-
1
-
-
63349086562
-
-
National Cyber Security Alliance, AOL/NCSA Online Safety Study, Dec. 2005; http://staysafeonline.org/pdf/safety-study-2005.pdf.
-
National Cyber Security Alliance, "AOL/NCSA Online Safety Study," Dec. 2005; http://staysafeonline.org/pdf/safety-study-2005.pdf.
-
-
-
-
2
-
-
63349084985
-
-
Deloitte, "2007 Global Security Survey," 2007; http://www.deloitte.com/dtt/cda/doc/content/dtt-gfsi-GlobalSecuritySurvey- 20070901.pdf.
-
(2007)
Global Security Survey
-
-
-
3
-
-
63349091961
-
-
CERT/CC, Full Statistics, 2008; http://www.cert.org/stats/ fullstats.html.
-
CERT/CC, "Full Statistics," 2008; http://www.cert.org/stats/ fullstats.html.
-
-
-
-
4
-
-
84869276036
-
-
A. Hackworth, "Spyware," 2005; http://www.us-cert.gov/reading- room/spyware.pdf.
-
(2005)
Spyware
-
-
Hackworth, A.1
-
5
-
-
23344453209
-
Investigating factors affecting the adoption of anti-spyware systems
-
Y. Lee and K.A. Kozar, "Investigating factors affecting the adoption of anti-spyware systems," Commun. ACM, vol. 48, 2005, pp. 72-77.
-
(2005)
Commun. ACM
, vol.48
, pp. 72-77
-
-
Lee, Y.1
Kozar, K.A.2
-
6
-
-
23344449408
-
What do consumers really know about spyware?
-
X. Zhang, "What do consumers really know about spyware?," Commun. ACM, vol. 48, 2005, pp. 44-48.
-
(2005)
Commun. ACM
, vol.48
, pp. 44-48
-
-
Zhang, X.1
-
7
-
-
23344444212
-
Is spyware an Internet nuisance or public menace?
-
Q. Hu and T. Dinev, "Is spyware an Internet nuisance or public menace?," Commun. ACM, vol. 48, 2005, pp. 61-66.
-
(2005)
Commun. ACM
, vol.48
, pp. 61-66
-
-
Hu, Q.1
Dinev, T.2
-
8
-
-
23344447680
-
Why spyware poses multiple threats to security
-
R. Thompson and R. Thompson, "Why spyware poses multiple threats to security," Commun. ACM, vol. 48, 2005, pp. 41-43.
-
(2005)
Commun. ACM
, vol.48
, pp. 41-43
-
-
Thompson, R.1
Thompson, R.2
-
9
-
-
23344452974
-
Spyware: A view from the (online) street
-
R. Poston, T.F. Stafford, and A. Hennington, "Spyware: a view from the (online) street," Commun. ACM, vol. 48, 2005, pp. 96-99.
-
(2005)
Commun. ACM
, vol.48
, pp. 96-99
-
-
Poston, R.1
Stafford, T.F.2
Hennington, A.3
-
10
-
-
49049114397
-
The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies
-
Jul
-
T. Dinev and Qing Hu, "The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies.," Journal of the Association for Information Systems, vol. 8, Jul. 2007, pp. 386-408.
-
(2007)
Journal of the Association for Information Systems
, vol.8
, pp. 386-408
-
-
Dinev, T.1
Hu, Q.2
-
11
-
-
0003551671
-
-
Reading, MA: Addison-Wesley
-
M. Fishbein and I. Ajzen, Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Reading, MA: Addison-Wesley, 1975.
-
(1975)
Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research
-
-
Fishbein, M.1
Ajzen, I.2
-
12
-
-
55249087535
-
Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology
-
F.D. Davis, "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology.," MIS Quarterly, vol. 13, 1989, pp. 319-340.
-
(1989)
MIS Quarterly
, vol.13
, pp. 319-340
-
-
Davis, F.D.1
-
14
-
-
0001840352
-
A Protection Motivation Theory Of Fear Appeals and Attitude Change
-
R.W. Rogers, "A Protection Motivation Theory Of Fear Appeals and Attitude Change.," Journal of Psychology, vol. 91, 1975, pp. 93-114.
-
(1975)
Journal of Psychology
, vol.91
, pp. 93-114
-
-
Rogers, R.W.1
-
15
-
-
58149442649
-
The Theory of Decision Making
-
W.J.H. Edwards, "The Theory of Decision Making.," Psychological Bulletin, vol. 51, 1954, pp. 380-417.
-
(1954)
Psychological Bulletin
, vol.51
, pp. 380-417
-
-
Edwards, W.J.H.1
-
16
-
-
0002247369
-
Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation
-
London: Guilford
-
R.W. Rogers, "Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation," Social Psychophysiology: A Sourcebook, London: Guilford, 1983, pp. 153-176.
-
(1983)
Social Psychophysiology: A Sourcebook
, pp. 153-176
-
-
Rogers, R.W.1
-
17
-
-
0023025070
-
Protection Motivation Theory and preventive health: Beyond the Health Belief Model
-
S. Prentice-Dunn and R.W. Rogers, "Protection Motivation Theory and preventive health: beyond the Health Belief Model," Health Education Research, vol. 1, 1986, pp. 153-161.
-
(1986)
Health Education Research
, vol.1
, pp. 153-161
-
-
Prentice-Dunn, S.1
Rogers, R.W.2
-
18
-
-
0023304222
-
Effects of Components of Protection-Motivation Theory on Adaptive and Maladaptive Coping With a Health Threat
-
P.A. Rippetoe and R.W. Rogers, "Effects of Components of Protection-Motivation Theory on Adaptive and Maladaptive Coping With a Health Threat," Journal of Personality and Social Psychology, vol. 52, 1987, pp. 596-604.
-
(1987)
Journal of Personality and Social Psychology
, vol.52
, pp. 596-604
-
-
Rippetoe, P.A.1
Rogers, R.W.2
-
20
-
-
0033622371
-
Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory
-
S. Milne, P. Sheeran, and S. Orbell, "Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory," Journal of Applied Social Psychology, vol. 30, 2000, pp. 106-143.
-
(2000)
Journal of Applied Social Psychology
, vol.30
, pp. 106-143
-
-
Milne, S.1
Sheeran, P.2
Orbell, S.3
-
21
-
-
0034397237
-
A Meta-Analysis of Research on Protection Motivation Theory
-
D.L. Floyd, S. Prentice-Dunn, and R.W. Rogers, "A Meta-Analysis of Research on Protection Motivation Theory," Journal of Applied Social Psychology, vol. 30, 2000, pp. 407-429.
-
(2000)
Journal of Applied Social Psychology
, vol.30
, pp. 407-429
-
-
Floyd, D.L.1
Prentice-Dunn, S.2
Rogers, R.W.3
-
22
-
-
39749168050
-
Employees' Behavior towards IS Security Policy Compliance
-
IEEE Computer Society
-
S. Pahnila, M. Siponen, and A. Mahmood, "Employees' Behavior towards IS Security Policy Compliance," Proceedings of the 40th Annual Hawaii International Conference on System Sciences, IEEE Computer Society, 2007, p. 156b; http://portal.acm.org/citation.cfm?id=1255934.
-
(2007)
Proceedings of the 40th Annual Hawaii International Conference on System Sciences
-
-
Pahnila, S.1
Siponen, M.2
Mahmood, A.3
-
23
-
-
40549099995
-
Promoting personal responsibility for internet safety
-
R. LaRose, N.J. Rifon, and R. Enbody, "Promoting personal responsibility for internet safety," Commun. ACM, vol. 51, 2008, pp. 71-76.
-
(2008)
Commun. ACM
, vol.51
, pp. 71-76
-
-
LaRose, R.1
Rifon, N.J.2
Enbody, R.3
-
24
-
-
84869780575
-
A Protection Motivation Theory Approach to Home Wireless Security
-
I. Woon, G. Tan, and R. Low, "A Protection Motivation Theory Approach to Home Wireless Security," Proceedings of the Twenty-Sixth International Conference on Information Systems, 2005, pp. 367-380.
-
(2005)
Proceedings of the Twenty-Sixth International Conference on Information Systems
, pp. 367-380
-
-
Woon, I.1
Tan, G.2
Low, R.3
-
25
-
-
0242708745
-
Pretty Good Persuasion: A First Step towards Effective Password Security in the Real World
-
Cloudcroft, NM: ACM
-
D. Weirich and M.A. Sasse, "Pretty Good Persuasion: A First Step towards Effective Password Security in the Real World," New Security Paradigms Workshop, Cloudcroft, NM: ACM, 2002, pp. 137-143.
-
(2002)
New Security Paradigms Workshop
, pp. 137-143
-
-
Weirich, D.1
Sasse, M.A.2
-
26
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test, Computers in Human Behavior, vol
-
in press
-
M. Workman, W. Bommer, and D. Straub, "Security lapses and the omission of information security measures: A threat control model and empirical test," Computers in Human Behavior, vol. (in press), 2008.
-
(2008)
-
-
Workman, M.1
Bommer, W.2
Straub, D.3
-
27
-
-
0034422158
-
Predicting intention for protective health behaviour: A test of the protection versus the ordered protection motivation model
-
R. Ho, "Predicting intention for protective health behaviour: A test of the protection versus the ordered protection motivation model," Australian Journal of Psychology, vol. 52, 2000, pp. 110-118.
-
(2000)
Australian Journal of Psychology
, vol.52
, pp. 110-118
-
-
Ho, R.1
-
28
-
-
0036106081
-
Combining motivational and volitional interventions to promote exercise participation: Protection motivation theory and implementation intentions
-
S. Milne, S. Orbell, and P. Sheeran, "Combining motivational and volitional interventions to promote exercise participation: Protection motivation theory and implementation intentions," British Journal of Health Psychology, vol. 7, 2002, pp. 163-184.
-
(2002)
British Journal of Health Psychology
, vol.7
, pp. 163-184
-
-
Milne, S.1
Orbell, S.2
Sheeran, P.3
-
29
-
-
0024617548
-
Assessing Coping Strategies: A Theoretically Based Approach
-
C. Carver, M. Scheier, and J. Weintraub, "Assessing Coping Strategies: A Theoretically Based Approach," Journal of Personality and Social Psychology, vol. 56, 1989, pp. 267-283.
-
(1989)
Journal of Personality and Social Psychology
, vol.56
, pp. 267-283
-
-
Carver, C.1
Scheier, M.2
Weintraub, J.3
-
30
-
-
84914772238
-
Exploring teenagers' adaptive and maladaptive thinking in relation to the threat of hiv infection
-
C. Abraham et al., "Exploring teenagers' adaptive and maladaptive thinking in relation to the threat of hiv infection," Psychology & Health, vol. 9, 1994, pp. 253-272.
-
(1994)
Psychology & Health
, vol.9
, pp. 253-272
-
-
Abraham, C.1
-
31
-
-
41649112685
-
Structural equation modeling in practice: A review and recommended two-step approach
-
J. Anderson and D.W. Gerbing, "Structural equation modeling in practice: A review and recommended two-step approach," Psychological Bulletin, vol. 103, 1988, pp. 411-423.
-
(1988)
Psychological Bulletin
, vol.103
, pp. 411-423
-
-
Anderson, J.1
Gerbing, D.W.2
-
32
-
-
51249177591
-
On the Evaluation of Structural Equation Models
-
R. Bagozzi and Y. Yi, "On the Evaluation of Structural Equation Models," Academy of Marketing Science, vol. 16, 1988, pp. 74-94.
-
(1988)
Academy of Marketing Science
, vol.16
, pp. 74-94
-
-
Bagozzi, R.1
Yi, Y.2
-
33
-
-
0000372049
-
Representing and Testing Organizational Theories: A Holistic Construal
-
R. Bagozzi and L. Phillips, "Representing and Testing Organizational Theories: A Holistic Construal," Administrative Science Quarterly, vol. 27, 1982, pp. 459-489.
-
(1982)
Administrative Science Quarterly
, vol.27
, pp. 459-489
-
-
Bagozzi, R.1
Phillips, L.2
-
35
-
-
84965565738
-
A new incremental fit index for general structural equation models
-
K. Bollen, "A new incremental fit index for general structural equation models," Sociological Methods and Research, vol. 17, 1989, pp. 303-316.
-
(1989)
Sociological Methods and Research
, vol.17
, pp. 303-316
-
-
Bollen, K.1
-
36
-
-
0025397298
-
Comparative fit indexes in structural models
-
P. Bentler, "Comparative fit indexes in structural models," Psychological Bulletin, vol. 107, 1990, pp. 238-246.
-
(1990)
Psychological Bulletin
, vol.107
, pp. 238-246
-
-
Bentler, P.1
-
37
-
-
0001233581
-
Alternative ways of assessing model fit
-
Newbury Park, CA: Sage
-
M. Browne and R. Cudeck, "Alternative ways of assessing model fit," Testing Structural Equation Models, Newbury Park, CA: Sage, 1993, pp. 136-162.
-
(1993)
Testing Structural Equation Models
, pp. 136-162
-
-
Browne, M.1
Cudeck, R.2
-
38
-
-
0020749247
-
Development of a tool for measuring and analysing computer user satisfaction
-
J. Bailey and S. Pearson, "Development of a tool for measuring and analysing computer user satisfaction," Management Science, vol. 29, 1983, pp. 530-545.
-
(1983)
Management Science
, vol.29
, pp. 530-545
-
-
Bailey, J.1
Pearson, S.2
|