-
1
-
-
0000913978
-
Time flies when you're having fun: Cognitive absorption and beliefs about information technology
-
Agarwal, R., and Karahanna, E. 2000. "Time Flies When You're Having Fun: Cognitive Absorption and Beliefs about Information Technology," MIS Quarterly (24:4), pp. 665-694.
-
(2000)
MIS Quarterly
, vol.24
, Issue.4
, pp. 665-694
-
-
Agarwal, R.1
Karahanna, E.2
-
3
-
-
23344451064
-
Busting the ghost in the machine
-
Arnett, K. P., and Schmidt, M. B. 2005. "Busting the Ghost in the Machine," Communications of the ACM (48:8), pp. 92-95.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 92-95
-
-
Arnett, K.P.1
Schmidt, M.B.2
-
4
-
-
2642549662
-
Computer security and risky computing practices: A rational choice perspective
-
Aytes, K., and Connolly, T. 2004. "Computer Security and Risky Computing Practices: A Rational Choice Perspective," Journal of Organizational & End User Computing (16:3), pp. 22-40.
-
(2004)
Journal of Organizational & End User Computing
, vol.16
, Issue.3
, pp. 22-40
-
-
Aytes, K.1
Connolly, T.2
-
6
-
-
0001974386
-
Theoretical concepts, measurement, and meaning
-
C. Fornell (ed.), New York: Praeger.
-
Bagozzi, R. P., and Fornell, C. 1982. "Theoretical Concepts, Measurement, and Meaning," in A Second Generation of Multivariate Analysis, C. Fornell (ed.), New York: Praeger.
-
(1982)
A Second Generation of Multivariate Analysis
-
-
Bagozzi, R.P.1
Fornell, C.2
-
7
-
-
0019619664
-
A conceptualization of threat communications and protective health behavior
-
Beck, K. H., and Frankel, A. 1981. "A Conceptualization of Threat Communications and Protective Health Behavior," Social Psychology Quarterly (44:3), pp. 204-217.
-
(1981)
Social Psychology Quarterly
, vol.44
, Issue.3
, pp. 204-217
-
-
Beck, K.H.1
Frankel, A.2
-
8
-
-
0347973105
-
-
Bollen, K. A., and Lennox, R. 1991. 'Conventional Wisdom on Measurement: A Structural Equation Perspective," Psychological Bulletin (110:2), pp. 305-314.
-
(1991)
Psychological Bulletin
, vol.110
, Issue.2
, pp. 305-314
-
-
Bollen, K.A.1
Lennox, R.2
-
9
-
-
33751224822
-
Convergent and discriminant validation by the multi-trait-multi-method matrix
-
Campbell, D. T., and Fiske, D. W. 1959. "Convergent and Discriminant Validation by the Multi-Trait-Multi-Method Matrix," Psychological Bulletin (56:2), pp. 81-105.
-
(1959)
Psychological Bulletin
, vol.56
, Issue.2
, pp. 81-105
-
-
Campbell, D.T.1
Fiske, D.W.2
-
12
-
-
0017718490
-
Health beliefs and smoking patterns in heart patients and their wives: A longitudinal study
-
Croog, S. H., and Richards, N. P. 1977. "Health Beliefs and Smoking Patterns in Heart Patients and Their Wives: A Longitudinal Study," American Journal ofPublic Health (67:10), pp. 921-930.
-
(1977)
American Journal OfPublic Health
, vol.67
, Issue.10
, pp. 921-930
-
-
Croog, S.H.1
Richards, N.P.2
-
13
-
-
0035534144
-
Index construction with formative indicators: An alternative to scale development
-
Diamantopoulos, A., and Winklhofer, H. 2001. "Index Construction with Formative Indicators: An Alternative to Scale Development," Journal of Marketing Research (38:2), pp. 269-277.
-
(2001)
Journal of Marketing Research
, vol.38
, Issue.2
, pp. 269-277
-
-
Diamantopoulos, A.1
Winklhofer, H.2
-
14
-
-
0022526125
-
Understanding the effectiveness of computer graphics for decision support: A cumulative experimental approach
-
Dickson, G. W., DeSanctis, G., and McBride, D. J. 1986. "Understanding the Effectiveness of Computer Graphics for Decision Support: A Cumulative Experimental Approach," Communications of the ACM (29:1), pp. 40-47.
-
(1986)
Communications of the ACM
, vol.29
, Issue.1
, pp. 40-47
-
-
Dickson, G.W.1
Desanctis, G.2
McBride, D.J.3
-
15
-
-
0003551671
-
-
Reading, MA: Addison-Wesley.
-
Fishbein, M., and Ajzen, I. 1975. Belief, Attitude, Intention and Behavior, Reading, MA: Addison-Wesley.
-
(1975)
Belief Attitude Intention and Behavior
-
-
Fishbein, M.1
Ajzen, I.2
-
16
-
-
0000009769
-
Evaluating structural equations with unobservable variables and measurement error
-
Fornell, C., and Larcker, D. F. 1981. "Evaluating Structural Equations with Unobservable Variables and Measurement Error," Journal of Marketing Research (18:1), pp. 39-50.
-
(1981)
Journal of Marketing Research
, vol.18
, Issue.1
, pp. 39-50
-
-
Fornell, C.1
Larcker, D.F.2
-
17
-
-
0344096683
-
Trust and tam in online shopping: An integrated model
-
Gefen, D., Karahanna, E., and Straub, D. W. 2003. "Trust and TAM in Online Shopping: An Integrated Model," MIS Quarterly (27:1), pp. 51-90.
-
(2003)
MIS Quarterly
, vol.27
, Issue.1
, pp. 51-90
-
-
Gefen, D.1
Karahanna, E.2
Straub, D.W.3
-
18
-
-
29444460597
-
A practical guide to factorial validity using PLS-graph: Tutorial and annotated example
-
Gefen, D., and Straub, D. W. 2005. "A Practical Guide to Factorial Validity using PLS-Graph: Tutorial and Annotated Example," Communications of the AIS (16:25), pp. 91-109.
-
(2005)
Communications of the AIS
, vol.16
, Issue.25
, pp. 91-109
-
-
Gefen, D.1
Straub, D.W.2
-
19
-
-
0001823869
-
Security concerns of system users: A study of perceptions of the adequacy of security measures
-
Goodhue, D., and Straub, D. W. 1991. "Security Concerns of System Users: A Study of Perceptions of the Adequacy of Security Measures," Information and Management (20:1), pp. 13-27.
-
(1991)
Information and Management
, vol.20
, Issue.1
, pp. 13-27
-
-
Goodhue, D.1
Straub, D.W.2
-
20
-
-
0000615936
-
The 'science of the sophomore' revisited: From conjecture to empiricism
-
Gordon, M. E., Slade, L. A., and Schmitt, N. 1986. "The 'Science of the Sophomore' Revisited: From Conjecture to Empiricism," Academy of Management Review (11:1), pp. 191-207.
-
(1986)
Academy of Management Review
, vol.11
, Issue.1
, pp. 191-207
-
-
Gordon, M.E.1
Slade, L.A.2
Schmitt, N.3
-
21
-
-
0009267192
-
Computer use, control over computers, and job satisfaction
-
S. Oskamp, and S. Spacapan, (eds.), Newbury Park, CA: Sage Publications.
-
Gutek, B. A., and Winter, S. J. 1990. "Computer Use, Control Over Computers, and Job Satisfaction," in People's Reactions to Technology, The Claremont Symposium on Applied Social Psychology, S. Oskamp, and S. Spacapan, (eds.), Newbury Park, CA: Sage Publications.
-
(1990)
People's Reactions to Technology the Claremont Symposium on Applied Social Psychology
-
-
Gutek, B.A.1
Winter, S.J.2
-
22
-
-
85050649674
-
Explaining the role of user participation in information system use
-
Hartwick, J., and Barki, H. 1994. "Explaining the Role of User Participation in Information System Use," Management Science (40:4), pp. 440-465.
-
(1994)
Management Science
, vol.40
, Issue.4
, pp. 440-465
-
-
Hartwick, J.1
Barki, H.2
-
23
-
-
0002042413
-
The 9 to 5 underground: Are you policing computer crimes?
-
Hoffer, J. A., and Straub, D. W. 1989. "The 9 to 5 Underground: Are You Policing Computer Crimes?," Sloan Management Review (30:4), pp. 35-43.
-
(1989)
Sloan Management Review
, vol.30
, Issue.4
, pp. 35-43
-
-
Hoffer, J.A.1
Straub, D.W.2
-
24
-
-
11144285459
-
The impact offear appeals on processing and acceptance of action recommendations
-
Hoog, N. D., Stroebe, W., and Wit, J. B. 2005. "The Impact ofFear Appeals on Processing and Acceptance of Action Recommendations," Personality and Social Psychology Bulletin (31:1), pp. 24-33.
-
(2005)
Personality and Social Psychology Bulletin
, vol.31
, Issue.1
, pp. 24-33
-
-
Hoog, N.D.1
Stroebe, W.2
Wit, J.B.3
-
25
-
-
0004254851
-
-
New Haven, CT: Yale University Press.
-
Hovland, C., Janis, I. L., and Kelly, H. 1953. Communication and Persuasion, New Haven, CT: Yale University Press.
-
(1953)
Communication and Persuasion
-
-
Hovland, C.1
Janis, I.L.2
Kelly, H.3
-
26
-
-
77956811393
-
Effects of fear arousal on attitude change: Recent developments in theory and experimental research
-
L. Berkowitz (ed.), New York: Academic Press
-
Janis, I. L. 1967. "Effects of Fear Arousal on Attitude Change: Recent Developments in Theory and Experimental Research," in Advances in Experimental Social Psychology, L. Berkowitz (ed.), New York: Academic Press, pp. 166-225.
-
(1967)
Advances in Experimental Social Psychology
, pp. 166-225
-
-
Janis, I.L.1
-
27
-
-
0033265783
-
Communication and trust in global virtual teams
-
Jarvenpaa, S., and Leidner, D. 1999. "Communication and Trust in Global Virtual Teams," Organization Science (10:6), pp. 791-815.
-
(1999)
Organization Science
, vol.10
, Issue.6
, pp. 791-815
-
-
Jarvenpaa, S.1
Leidner, D.2
-
28
-
-
0242424963
-
A critical review of construct indicators and measurement model misspecification in marketing and consumer research
-
Jarvis, C. B., Mackenzie, P. M., and Podsakoff, P. M. 2003. "A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research," Journal of Consumer Research (30:2), pp. 199-218.
-
(2003)
Journal of Consumer Research
, vol.30
, Issue.2
, pp. 199-218
-
-
Jarvis, C.B.1
MacKenzie, P.M.2
Podsakoff, P.M.3
-
29
-
-
0000073514
-
Mood and self-efficacy: Impact of joy and sadness on perceived capabilities
-
Kavanagh, D. J., and Bower, G. H. 1985. "Mood and Self-Efficacy: Impact of Joy and Sadness on Perceived Capabilities," Cognitive Theory and Research (9), pp. 507-525.
-
(1985)
Cognitive Theory and Research
, vol.9
, pp. 507-525
-
-
Kavanagh, D.J.1
Bower, G.H.2
-
30
-
-
27244446521
-
The changing demographics: The diminishing role ofage and gender in computer usage
-
Knight, M. B., and Pearson, J. M. 2005. "The Changing Demographics: The Diminishing Role ofAge and Gender in Computer Usage," Journal of Organizational & End User Computing (17:4), pp. 49-65.
-
(2005)
Journal of Organizational & End User Computing
, vol.17
, Issue.4
, pp. 49-65
-
-
Knight, M.B.1
Pearson, J.M.2
-
31
-
-
0001863378
-
There are threats and (maybe) fear-caused arousal: Theory and confusions of appeals to fear and fear arousal itself
-
LaTour, M. S., and Rotfeld, H. J. 1997. "There are Threats and (Maybe) Fear-Caused Arousal: Theory and Confusions of Appeals to Fear and Fear Arousal Itself," Journal of Advertising (26:3), pp. 45-59.
-
(1997)
Journal of Advertising
, vol.26
, Issue.3
, pp. 45-59
-
-
Latour, M.S.1
Rotfeld, H.J.2
-
32
-
-
0039662352
-
Don't be afraid to use fear appeals: An experimental study
-
LaTour, M. S., and Snipes, R. L. 1996. "Don't be Afraid to Use Fear Appeals: An Experimental Study," Journal of Advertising Research (36:2), pp. 59-67.
-
(1996)
Journal of Advertising Research
, vol.36
, Issue.2
, pp. 59-67
-
-
Latour, M.S.1
Snipes, R.L.2
-
34
-
-
77956837493
-
Findings and theory in the study of fear communications
-
L. Berkowitz (ed.), New Yorik: Academic Press.
-
Leventhal, H. 1970. "Findings and Theory in the Study of Fear Communications," in Advances in Experimental Social Psychology, L. Berkowitz (ed.), New Yorik: Academic Press.
-
(1970)
Advances in Experimental Social Psychology
-
-
Leventhal, H.1
-
35
-
-
0015069529
-
Fear appeals and persuasion: The differentiation of a motivational construct
-
Leventhal, H. 1971. "Fear Appeals and Persuasion: The Differentiation of a Motivational Construct," American Journal ofPublic Health (61), pp. 1208-1224.
-
(1971)
American Journal OfPublic Health
, vol.61
, pp. 1208-1224
-
-
Leventhal, H.1
-
36
-
-
9744226442
-
Sources of influence on beliefs about information technology use: An empirical study of knowledge workers
-
Lewis W., Agarwal, R., and Sambamurthy, V. 2003. "Sources of Influence on Beliefs about Information Technology Use: An Empirical Study of Knowledge Workers," MIS Quarterly (27:4), pp. 657-678.
-
(2003)
MIS Quarterly
, vol.27
, Issue.4
, pp. 657-678
-
-
Lewis, W.1
Agarwal, R.2
Sambamurthy, V.3
-
37
-
-
0000133760
-
Threats to information systems: Today's reality, yesterday's understanding
-
Loch, K. D., Carr, H. H., and Warkentin, M. E. 1992. "Threats to Information Systems: Today's Reality, Yesterday's Understanding," MIS Quarterly (16:2), pp. 173-186.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
38
-
-
0037322632
-
Diffusing the internet in the arab world: The role of social norms and technological culturation
-
Loch, K. D., Straub, D. W., and Kamel, S. Kamel. 2003. "Diffusing the Internet in the Arab World: The Role of Social Norms and Technological Culturation," IEEE Transactions on Engineering Management (50:1), pp. 45-63.
-
(2003)
IEEE Transactions on Engineering Management
, vol.50
, Issue.1
, pp. 45-63
-
-
Loch, K.D.1
Straub, D.W.2
Kamel, S.K.3
-
39
-
-
0000242433
-
Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change
-
Maddux, J. E., and Rogers, R. W. 1983. "Protection Motivation and Self-Efficacy: A Revised Theory of Fear Appeals and Attitude Change," Journal of Experimental Social Psychology (19), pp. 469-479.
-
(1983)
Journal of Experimental Social Psychology
, vol.19
, pp. 469-479
-
-
Maddux, J.E.1
Rogers, R.W.2
-
40
-
-
0032341068
-
The multilevel and multifaceted character of computer self-efficacy: Toward clarification of the construct and an integrative framework for research
-
Marakas, G. M., Yi, M. Y., and Johnson, R. D. 1998. "The Multilevel and Multifaceted Character of Computer Self-Efficacy: Toward Clarification of the Construct and an Integrative Framework for Research," Information Systems Research (9:2), pp. 126-163.
-
(1998)
Information Systems Research
, vol.9
, Issue.2
, pp. 126-163
-
-
Marakas, G.M.1
Yi, M.Y.2
Johnson, R.D.3
-
41
-
-
0002181702
-
Dilemmatics: The study of research choices and dilemmas
-
J. McGrath, J. Martin, and R. Kulka (eds.), Beverly Hills, CA: Sage Publications
-
McGrath, J. 1982. "Dilemmatics: The Study of Research Choices and Dilemmas," in Judgement Calls in Research, J. McGrath, J. Martin, and R. Kulka (eds.), Beverly Hills, CA: Sage Publications, pp. 69-103.
-
(1982)
Judgement Calls in Research
, pp. 69-103
-
-
McGrath, J.1
-
42
-
-
0002395399
-
Personality and susceptibility to social influence
-
E. Borgatta and W. Lambert (eds.), Chicago: Rand McNally
-
McGuire W. J. 1968. "Personality and Susceptibility to Social Influence," in Handbook of Personality Theory and Research, E. Borgatta and W. Lambert (eds.), Chicago: Rand McNally, pp. 1130-1187.
-
(1968)
Handbook of Personality Theory and Research
, pp. 1130-1187
-
-
McGuire, W.J.1
-
43
-
-
0000225960
-
The nature of attitudes and attitude change
-
G. Lindzey and E. Aronson (eds.), Reading, MA: Addison-Wesley
-
McGuire W. J. 1969. "The Nature of Attitudes and Attitude Change," in The Handbook ofSocialPsychology, G. Lindzey and E. Aronson (eds.), Reading, MA: Addison-Wesley, pp. 136-314.
-
(1969)
The Handbook OfSocialPsychology
, pp. 136-314
-
-
McGuire, W.J.1
-
44
-
-
0000080385
-
Effects of threatening and reassuring components of fear appeals on physiological and verbal measures of emotion and attitudes
-
Mewborn, C. R., and Rogers, R. W. 1979. "Effects of Threatening and Reassuring Components of Fear Appeals on Physiological and Verbal Measures of Emotion and Attitudes," Journal of Experimental Social Psychology (15:3), pp. 242-253.
-
(1979)
Journal of Experimental Social Psychology
, vol.15
, Issue.3
, pp. 242-253
-
-
Mewborn, C.R.1
Rogers, R.W.2
-
45
-
-
73449149291
-
Development of an instrument to measure the perceptions of adopting an information technology innovation
-
Moore, G. C., and Benbasat, I. 1991. "Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation," Information Systems Research (2:3), pp. 192-222.
-
(1991)
Information Systems Research
, vol.2
, Issue.3
, pp. 192-222
-
-
Moore, G.C.1
Benbasat, I.2
-
46
-
-
84990556364
-
-
Niederman, F., and DeSanctis, G. 1995. "The Impact of a Structured-Argument Approachon Group Problem Formulation," Decision Sciences (26:4), pp. 451-474.
-
(1995)
Decision Sciences
, vol.26
, Issue.4
, pp. 451-474
-
-
Niederman, F.1
Desanctis, G.2
-
48
-
-
38549116762
-
Specifying formative constructs in information systems research
-
Petter S., Straub, D. W., and Rai, A. 2007. "Specifying Formative Constructs in Information Systems Research," MIS Quarterly (31:4), pp. 623-656.
-
(2007)
MIS Quarterly
, vol.31
, Issue.4
, pp. 623-656
-
-
Petter, S.1
Straub, D.W.2
Rai, A.3
-
50
-
-
0001840352
-
A protection motivation theory of fear appeals and attitude change
-
Rogers, R. W. 1975. "A Protection Motivation Theory of Fear Appeals and Attitude Change," Journal of Psychology (91), pp. 93-114.
-
(1975)
Journal of Psychology
, vol.91
, pp. 93-114
-
-
Rogers, R.W.1
-
51
-
-
0002247369
-
Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protected motivation
-
J. T. Cacioppo, and R. E. Petty (eds.), New York: The Guilford Press.
-
Rogers, R. W. 1983. "Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protected Motivation," in Social Psychophysiology: A Source-book, J. T. Cacioppo, and R. E. Petty (eds.), New York: The Guilford Press.
-
(1983)
Social Psychophysiology A Source-book
-
-
Rogers, R.W.1
-
52
-
-
3242703186
-
Fear appeal messages affect accessibility of attitudes toward the threat and adaptive behaviors
-
Roskos-Ewoldsen, D. R., Yu, H. J., and Rhodes, N. 2004. "Fear Appeal Messages Affect Accessibility of Attitudes Toward the Threat and Adaptive Behaviors," Communication Monographs (71:1), pp. 49-69.
-
(2004)
Communication Monographs
, vol.71
, Issue.1
, pp. 49-69
-
-
Roskos-Ewoldsen, D.R.1
Yu, H.J.2
Rhodes, N.3
-
53
-
-
23344441723
-
Spyware: A little knowledge is a wonderful thing
-
Schmidt, M. B., and Arnett, K. P. 2005. "Spyware: A Little Knowledge is a Wonderful Thing," Communications of the ACM (48:8), pp. 67-70.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 67-70
-
-
Schmidt, M.B.1
Arnett, K.P.2
-
54
-
-
0035315222
-
Visual and auditory message framing effects on tobacco smoking
-
Schneider, T. R., Salovey, P., Pallonen, U., Mundorf, N, Smith, N. F., and Steward, W. T. 2001. "Visual and Auditory Message Framing Effects on Tobacco Smoking," Journal of Applied Social Psychology (31:4), pp. 667-682.
-
(2001)
Journal of Applied Social Psychology
, vol.31
, Issue.4
, pp. 667-682
-
-
Schneider, T.R.1
Salovey, P.2
Pallonen, U.3
Mundorf, N.4
Smith, N.F.5
Steward, W.T.6
-
57
-
-
0021718460
-
The role of vivid information in fear appeals and attitude change
-
Sherer, M., and Rogers, R. W. 1984. "The Role of Vivid Information in Fear Appeals and Attitude Change," Journal of Research in Personality (18:3), pp. 321-334.
-
(1984)
Journal of Research in Personality
, vol.18
, Issue.3
, pp. 321-334
-
-
Sherer, M.1
Rogers, R.W.2
-
58
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Siponen, M. T. 2000. "A Conceptual Foundation for Organizational Information Security Awareness," Information Management and Computer Security (8:1), pp. 31-41.
-
(2000)
Information Management and Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.T.1
-
59
-
-
23744494344
-
Data in organization studies
-
S. Clegg and C. Hardy (eds.), London: Sage Publications
-
Stablein. R. 1999. "Data in Organization Studies," in Studying Organizations: Theory and Method, S. Clegg and C. Hardy (eds.), London: Sage Publications, pp.255-271.
-
(1999)
Studying Organizations Theory and Method
, pp. 255-271
-
-
Stablein, R.1
-
60
-
-
13244286108
-
Validation guidelines for is positivist research
-
Straub, D. W., Boudreau, M. C., and Gefen, D. 2004. "Validation Guidelines for IS Positivist Research," Communications of AIS (13), pp. 380-427.
-
(2004)
Communications of AIS
, vol.13
, pp. 380-427
-
-
Straub, D.W.1
Boudreau, M.C.2
Gefen, D.3
-
61
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D. W., and Welke, R. J. 1998. "Coping with Systems Risk: Security Planning Models for Management Decision Making," MIS Quarterly (22:4), pp. 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
62
-
-
0002566719
-
Fear-arousing communications: A critical examination of theory and research
-
J. R. Eiser (ed.), London: Wiley
-
Sutton, S. R. 1982. "Fear-Arousing Communications: A Critical Examination of Theory and Research," in Social Psychology and Behavioral Medicine, J. R. Eiser (ed.), London: Wiley, pp. 303-337.
-
(1982)
Social Psychology and Behavioral Medicine
, pp. 303-337
-
-
Sutton, S.R.1
-
63
-
-
38749129220
-
Personal computing: Toward a conceptual model of utilization
-
Thompson, R. L., Higgins, C. A., and Howell, J. M. 1991. "Personal Computing: Toward a Conceptual Model of Utilization," MIS Quarterly (15:1), pp. 125-143.
-
(1991)
MIS Quarterly
, vol.15
, Issue.1
, pp. 125-143
-
-
Thompson, R.L.1
Higgins, C.A.2
Howell, J.M.3
-
64
-
-
0033872521
-
A theoretical extension of the technology acceptance model
-
Venkatesh, V., and Davis, F. D. 2000. "A Theoretical Extension of the Technology Acceptance Model," Management Science (46:2), pp. 186-204.
-
(2000)
Management Science
, vol.46
, Issue.2
, pp. 186-204
-
-
Venkatesh, V.1
Davis, F.D.2
-
65
-
-
1542382496
-
User acceptance of information technology: Toward a unified view
-
Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D. 2003. "User Acceptance of Information Technology: Toward a Unified View," MIS Quarterly (27:3), pp. 425-478.
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.G.2
Davis, G.B.3
Davis, F.D.4
-
66
-
-
2642569127
-
Introducing the check-off password system
-
Warkentin, M., Davis, K., and Bekkering, E. 2004. "Introducing the Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security," Journal of Organizational & End User Computing (16:3), pp. 41-58.
-
(2004)
Journal of Organizational & End User Computing (163)
, pp. 41-58
-
-
Warkentin, M.1
Davis, K.2
Bekkering, E.3
-
67
-
-
77955101093
-
It security governance and centralized security controls
-
M. Warkentin, and R. Vaughn (eds.), Hershey, PA: Idea Group Publishing
-
Warkentin, M., and Johnston, A. C. 2006. "IT Security Governance and Centralized Security Controls," in Enterprise Information Assurance and System Security: Managerial and Technical Issues, M. Warkentin, and R. Vaughn (eds.), Hershey, PA: Idea Group Publishing, pp. 16-24.
-
(2006)
Enterprise Information Assurance and System Security Managerial and Technical Issues
, pp. 16-24
-
-
Warkentin, M.1
Johnston, A.C.2
-
68
-
-
85106113141
-
It governance and organizational design for security management
-
D. W. Straub, S. Goodman, and R. L. Baskerville (eds.), Armonk, NY: M. E. Sharpe
-
Warkentin, M., and Johnston, A. C. 2008. "IT Governance and Organizational Design for Security Management," in Information Security: Policies, Processes, and Practices, D. W. Straub, S. Goodman, and R. L. Baskerville (eds.), Armonk, NY: M. E. Sharpe, pp. 46-68.
-
(2008)
Information Security Policies Processes and Practices
, pp. 46-68
-
-
Warkentin, M.1
Johnston, A.C.2
-
69
-
-
23344441842
-
A framework for spyware assessment
-
Warkentin, M., Luo, X., and Templeton, G. F. 2005. "A Framework for Spyware Assessment," Communications of the ACM (48:8), pp. 79-84.
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 79-84
-
-
Warkentin, M.1
Luo, X.2
Templeton, G.F.3
-
70
-
-
0031327244
-
Virtual teams versus face-to-face teams: An exploratory study of a web-based conference system
-
Warkentin, M., Sayeed, L., and Hightower, R. 1997. "Virtual Teams Versus Face-to-Face Teams: An Exploratory Study of a Web-Based Conference System," Decision Sciences (28:4), pp. 975-996.
-
(1997)
Decision Sciences
, vol.28
, Issue.4
, pp. 975-996
-
-
Warkentin, M.1
Sayeed, L.2
Hightower, R.3
-
71
-
-
84870167456
-
The it security adoption conundrum: An initial step toward validation of applicable measures
-
Keystone, CO, August 9-11.
-
Warkentin, M., Shropshire, J. and Johnston, A. C. 2007. "The IT Security Adoption Conundrum: An Initial Step Toward Validation of Applicable Measures," Proceedings of the 2007 Americas Conference on Information Systems, Keystone, CO, August 9-11.
-
(2007)
Proceedings of the 2007 Americas Conference on Information Systems
-
-
Warkentin, M.1
Shropshire, J.2
Johnston, A.C.3
-
72
-
-
67650170305
-
Behavioral and policy issues in information systems security: The insider threat
-
Warkentin, M., and Willison, R. 2009. "Behavioral and Policy Issues in Information Systems Security: The Insider Threat," European Journal of Information Systems (18:2), pp. 101-105.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 101-105
-
-
Warkentin, M.1
Willison, R.2
-
73
-
-
84941646855
-
Putting the fear back into fear appeals: The extended parallel process model
-
Witte, K. 1992. "Putting the Fear Back into Fear Appeals: The Extended Parallel Process Model," Communication Monographs (59), pp. 329-349.
-
(1992)
Communication Monographs
, vol.59
, pp. 329-349
-
-
Witte, K.1
-
74
-
-
84963164127
-
Fear control and danger control: A test of the extended parallel process model (EPPM)
-
Witte, K. 1994. "Fear Control and Danger Control: A Test of the Extended Parallel Process Model (EPPM)," Communication Monographs (61), pp. 113-134.
-
(1994)
Communication Monographs
, vol.61
, pp. 113-134
-
-
Witte, K.1
-
75
-
-
0030251478
-
Predicting risk behaviors: Development and validation f a diagnostic scale
-
Witte, K., Cameron, K. A., McKeon, J. K., and Berkowitz, J. M. 1996. "Predicting Risk Behaviors: Development and Validation f a Diagnostic Scale," Journal of Health Communication (1), pp. 317-341.
-
(1996)
Journal of Health Communication
, vol.1
, pp. 317-341
-
-
Witte, K.1
Cameron, K.A.2
McKeon, J.K.3
Berkowitz, J.M.4
|