available from:, Accessed 18 January
-
Schneier, B., 2007b. The psychology of security [Online]. Available from: http://www.schneier.com/essay-155.html [Accessed 18 January 2008].
-
(2007)
The Psychology of Security
-
-
Schneier, B.1
-
26
-
-
17844366573
-
Analysis of end user security behaviors
-
Stanton, J., et al., 2005. Analysis of end user security behaviors. Computers & Security, 24, 124-133.
-
(2005)
Computers & Security
, vol.24
, pp. 124-133
-
-
Stanton, J.1
-
27
-
-
34250782167
-
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
-
Tari, F., Ozok, A., and Holden, S., 2006. A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. In: Proceedings of SOUPS 2006 Symposium on Usable Privacy and Security, 56-66.
-
(2006)
Proceedings of SOUPS 2006 Symposium on Usable Privacy and Security
, pp. 56-66
-
-
Tari, F.1
Ozok, A.2
Holden, S.3
-
28
-
-
0042766176
-
Temporal construal
-
Trope, Y. and Liberman, N., 2003. Temporal construal. Psychological Review, 110 (3), 403-421.
-
(2003)
Psychological Review
, vol.110
, Issue.3
, pp. 403-421
-
-
Trope, Y.1
Liberman, N.2
-
29
-
-
77951987149
-
Study: Weak passwords really do help hackers
-
7 February
-
Weiss, T., 2007. Study: weak passwords really do help hackers. Computerworld, 7 February.
-
(2007)
Computerworld
-
-
Weiss, T.1
-
30
-
-
77951984848
-
-
Online. Available from:, Accessed 24 October 2006
-
Wilson, T., 2006. It's the people, stupid [Online]. Available from: http://www.darkreading.com/document.asp?doc-id=108163 [Accessed 24 October 2006].
-
(2006)
It's the People, Stupid
-
-
Wilson, T.1
-
31
-
-
22544463354
-
Changing circumstances, disrupting habits
-
Wood, W., Tam, L., and Witt, M., 2005. Changing circumstances, disrupting habits. Journal of Personality and Social Psychology, 88 (6), 918-933.
-
(2005)
Journal of Personality and Social Psychology
, vol.88
, Issue.6
, pp. 918-933
-
-
Wood, W.1
Tam, L.2
Witt, M.3
-
32
-
-
27944510130
-
Perceived security determinants in e-commerce among Turkish university students
-
Yenisey, M., Ozok, A., and Salvendy, G., 2005. Perceived security determinants in e-commerce among Turkish university students. Behaviour & Information Technology, 24 (4), 259-274.
-
(2005)
Behaviour & Information Technology
, vol.24
, Issue.4
, pp. 259-274
-
-
Yenisey, M.1
Ozok, A.2
Salvendy, G.3
|