-
2
-
-
0032590244
-
Distinguishing perceptions of control from self-efficacy: Predicting consumption of a low-fat diet using the theory of planned behaviour
-
C.J. Armitage, and M. Conner Distinguishing perceptions of control from self-efficacy: predicting consumption of a low-fat diet using the theory of planned behaviour Journal of Applied Social Psychology 29 1999 72 90
-
(1999)
Journal of Applied Social Psychology
, vol.29
, pp. 72-90
-
-
Armitage, C.J.1
Conner, M.2
-
3
-
-
0017472917
-
Self efficacy: Toward a unifying theory of behavioral change
-
A. Bandura Self efficacy: toward a unifying theory of behavioral change Psychological Review 84 1977 191 215
-
(1977)
Psychological Review
, vol.84
, pp. 191-215
-
-
Bandura, A.1
-
5
-
-
28844460781
-
Predicting dishonest actions using the theory of planned behavior
-
L. Beck, and I. Ajzen Predicting dishonest actions using the theory of planned behavior Journal of Research in Personality 25 1991 285 301
-
(1991)
Journal of Research in Personality
, vol.25
, pp. 285-301
-
-
Beck, L.1
Ajzen, I.2
-
6
-
-
18044400861
-
Actions do speak louder than words: Deterring plagiarism with the use of plagiarism-detection software
-
DOI 10.1017/S1049096501000786
-
B.F. Braumoeller, and B.J. Gaines Actions do speak louder than words: deterring plagiarism with the use of plagiarism-detection software Cambridge Journals 34 4 2001 835 839 (Pubitemid 33573206)
-
(2001)
PS - Political Science and Politics
, vol.34
, Issue.4
, pp. 835-839
-
-
Braumoeller, B.F.1
Gaines, B.J.2
-
7
-
-
4043057949
-
Ethical misconduct in the business school: A case of plagiarism that turned bitter
-
DOI 10.1023/B:BUSI.0000013864.76547.d5
-
C. Cabral-Cardoso Ethical misconduct in the business school: a case of plagiarism that turned bitter Journal of Business Ethics 49 2004 75 89 (Pubitemid 39063758)
-
(2004)
Journal of Business Ethics
, vol.49
, Issue.1
, pp. 75-89
-
-
Cabral-Cardoso, C.1
-
12
-
-
49149116092
-
Computer self efficacy: Development of a measure and initial test
-
D.R. Compeau, and C.A. Higgins Computer self efficacy: development of a measure and initial test MIS Quarterly 19 2 1995 189 212
-
(1995)
MIS Quarterly
, vol.19
, Issue.2
, pp. 189-212
-
-
Compeau, D.R.1
Higgins, C.A.2
-
13
-
-
0032327732
-
Extending the theory of planned behavior: A review and avenues for further research
-
M. Conner, and C.J. Armitage Extending the theory of planned behavior: a review and avenues for further research Journal of Applied Social Psychology 28 15 1998 1429 1464
-
(1998)
Journal of Applied Social Psychology
, vol.28
, Issue.15
, pp. 1429-1464
-
-
Conner, M.1
Armitage, C.J.2
-
15
-
-
3242695274
-
Predicting intentions to consume functional foods and supplements to offset memory loss using an adaptation of protection motivation theory
-
DOI 10.1016/j.appet.2004.02.003, PII S0195666304000376
-
D.N. Cox, A. Koster, and C.G. Russell Predicting intentions to consume functional foods and supplements to offset memory loss using an adaptation of protection motivation theory Appetite 43 2004 55 64 (Pubitemid 38942775)
-
(2004)
Appetite
, vol.43
, Issue.1
, pp. 55-64
-
-
Cox, D.N.1
Koster, A.2
Russell, C.G.3
-
16
-
-
0001808803
-
Extending the technology acceptance model with task-technology fit constructs
-
PII S0378720698001013
-
M.T. Dishawa, and D.M. Strong Extending the technology acceptance model with task-technology fit constructs Information Management 36 1 1999 9 21 (Pubitemid 129524590)
-
(1999)
Information and Management
, vol.36
, Issue.1
, pp. 9-21
-
-
Dishaw, M.T.1
Strong, D.M.2
-
17
-
-
0034340147
-
Environmental ethical decision-making in the U.S. metal-finishing industry
-
B.L. Flannery, and D.R. May Environmental ethical decision-making in the U.S. metal-finishing industry Academy of Management Journal 43 4 2000 642 662
-
(2000)
Academy of Management Journal
, vol.43
, Issue.4
, pp. 642-662
-
-
Flannery, B.L.1
May, D.R.2
-
19
-
-
21844487262
-
Protection motivation theory and adherence to medical treatment regimens for muscular dystrophy
-
M.F. Flynn, R.D. Lyman, and S. Prentice-Dunn Protection motivation theory and adherence to medical treatment regimens for muscular dystrophy Journal of Social and Clinical Psychology 14 6 1995 61 75
-
(1995)
Journal of Social and Clinical Psychology
, vol.14
, Issue.6
, pp. 61-75
-
-
Flynn, M.F.1
Lyman, R.D.2
Prentice-Dunn, S.3
-
20
-
-
0000009769
-
Evaluating structural equations models with unobservable variables and measurement error
-
C. Fornell, and D.F. Larcker Evaluating structural equations models with unobservable variables and measurement error Journal of Marketing Research 18 1 1981 39 50
-
(1981)
Journal of Marketing Research
, vol.18
, Issue.1
, pp. 39-50
-
-
Fornell, C.1
Larcker, D.F.2
-
21
-
-
5444220793
-
Plagiarism-detection tool creates legal quandary: When professors send students' papers to a database, are copyrights violated?
-
A.L. Foster Plagiarism-detection tool creates legal quandary: when professors send students' papers to a database, are copyrights violated? Chronicle of Higher Education 48 36 2002 A37 A42
-
(2002)
Chronicle of Higher Education
, vol.48
, Issue.36
-
-
Foster, A.L.1
-
22
-
-
78650179458
-
Professors use technology to fight plagiarism
-
L. Garber Professors use technology to fight plagiarism IEEE Computer 2002, August 24
-
(2002)
IEEE Computer
, pp. 24
-
-
Garber, L.1
-
24
-
-
10044274571
-
Term paper mills, anti-plagiarism tools, and academic integrity
-
M. Groark, D. Oblinger, and M. Choa Term paper mills, anti-plagiarism tools, and academic integrity Educause Review 2001 last accessed: January 24, 2007, 2007, at: http://www.educause.edu/ir/library/pdf/erm0153.pdf.
-
(2001)
Educause Review
-
-
Groark, M.1
Oblinger, D.2
Choa, M.3
-
26
-
-
0007038522
-
Coping with the energy crisis: Effects of fear appeals upon attitudes toward energy consumption
-
J. Hass, G. Bagley, and R. Rogers Coping with the energy crisis: effects of fear appeals upon attitudes toward energy consumption The Journal of Applied Psychology 60 1975 754 756
-
(1975)
The Journal of Applied Psychology
, vol.60
, pp. 754-756
-
-
Hass, J.1
Bagley, G.2
Rogers, R.3
-
27
-
-
0036433080
-
Application of the protection motivation theory to genetic testing for breast cancer risk
-
DOI 10.1006/pmed.2002.1110
-
A.W. Helmes Application of the protection motivation theory to genetic testing for breast cancer risk Preventive Medicine 35 2002 453 462 (Pubitemid 35352215)
-
(2002)
Preventive Medicine
, vol.35
, Issue.5
, pp. 453-462
-
-
Helmes, A.W.1
-
28
-
-
67349144062
-
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
-
T. Herath, and H.R. Rao Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness Decision Support Systems 47 2 2009 154 165
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 154-165
-
-
Herath, T.1
Rao, H.R.2
-
29
-
-
0032089314
-
The Intention to Give Up Smoking: Disease Versus Social Dimensions
-
R. Ho The intention to give up smoking: disease versus social dimensions The Journal of Social Psychology 138 1998 368 380 (Pubitemid 128457550)
-
(1998)
Journal of Social Psychology
, vol.138
, Issue.3
, pp. 368-380
-
-
Ho, R.1
-
30
-
-
78650178159
-
Proctored versus unproctored online exams: Studying the impact of exam environment on student performance
-
K.K. Hollister, and M.L. Berenson Proctored versus unproctored online exams: studying the impact of exam environment on student performance Decision Sciences Journal of Innovative Education 7 1 2009 271 294
-
(2009)
Decision Sciences Journal of Innovative Education
, vol.7
, Issue.1
, pp. 271-294
-
-
Hollister, K.K.1
Berenson, M.L.2
-
31
-
-
38649111049
-
Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation
-
C.L. Hsu, and J.C.C. Lin Acceptance of blog usage: the roles of technology acceptance, social influence and knowledge sharing motivation Information Management 45 1 2008 65 74
-
(2008)
Information Management
, vol.45
, Issue.1
, pp. 65-74
-
-
Hsu, C.L.1
Lin, J.C.C.2
-
32
-
-
0001114313
-
An experimental study and psychological resistances to fear arousing communications
-
I. Janis, and R.F. Terwillinger An experimental study and psychological resistances to fear arousing communications Journal of Abnormal and Social Psychology 65 6 1962 403 410
-
(1962)
Journal of Abnormal and Social Psychology
, vol.65
, Issue.6
, pp. 403-410
-
-
Janis, I.1
Terwillinger, R.F.2
-
34
-
-
38349164270
-
Students plagiarise online less than many think, a new study finds
-
A.P. Kellogg Students plagiarise online less than many think, a new study finds Chronicle of Higher Education 48 23 2002 A44
-
(2002)
Chronicle of Higher Education
, vol.48
, Issue.23
, pp. 44
-
-
Kellogg, A.P.1
-
35
-
-
9744269993
-
Dealing with plagiarism in the IS research community: A look at factors that drive plagiarism and ways to address them
-
N.F. Kock, and R.M. Davison Dealing with plagiarism in the IS research community: a look at factors that drive plagiarism and ways to address them MIS Quarterly 27 4 2003 511 532
-
(2003)
MIS Quarterly
, vol.27
, Issue.4
, pp. 511-532
-
-
Kock, N.F.1
Davison, R.M.2
-
36
-
-
67349136463
-
Predicting and explaining the adoption of online trading: An empirical study in Taiwan
-
M. Lee Predicting and explaining the adoption of online trading: an empirical study in Taiwan Decision Support Systems 47 2 2009 133 142
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 133-142
-
-
Lee, M.1
-
37
-
-
23344453209
-
Investigating factors affecting the adoption of anti-spyware systems
-
DOI 10.1145/1076211.1076243
-
Y. Lee, and K. Kozar Investigating factors affecting the adoption of anti-spyware systems Communications of the ACM 48 8 2005 72 77 (Pubitemid 41101418)
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 72-77
-
-
Lee, Y.1
Kozar, K.A.2
-
38
-
-
67650166189
-
Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software
-
Y. Lee, and K.R. Larsen Threat or coping appraisal: determinants of SMB executives' decision to adopt anti-malware software European Journal of Information Systems 18 2 2009 177 187
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 177-187
-
-
Lee, Y.1
Larsen, K.R.2
-
40
-
-
38649123379
-
Determinants of accepting wireless mobile data services in China
-
DOI 10.1016/j.im.2007.11.002, PII S0378720607001267
-
J. Lu, C. Liu, C.S. Yu, and K.L. Wang Determinants of accepting wireless mobile data services in China Information Management 45 1 2008 52 64 (Pubitemid 351172635)
-
(2008)
Information and Management
, vol.45
, Issue.1
, pp. 52-64
-
-
Lu, J.1
Liu, C.2
Yu, C.-S.3
Wang, K.4
-
41
-
-
0034990882
-
Reducing skin cancer risk: An intervention based on protection motivation theory
-
B.T. McClendon, and S. Prentice-Dunn Reducing skin cancer risk: an intervention based on protection motivation theory Journal of Health Psychology 6 2001 321 328 (Pubitemid 32510209)
-
(2001)
Journal of Health Psychology
, vol.6
, Issue.3
, pp. 321-328
-
-
McClendon, B.T.1
Prentice-Dunn, S.2
-
42
-
-
0027960496
-
Effectiveness of a multidisciplinary education protocol in children with asthma (0-4 years) in primary health care
-
I. Mesters, R. Meertens, G. Kok, and G.S. Percel Effectiveness of a multidisciplinary education protocol in children with asthma (0-4 years) in primary health care The Journal of Asthma 31 1994 347 359 (Pubitemid 24326254)
-
(1994)
Journal of Asthma
, vol.31
, Issue.5
, pp. 347-359
-
-
Mesters, I.1
Meertens, R.2
Kok, G.3
Parcel, G.S.4
-
43
-
-
0033622371
-
Prediction and intervention in health-related behavior: A meta-analytic of protection motivation theory
-
S. Milne, P. Sheeran, and S. Orbell Prediction and intervention in health-related behavior: a meta-analytic of protection motivation theory Journal of Applied Social Psychology 30 1 2000 106 143
-
(2000)
Journal of Applied Social Psychology
, vol.30
, Issue.1
, pp. 106-143
-
-
Milne, S.1
Sheeran, P.2
Orbell, S.3
-
44
-
-
33845728874
-
Ethical decision making in software piracy: Initial development and test of a four-component model
-
T.T. Moores, and J.C. Chang Ethical decision making in software piracy: initial development and test of a four-component model MIS Quarterly 30 1 2006 167 180 (Pubitemid 44971429)
-
(2006)
MIS Quarterly: Management Information Systems
, vol.30
, Issue.1
, pp. 167-180
-
-
Moores, T.T.1
Chang, J.C.-J.2
-
47
-
-
61349092288
-
Studying users' computer security behavior: A health belief perspective
-
B.-Y. Ng, A. Kankanhalli, and Y. Xu Studying users' computer security behavior: a health belief perspective Decision Support Systems 46 4 2009 815 825
-
(2009)
Decision Support Systems
, vol.46
, Issue.4
, pp. 815-825
-
-
Ng, B.-Y.1
Kankanhalli, A.2
Xu, Y.3
-
48
-
-
79955515091
-
In Other (People's) Words: plagiarism by university students-literature and lessons
-
DOI 10.1080/02602930301677
-
C. Park In other (people's) words: plagiarism by university students-literature and lessons Assessment & Evaluation in Higher Education 28 5 2003 471 488 (Pubitemid 37027262)
-
(2003)
Assessment & Evaluation in Higher Education
, vol.28
, Issue.5
, pp. 471-488
-
-
Park, C.1
-
50
-
-
0037396112
-
What to convey in antismoking advertisements for adolescents: The use of protection motivation theory to identify effective message themes
-
DOI 10.1509/jmkg.67.2.1.18607
-
C. Pechmann, G. Zhao, M.E. Goldberg, and E.T. Reibling What to convey in antismoking advertisements for adolescents: the use of protection motivation theory to identify effective message theme Journal of Marketing 67 2003, April 1 18 (Pubitemid 36507807)
-
(2003)
Journal of Marketing
, vol.67
, Issue.2
, pp. 1-18
-
-
Pechmann, C.1
Zhao, G.2
Goldberg, M.E.3
Reibling, E.T.4
-
51
-
-
27944467503
-
Finding the true incidence rate of plagiarism
-
J. Price, and R. Price Finding the true incidence rate of plagiarism International Education Journal 6 4 2005 421 429 (Pubitemid 41673811)
-
(2005)
International Education Journal
, vol.6
, Issue.4
, pp. 421-429
-
-
Price, J.1
Price, R.2
-
52
-
-
0023304222
-
Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat
-
P.A. Rippetoe, and R.W. Rogers Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat Journal of Personality and Social Psychology 52 1987 596 604
-
(1987)
Journal of Personality and Social Psychology
, vol.52
, pp. 596-604
-
-
Rippetoe, P.A.1
Rogers, R.W.2
-
53
-
-
0001840352
-
A protection motivation theory of fear appeals and attitude change
-
R. Rogers A protection motivation theory of fear appeals and attitude change The Journal of Psychology 91 1975 93 114
-
(1975)
The Journal of Psychology
, vol.91
, pp. 93-114
-
-
Rogers, R.1
-
54
-
-
0002247369
-
Cognitive and physiological processes in fear-based attitude change: A revised theory of protection motivation
-
R. Rogers Cognitive and physiological processes in fear-based attitude change: a revised theory of protection motivation J. Cacioppo, R. Petty, Social Psychophysiology: A Sourcebook 1983 Guilford Press New York 153 176
-
(1983)
Social Psychophysiology: A Sourcebook
, pp. 153-176
-
-
Rogers, R.1
-
57
-
-
85020862211
-
Self-efficacy in the adoption and maintenance of health behaviour: Theoretical approaches and a new model
-
R. Schwarzer Self-efficacy in the adoption and maintenance of health behaviour: theoretical approaches and a new model R. Schwarzer, Self-Efficacy: Thought Control of Action 1992 Hemisphere Washington, DC 217 243
-
(1992)
Self-Efficacy: Thought Control of Action
, pp. 217-243
-
-
Schwarzer, R.1
-
59
-
-
84986349382
-
Fear-arousing and empathy-arousing appeals to help: The pathos of persuasion
-
M. Shelton, and R. Rogers Fear-arousing and empathy-arousing appeals to help: the pathos of persuasion Journal of Applied Social Psychology 11 1981 366 378
-
(1981)
Journal of Applied Social Psychology
, vol.11
, pp. 366-378
-
-
Shelton, M.1
Rogers, R.2
-
60
-
-
33745195146
-
Plagiarism avoidance: An empirical study examining teaching strategies
-
J.G. Soto, S. Anand, and E. McGee Plagiarism avoidance: an empirical study examining teaching strategies Journal of College Science Teaching 2004 42 48 July/August
-
(2004)
Journal of College Science Teaching
, pp. 42-48
-
-
Soto, J.G.1
Anand, S.2
McGee, E.3
-
61
-
-
55249123249
-
Validating instruments in MIS research
-
D.W. Straub Validating instruments in MIS research MIS Quarterly 13 2 1989 147 169
-
(1989)
MIS Quarterly
, vol.13
, Issue.2
, pp. 147-169
-
-
Straub, D.W.1
-
62
-
-
0002735809
-
The protection motivation model: A normative model of fear appeals
-
J.F. Tanner, J.B. Hunt, and D.R. Eppright The protection motivation model: a normative model of fear appeals Journal of Marketing 55 1991 36 45
-
(1991)
Journal of Marketing
, vol.55
, pp. 36-45
-
-
Tanner, J.F.1
Hunt, J.B.2
Eppright, D.R.3
-
63
-
-
0032223746
-
Testing an ethical decision-making theory: The case of softlifting
-
J.Y.L. Thong, and C.S. Yap Testing an ethical decision-making theory: the case of softlifting Journal of Management Information Systems 15 1 1998 213 237 (Pubitemid 32716637)
-
(1998)
Journal of Management Information Systems
, vol.15
, Issue.1
, pp. 213-237
-
-
Thong, J.Y.L.1
Yap, C.-S.2
-
64
-
-
0027633395
-
Testing four competing theories of health-protective behavior
-
E. Vaughn Testing four competing theories of health-protective behavior Health Psychology 12 1993 324 333
-
(1993)
Health Psychology
, vol.12
, pp. 324-333
-
-
Vaughn, E.1
-
65
-
-
0033872521
-
Theoretical extension of the Technology Acceptance Model: Four longitudinal field studies
-
V. Venkatesh, and F.D. Davis A theoretical extension of the technology acceptance model: four longitudinal field studies Management Science 46 2 2000 186 204 (Pubitemid 30594361)
-
(2000)
Management Science
, vol.46
, Issue.2
, pp. 186-204
-
-
Venkatesh, V.1
Davis, F.D.2
-
66
-
-
1542382496
-
User acceptance of information technology: Toward a unified view
-
V. Venkatesh, M.G. Morris, G.B. Davis, and F.D. Davis User acceptance of information technology: toward a unified view MIS quarterly 27 3 2003 425 478
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.G.2
Davis, G.B.3
Davis, F.D.4
-
68
-
-
0001877951
-
Soft modeling: The basic design and some extension
-
H. Wold Soft modeling: the basic design and some extension K.G. Joreskog, H. Word, Systems under Indirect Observations 1982 North-Holland Amsterdam 1 54
-
(1982)
Systems under Indirect Observations
, pp. 1-54
-
-
Wold, H.1
-
70
-
-
13244273409
-
Protection motivation theory and adolescent drug trafficking: Relationship between health motivation and longitudinal risk involvement
-
DOI 10.1093/jpepsy/jsi001
-
Y. Wu, B.F. Stanton, X. LI, J. Galbraith, and M.L. Cole Protection motivation theory and adolescent drug trafficking: relationship between health motivation and longitudinal risk involvement Journal of Pediatric Psychology 30 2 2005 127 137 (Pubitemid 40189801)
-
(2005)
Journal of Pediatric Psychology
, vol.30
, Issue.2
, pp. 127-137
-
-
Wu, Y.1
Stanton, B.F.2
Li, X.3
Galbraith, J.4
Cole, M.L.5
-
71
-
-
34447298085
-
Threats and countermeasures for information system security: A cross-industry study
-
Q.J. Yeh, and A.J.T. Chang Threats and countermeasures for information system security: a cross-industry study Information Management 44 5 2007 480 491
-
(2007)
Information Management
, vol.44
, Issue.5
, pp. 480-491
-
-
Yeh, Q.J.1
Chang, A.J.T.2
-
72
-
-
0042744052
-
Developing and validating an observational learning model of computer software training and skill acquisition
-
M.Y. Yi, and F.D. Davis Developing and validating an observational learning model of computer software training and skill acquisition Information Systems Research 14 2 2003 146 169
-
(2003)
Information Systems Research
, vol.14
, Issue.2
, pp. 146-169
-
-
Yi, M.Y.1
Davis, F.D.2
|