-
1
-
-
34250274848
-
A rating formulation for ordered response categories
-
ANDRICH D (1978) A rating formulation for ordered response categories. Pyschometirka 43(4), 561-573.
-
(1978)
Pyschometirka
, vol.43
, Issue.4
, pp. 561-573
-
-
Andrich, D.1
-
2
-
-
77957077814
-
Practicing safe computing: A multimethod empirical examination of home computer user security behavioural intentions
-
ANDERSON C and AGARWAL R (2010) Practicing safe computing: A multimethod empirical examination of home computer user security behavioural intentions. MIS Quarterly 34(3), 613-643.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 613-643
-
-
Anderson, C.1
Agarwal, R.2
-
3
-
-
0346076533
-
Cognitive appraisal of performance capability in the prevention of drunken driving: A test of self-efficacy theory
-
ANDERSON RB (1995) Cognitive appraisal of performance capability in the prevention of drunken driving: A test of self-efficacy theory. Journal of Public Relations Research 7(3), 205-229.
-
(1995)
Journal of Public Relations Research
, vol.7
, Issue.3
, pp. 205-229
-
-
Anderson, R.B.1
-
4
-
-
0023020183
-
The moderator-mediator variable distinction in social psychological research: Conceptual, strategic and statistical considerations
-
BARON R and KENNY D (1986) The moderator-mediator variable distinction in social psychological research: Conceptual, strategic and statistical considerations. Journal of Personality and Social Psychology 51(1), 1173-1182.
-
(1986)
Journal of Personality and Social Psychology
, vol.51
, Issue.1
, pp. 1173-1182
-
-
Baron, R.1
Kenny, D.2
-
5
-
-
0042188148
-
Social learning theory: A framework for discrimination research
-
BARCLAY L (1982) Social learning theory: A framework for discrimination research. Academy of Management Review 7(4), 587-594.
-
(1982)
Academy of Management Review
, vol.7
, Issue.4
, pp. 587-594
-
-
Barclay, L.1
-
6
-
-
0039965147
-
A social learning interpretation of psychological dysfunctions
-
(LONGON D and ROSENHAM D, Eds Holt, Rinehart & Winston, New York, NY
-
BANDURA A (1968) A social learning interpretation of psychological dysfunctions. In Foundations of Abnormal Psychology (LONGON D and ROSENHAM D, Eds), pp 293-344, Holt, Rinehart & Winston, New York, NY.
-
(1968)
Foundations of Abnormal Psychology
, pp. 293-344
-
-
Bandura, A.1
-
7
-
-
0017472917
-
Self-efficacy: Toward a unifying theory of behavioral change
-
BANDURA A (1977) Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review 84(2), 191-215.
-
(1977)
Psychological Review
, vol.84
, Issue.2
, pp. 191-215
-
-
Bandura, A.1
-
9
-
-
84970382574
-
Organizational applications of social cognitive theory
-
BANDURA A (1988) Organizational applications of social cognitive theory. Australian Journal of Management 13(2), 275.
-
(1988)
Australian Journal of Management
, vol.13
, Issue.2
, pp. 275
-
-
Bandura, A.1
-
10
-
-
0002206030
-
Differential engagement of selfreactive influences in cognitive motivation
-
BANDURA A and CERVONE D (1986) Differential engagement of selfreactive influences in cognitive motivation. Organizational Behavior & Human Decision Processes 38(1), 92-114.
-
(1986)
Organizational Behavior & Human Decision Processes
, vol.38
, Issue.1
, pp. 92-114
-
-
Bandura, A.1
Cervone, D.2
-
11
-
-
21344496974
-
Avoiding misuse of information technologies: Legal and societal considerations
-
BLOOM PN, MILNE GR and ADLER R (1994) Avoiding misuse of information technologies: Legal and societal considerations. Journal of Marketing 58(1), 98-110.
-
(1994)
Journal of Marketing
, vol.58
, Issue.1
, pp. 98-110
-
-
Bloom, P.N.1
Milne, G.R.2
Adler, R.3
-
13
-
-
67650100804
-
If someone is watching, I'll do what I'm asked: Mandatoriness, control, and information security
-
BOSS SR, KIRSCH LJ, ANGERMEIER I, SHINGLER RA and BOSS RW (2009) If someone is watching, I'll do what I'm asked: Mandatoriness, control, and information security. European Journal of Information Systems 18(2), 151-164.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 151-164
-
-
Boss, S.R.1
Kirsch, L.J.2
Angermeier, I.3
Shingler, R.A.4
Boss, R.W.5
-
14
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
BULGURCU B, CAVUSOGLU H and BENBASAT I (2010) Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly 34(3), 523-548.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
15
-
-
34548235939
-
Prior family business exposure as intergenerational influence and entrepreneurial intent: A theory of planned behavior approach
-
CARR J and SEQUEIRA J (2007) Prior family business exposure as intergenerational influence and entrepreneurial intent: A theory of planned behavior approach. Journal of Business Research 60(10), 1090-1098.
-
(2007)
Journal of Business Research
, vol.60
, Issue.10
, pp. 1090-1098
-
-
Carr, J.1
Sequeira, J.2
-
16
-
-
72049101186
-
Interpretation of formative measurement in IS research
-
CENFETELLI R and BASSELIER G (2009) Interpretation of formative measurement in IS research. MIS Quarterly 33(4), 689-707.
-
(2009)
MIS Quarterly
, vol.33
, Issue.4
, pp. 689-707
-
-
Cenfetelli, R.1
Basselier, G.2
-
17
-
-
0041498311
-
Partial least squares is to Lisrel as principal components analysis is to common factor analysis
-
CHIN W (1995) Partial least squares is to Lisrel as principal components analysis is to common factor analysis. Technology Studies 2, 315-319.
-
(1995)
Technology Studies
, vol.2
, pp. 315-319
-
-
Chin, W.1
-
18
-
-
0003095695
-
The partial least squares approach to structural equation modelling
-
(MARCOULIDES G, Ed. Lawrence Erlbaum Associates, Mahwah, NJ
-
CHIN W (1998) The partial least squares approach to structural equation modelling. In Modern Methods for Business Research (MARCOULIDES G, Ed.), pp 295-336, Lawrence Erlbaum Associates, Mahwah, NJ.
-
(1998)
Modern Methods for Business Research
, pp. 295-336
-
-
Chin, W.1
-
19
-
-
49149116092
-
Computer self-efficacy: Development of a measure and initial test
-
COMPEAU D and HIGGINS CA. (1995) Computer self-efficacy: Development of a measure and initial test. MIS Quarterly 19(2), 189-211.
-
(1995)
MIS Quarterly
, vol.19
, Issue.2
, pp. 189-211
-
-
Compeau, D.1
Higgins, C.A.2
-
20
-
-
12144261968
-
A social learning theory of cross-functional case education
-
DOI 10.1016/j.jbusres.2003.12.005, PII S014829630400027X
-
CRITTENDEN WF (2005) A social learning theory of cross-functional case education. Journal of Business Research 58(7), 960-966. (Pubitemid 40105905)
-
(2005)
Journal of Business Research
, vol.58
, Issue.7
, pp. 960-966
-
-
Crittenden, W.F.1
-
21
-
-
67649551429
-
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
-
D'ARCY J, HOVAV A and GALETTA D (2009) User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research 20(1), 79-98.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 79-98
-
-
D'Arcy, J.1
Hovav, A.2
Galetta, D.3
-
22
-
-
0035063716
-
Violation of safeguards by trusted personnel and understanding related information security concerns
-
DHILLON G (2001) Violation of safeguards by trusted personnel and understanding related information security concerns. Computers & Security 20(2), 165-173.
-
(2001)
Computers & Security
, vol.20
, Issue.2
, pp. 165-173
-
-
Dhillon, G.1
-
23
-
-
0035534144
-
Index construction with formative indicators: An alternative to scale development
-
DIAMANTOPOULOS A and WINKLHOFER H (2001) Index construction with formative indicators: An alternative to scale development. Journal of Marketing Research 38(2), 269-277.
-
(2001)
Journal of Marketing Research
, vol.38
, Issue.2
, pp. 269-277
-
-
Diamantopoulos, A.1
Winklhofer, H.2
-
24
-
-
33749322976
-
Privacy calculus model in e-commerce - A study of Italy and the United States
-
DOI 10.1057/palgrave.ejis.3000590, PII 3000590
-
DINEV T, BELLOTTO M, HART P, RUSSO V, SERRA I and COLAUTTI C (2006) Privacy calculus model in e-commerce - a study of Italy and the Unites States. European Journal of Information Systems 15(4), 389-402. (Pubitemid 44494838)
-
(2006)
European Journal of Information Systems
, vol.15
, Issue.4
, pp. 389-402
-
-
Dinev, T.1
Bellotto, M.2
Hart, P.3
Russo, V.4
Serra, I.5
Colautti, C.6
-
26
-
-
0003551671
-
-
Addison-Wesley, Reading, MA
-
FISHBEIN M and AJZEN I (1975) Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Addison-Wesley, Reading, MA.
-
(1975)
Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research
-
-
Fishbein, M.1
Ajzen, I.2
-
27
-
-
33746766203
-
The role of theory in developing effective health communications
-
DOI 10.1111/j.1460-2466.2006.00280.x
-
FISHBEIN M and CAPPELLA JN (2006) The role of theory in developing effective health communications. Journal of Communication 56(s1), s1-s17. (Pubitemid 44165213)
-
(2006)
Journal of Communication
, vol.56
, Issue.SUPPL.
-
-
Fishbein, M.1
Cappella, J.N.2
-
28
-
-
0000356178
-
Two structural equation models: LISREL and PLS applied to consumer exit-voice theory
-
FORNELL C and BOOKSTEIN F (1982) Two structural equation models: LISREL and PLS applied to consumer exit-voice theory. Journal of Marketing Research 19, 440-452.
-
(1982)
Journal of Marketing Research
, vol.19
, pp. 440-452
-
-
Fornell, C.1
Bookstein, F.2
-
29
-
-
33645589662
-
A prototype tool for information security awareness and training
-
FURNELL S, GENNATOU M and DOWLAND P (2002) A prototype tool for information security awareness and training. Logistics Information Management 15(5/6), 352-357.
-
(2002)
Logistics Information Management
, vol.15
, Issue.5-6
, pp. 352-357
-
-
Furnell, S.1
Gennatou, M.2
Dowland, P.3
-
30
-
-
0001178032
-
Structural equation modelling techniques and regression: Guidelines for research practice
-
GEFEN D, STRAUB D and BOUDREAU M (2000) Structural equation modelling techniques and regression: Guidelines for research practice. Communications of AIS 7(7), 1-78.
-
(2000)
Communications of AIS
, vol.7
, Issue.7
, pp. 1-78
-
-
Gefen, D.1
Straub, D.2
Boudreau, M.3
-
31
-
-
0000806910
-
Self-efficacy: A theoretical analysis of its determinants and malleability
-
GIST M and MITCHELL T (1992) Self-efficacy: A theoretical analysis of its determinants and malleability. Academy of Management Review 17(2), 183-211.
-
(1992)
Academy of Management Review
, vol.17
, Issue.2
, pp. 183-211
-
-
Gist, M.1
Mitchell, T.2
-
32
-
-
0024859373
-
Security concerns of system users: A proposed study of user perceptions of the adequacy of security measures
-
(HICSS), Kona, HA, January
-
GOODHUE DL and STRAUB DW (1989) Security concerns of system users: A proposed study of user perceptions of the adequacy of security measures. In Proceedings of the 21st Hawaii International Conference on System Science (HICSS), Kona, HA, January.
-
(1989)
Proceedings of the 21st Hawaii International Conference on System Science
-
-
Goodhue, D.L.1
Straub, D.W.2
-
33
-
-
79955602138
-
Prescription for change
-
20 October
-
GUPTA A (2008) Prescription for change. Wall Street Journal, 20 October.
-
(2008)
Wall Street Journal
-
-
Gupta, A.1
-
34
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
HERATH T and RAO HR (2009) Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems 18(2), 106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
35
-
-
0040236696
-
Communicating innovations: Convincing computer phobics to adopt innovative technologies
-
(LUTZ RJ, Ed. Association for Consumer Research, Provo, UT
-
HILL T, SMITH N and MANN M (1986) Communicating innovations: Convincing computer phobics to adopt innovative technologies. In Advances in Consumer Research (LUTZ RJ, Ed.), pp 419-422, Association for Consumer Research, Provo, UT.
-
(1986)
Advances in Consumer Research
, pp. 419-422
-
-
Hill, T.1
Smith, N.2
Mann, M.3
-
36
-
-
0002111266
-
Role of efficacy expectations in predicting the decision to use advanced technologies: The case of computers
-
HILL T, SMITH N and MANN M (1987) Role of efficacy expectations in predicting the decision to use advanced technologies: The case of computers. Journal of Applied Psychology 72(2), 307-313.
-
(1987)
Journal of Applied Psychology
, vol.72
, Issue.2
, pp. 307-313
-
-
Hill, T.1
Smith, N.2
Mann, M.3
-
37
-
-
0002042413
-
The 9 to 5 underground: Are you policing computer crimes?
-
HOFFER JA and STRAUB DW (1989) The 9 to 5 underground: Are you policing computer crimes? Sloan Management Review 30(4), 35-43.
-
(1989)
Sloan Management Review
, vol.30
, Issue.4
, pp. 35-43
-
-
Hoffer, J.A.1
Straub, D.W.2
-
38
-
-
79955629140
-
Data breaches cost health care industry $6 billion annually
-
10 November
-
HOROWITZ BT (2010) Data breaches cost health care industry $6 billion annually. eWeek Magazine, 10 November.
-
(2010)
EWeek Magazine
-
-
Horowitz, B.T.1
-
39
-
-
0242424963
-
A critical review of construct indicators and measurement model misspecification in marketing and consumer research
-
DOI 10.1086/376806
-
JARVIS C, MACKENZIE S, PODSAKOFF P and MICK D (2003) A critical review of construct indicators and measurement model misspecification in marketing and consumer research. Journal of Consumer Research 30(2), 199-218. (Pubitemid 37374305)
-
(2003)
Journal of Consumer Research
, vol.30
, Issue.2
, pp. 199-218
-
-
Jarvis, C.B.1
Mackenzie, S.B.2
Podsakoff, P.M.3
Giliatt, N.4
Mee, J.F.5
-
40
-
-
77957057727
-
Fear appeals and information security behaviours: An empirical study
-
JOHNSTON AC and WARKENTIN M (2010) Fear appeals and information security behaviours: An empirical study. MIS Quarterly 34(3), 549-566.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 549-566
-
-
Johnston, A.C.1
Warkentin, M.2
-
41
-
-
0000515289
-
Motivation and cognitive abilities: An integrative/aptitude-treatment interaction approach to skill acquisition
-
KANFER R and ACKERMAN PL (1989) Motivation and cognitive abilities: An integrative/aptitude-treatment interaction approach to skill acquisition. Journal of Applied Psychology 74(4), 657-690.
-
(1989)
Journal of Applied Psychology
, vol.74
, Issue.4
, pp. 657-690
-
-
Kanfer, R.1
Ackerman, P.L.2
-
43
-
-
1842832761
-
Oh, what a tangled web we weave: The state of privacy protection in the information economy and recommendations for governance
-
DOI 10.1016/S0148-2963(02)00359-4, PII S0148296302003594
-
LANGENDERFER J and COOK DL (2004) Oh, what a tangled web we weave: The state of privacy protection in the information economy and recommendations for governance. Journal of Business Research 57(4), 734-747. (Pubitemid 38491772)
-
(2004)
Journal of Business Research
, vol.57
, Issue.7
, pp. 734-747
-
-
Langenderfer, J.1
Cook, D.L.2
-
44
-
-
0345764837
-
Improving user security behaviour
-
LEACH J (2003) Improving user security behaviour. Computers & Security 22(8), 685-692.
-
(2003)
Computers & Security
, vol.22
, Issue.8
, pp. 685-692
-
-
Leach, J.1
-
46
-
-
67650166189
-
Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software
-
LEE Y and LARSEN KR (2009) Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software. European Journal of Information Systems 18(2), 177-187.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 177-187
-
-
Lee, Y.1
Larsen, K.R.2
-
47
-
-
0037322632
-
Diffusing the internet in the Arab world: The role of social norms and technological culturation
-
LOCH K, STRAUB D and KAMEL S (2003) Diffusing the internet in the Arab world: The role of social norms and technological culturation. IEEE Transactions on Engineering Management 50(1), 45-64.
-
(2003)
IEEE Transactions on Engineering Management
, vol.50
, Issue.1
, pp. 45-64
-
-
Loch, K.1
Straub, D.2
Kamel, S.3
-
48
-
-
24944589695
-
The problem of measurement model misspecification in behavioral and organizational research and some recommended solutions
-
DOI 10.1037/0021-9010.90.4.710
-
MACKENZIE S, PODSAKOFF P and JARVIS C (2005) The problem of measurement model misspecification in behavioral and organizational research and some recommended solutions. Journal of Applied Psychology 90(4), 710-730. (Pubitemid 41304795)
-
(2005)
Journal of Applied Psychology
, vol.90
, Issue.4
, pp. 710-730
-
-
MacKenzie, S.B.1
Podsakoff, P.M.2
Jarvis, C.B.3
-
49
-
-
0000109250
-
Vicarious learning: The influence of modeling on organizational behavior
-
MANZ CC and SIMS Jr. HP (1981) Vicarious learning: The influence of modeling on organizational behavior. Academy of Management Review 6(1), 105-113.
-
(1981)
Academy of Management Review
, vol.6
, Issue.1
, pp. 105-113
-
-
Manz, C.C.1
Sims Jr., H.P.2
-
50
-
-
0032341068
-
The multilevel and multifaceted character of computer self-efficacy: Toward clarification of the construct and an integrative framework for research
-
MARAKAS G, YI M and JOHNSON R (1998) The multilevel and multifaceted character of computer self-efficacy: Toward clarification of the construct and an integrative framework for research. Information Systems Research 9(2), 126-163.
-
(1998)
Information Systems Research
, vol.9
, Issue.2
, pp. 126-163
-
-
Marakas, G.1
Yi, M.2
Johnson, R.3
-
51
-
-
85018355209
-
Individual and situational influences on the development of self-efficacy: Implications for training effectiveness
-
MATHIEU JE, MARTINEAU JW and TANNENBAUM SI (1993) Individual and situational influences on the development of self-efficacy: Implications for training effectiveness. Personnel Psychology 46(1), 125-147.
-
(1993)
Personnel Psychology
, vol.46
, Issue.1
, pp. 125-147
-
-
Mathieu, J.E.1
Martineau, J.W.2
Tannenbaum, S.I.3
-
52
-
-
21144459329
-
Influences of individual and situational characteristics on measures of training effectiveness
-
MATHIEU JE, TANNENBAUM SI and SALAS E (1992) Influences of individual and situational characteristics on measures of training effectiveness. Academy of Management Journal 35(4), 828-847.
-
(1992)
Academy of Management Journal
, vol.35
, Issue.4
, pp. 828-847
-
-
Mathieu, J.E.1
Tannenbaum, S.I.2
Salas, E.3
-
53
-
-
4243139489
-
The HIPAA-potamus in health care data security
-
MERCURI RT (2004) The HIPAA-potamus in health care data security. Communications of the ACM 47(7), 25-28.
-
(2004)
Communications of the ACM
, vol.47
, Issue.7
, pp. 25-28
-
-
Mercuri, R.T.1
-
54
-
-
67650143327
-
What levels of moral reasoning and values explain adherence to information security rules? An empirical study
-
MYYRY L, SIPONEN M, PAHNILA S, VARTIAINEN T and VANCE A (2009) What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems 18(2), 126-139.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 126-139
-
-
Myyry, L.1
Siponen, M.2
Pahnila, S.3
Vartiainen, T.4
Vance, A.5
-
57
-
-
79953705461
-
Situational constraints and work outcomes: The influences of a frequently overlooked construct
-
PETERS LH and O'CONNOR EJ (1980) Situational constraints and work outcomes: The influences of a frequently overlooked construct. Academy of Management Review 5(3), 391-397.
-
(1980)
Academy of Management Review
, vol.5
, Issue.3
, pp. 391-397
-
-
Peters, L.H.1
O'Connor, E.J.2
-
58
-
-
0011545501
-
An examination of situational constraints in air force work settings
-
PETERS LH, O'CONNOR EJ, EULBERG JR and WATSON TW (1988) An examination of situational constraints in air force work settings. Human Performance 1(2), 133-144.
-
(1988)
Human Performance
, vol.1
, Issue.2
, pp. 133-144
-
-
Peters, L.H.1
O'Connor, E.J.2
Eulberg, J.R.3
Watson, T.W.4
-
59
-
-
38549116762
-
Specifying formative constructs in is research
-
PETTER S, STRAUB DW and RAI A (2007) Specifying formative constructs in is research. MIS Quarterly 31(4), 623-656.
-
(2007)
MIS Quarterly
, vol.31
, Issue.4
, pp. 623-656
-
-
Petter, S.1
Straub, D.W.2
Rai, A.3
-
60
-
-
84973676082
-
Situational performance constraints and task characteristics: Their relationship to motivation and satisfaction
-
PHILLIPS JS and FREEDMAN SM (1984) Situational performance constraints and task characteristics: Their relationship to motivation and satisfaction. Journal of Management 10(3), 321-331.
-
(1984)
Journal of Management
, vol.10
, Issue.3
, pp. 321-331
-
-
Phillips, J.S.1
Freedman, S.M.2
-
61
-
-
84970235764
-
Self-reports in organizational research: Problems and prospects
-
PODSAKOFF PM and ORGAN D (1986) Self-reports in organizational research: Problems and prospects. Journal of Management 12(4), 531-544.
-
(1986)
Journal of Management
, vol.12
, Issue.4
, pp. 531-544
-
-
Podsakoff, P.M.1
Organ, D.2
-
62
-
-
0141907688
-
Common method biases in behavioral research: A critical review of the literature and recommended remedies
-
DOI 10.1037/0021-9010.88.5.879
-
PODSAKOFF PM, MACKENZIE SB, LEE JY and PODSAKOFF NP (2003) Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology 88(5), 879-903. (Pubitemid 37239703)
-
(2003)
Journal of Applied Psychology
, vol.88
, Issue.5
, pp. 879-903
-
-
Podsakoff, P.M.1
MacKenzie, S.B.2
Lee, J.-Y.3
Podsakoff, N.P.4
-
63
-
-
35148820994
-
Commentary: Legal effect of revealing private information in the US and abroad
-
RADCLIFF S (2007) Commentary: Legal effect of revealing private information in the US and abroad. Information Systems Management 24(4), 343-344.
-
(2007)
Information Systems Management
, vol.24
, Issue.4
, pp. 343-344
-
-
Radcliff, S.1
-
65
-
-
17744373574
-
Research note: Detecting a response set to likert-style attitude items with the rating model
-
RENNIE L (1982) Research note: Detecting a response set to likert-style attitude items with the rating model. Education Research and Perspectives 9(1), 114-118.
-
(1982)
Education Research and Perspectives
, vol.9
, Issue.1
, pp. 114-118
-
-
Rennie, L.1
-
66
-
-
71949094501
-
Self-efficacy in information security: Its influence on end users' information security practice behavior
-
RHEE HS, KIM C and RYU YU (2009) Self-efficacy in information security: Its influence on end users' information security practice behavior. Computers & Security 28(6), 816-826.
-
(2009)
Computers & Security
, vol.28
, Issue.6
, pp. 816-826
-
-
Rhee, H.S.1
Kim, C.2
Ryu, Y.U.3
-
68
-
-
37749043462
-
Data security in the age of compliance
-
ROBINSON T (2005) Data security in the age of compliance. Networker 9(3), 24-30.
-
(2005)
Networker
, vol.9
, Issue.3
, pp. 24-30
-
-
Robinson, T.1
-
69
-
-
0000492513
-
Some implications of a social learning theory for the prediction of goal directed behavior from testing procedures
-
ROTTER JB (1960) Some implications of a social learning theory for the prediction of goal directed behavior from testing procedures. Psychological Review 67, 301-316.
-
(1960)
Psychological Review
, vol.67
, pp. 301-316
-
-
Rotter, J.B.1
-
70
-
-
10344240580
-
Sampling and estimation in hidden populations using respondent-driven sampling
-
SALGANIK MJ and HECKATHORD DD (2004) Sampling and estimation in hidden populations using respondent-driven sampling. Sociological Methodology 34(1), 193-239. (Pubitemid 40465521)
-
(2004)
Sociological Methodology
, vol.34
, pp. 193-239
-
-
Salganik, M.J.1
Heckathorn, D.D.2
-
71
-
-
0035387175
-
Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
-
DOI 10.1023/A:1011902718709
-
SASSE MA, BROSTOFF S and WEIRICH D (2001) Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT Technology Journal 19(3), 122-131. (Pubitemid 32903117)
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
72
-
-
0000852824
-
Ability versus effort attributional feedback: Differential effects on self-efficacy and achievement
-
SCHUNK DH (1983) Ability versus effort attributional feedback: Differential effects on self-efficacy and achievement. Journal of Educational Psychology 75(6), 848-856.
-
(1983)
Journal of Educational Psychology
, vol.75
, Issue.6
, pp. 848-856
-
-
Schunk, D.H.1
-
73
-
-
0001342546
-
Sequential attributional feedback and children's achievement behavior
-
SCHUNK DH (1984) Sequential attributional feedback and children's achievement behavior. Journal of Educational Psychology 76(5), 1159-1169.
-
(1984)
Journal of Educational Psychology
, vol.76
, Issue.5
, pp. 1159-1169
-
-
Schunk, D.H.1
-
74
-
-
84936823564
-
The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research
-
SHEPPARD B, HARTWICK J and WARSHAW P (1988) The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research. Journal of Consumer Research 15(3), 325-343.
-
(1988)
Journal of Consumer Research
, vol.15
, Issue.3
, pp. 325-343
-
-
Sheppard, B.1
Hartwick, J.2
Warshaw, P.3
-
75
-
-
33745005942
-
Barriers of HIPAA regulation to implementation of health services research
-
DOI 10.1007/s10916-006-7406-z
-
SHEN JJ, SAMSON LF, WASHINGTON EL, JOHNSON P, EDWARDS C and MALONE A (2006) Barriers of HIPAA regulation to implementation of health services research. Journal of Medical Systems 30(1), 65-69. (Pubitemid 44124367)
-
(2006)
Journal of Medical Systems
, vol.30
, Issue.1
, pp. 65-69
-
-
Shen, J.J.1
Samson, L.F.2
Washington, E.L.3
Johnson, P.4
Edwards, C.5
Malone, A.6
-
76
-
-
0033683516
-
A conceptual foundation for organizational information assurance awareness
-
SIPONEN MT (2000) A conceptual foundation for organizational information assurance awareness. Information Management and Computer Security 8(1), 31-41.
-
(2000)
Information Management and Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.T.1
-
77
-
-
0011644488
-
An analysis of the recent IS security development approaches: Descriptive and prescriptive implications
-
(DHILLON G, Ed.), Idea Group, Hershey, PA
-
SIPONEN MT (2001) An analysis of the recent IS security development approaches: Descriptive and prescriptive implications. In Information Security Management - Global Challenges in the Next Millennium (DHILLON G, Ed.), Idea Group, Hershey, PA.
-
(2001)
Information Security Management - Global Challenges in the Next Millennium
-
-
Siponen, M.T.1
-
78
-
-
77957068563
-
Neutralization: New insights into the problem of employee information systems security policy violations
-
SIPONEN M and VANCE A (2010) Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly 34(3), 487-502.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 487-502
-
-
Siponen, M.1
Vance, A.2
-
79
-
-
17844366573
-
Analysis of end user security behaviors
-
DOI 10.1016/j.cose.2004.07.001, PII S0167404804001841
-
STANTON JM, STAM KR, MASTRANGELO PM and JOLTON JA (2005) Analysis of end user security behaviors. Computers & Security 24(2), 124-133. (Pubitemid 40583824)
-
(2005)
Computers and Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
80
-
-
0000280419
-
Effective IS security: An empirical study
-
STRAUB D (1990) Effective IS security: An empirical study. Information Systems Research 1(3), 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.1
-
81
-
-
13244286108
-
Validation guidelines for IS positivist research
-
STRAUB DW, BOUDREAU MC and GEFEN D (2004) Validation guidelines for IS positivist research. Communications of AIS 13(63), 380-427.
-
(2004)
Communications of AIS
, vol.13
, Issue.63
, pp. 380-427
-
-
Straub, D.W.1
Boudreau, M.C.2
Gefen, D.3
-
82
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
STRAUB DW and WELKE RJ (1998) Coping with system risk: Security planning models for management decision making. MIS Quarterly 22(4), 441-464. (Pubitemid 128684563)
-
(1998)
MIS Quarterly: Management Information Systems
, vol.22
, Issue.4
, pp. 441-464
-
-
Straub, D.W.1
Welke, R.J.2
-
83
-
-
69949098041
-
Understanding frame-of-reference training success: A social learning theory perspective
-
SULSKY LM and KLINE TJ (2007) Understanding frame-of-reference training success: A social learning theory perspective. International Journal of Training and Development 11(2), 121-131.
-
(2007)
International Journal of Training and Development
, vol.11
, Issue.2
, pp. 121-131
-
-
Sulsky, L.M.1
Kline, T.J.2
-
84
-
-
0036721863
-
Effects of training on Internet self-efficacy and computer user attitudes
-
DOI 10.1016/S0747-5632(02)00010-9, PII S0747563202000109
-
TORKZADEH G and VAN DYKE TP (2002) Effects of training on internet selfefficacy and computer user attitudes. Computers in Human Behavior 18(5), 479-494. (Pubitemid 34771850)
-
(2002)
Computers in Human Behavior
, vol.18
, Issue.5
, pp. 479-494
-
-
Torkzadeh, G.1
Van Dyke, T.P.2
-
85
-
-
0033084258
-
Managerial self-efficacy, outcome expectancies, and work-role salience as determinants of ambition for a managerial position
-
VAN VIANEN AE (1999) Managerial self-efficacy, outcome expectancies, and work-role salience as determinants of ambition for a managerial position. Journal of Applied Social Psychology 29(3), 639-665.
-
(1999)
Journal of Applied Social Psychology
, vol.29
, Issue.3
, pp. 639-665
-
-
Van Vianen, A.E.1
-
86
-
-
79955586709
-
Can privacy compliance be monitored?
-
VOGT N (2005) Can privacy compliance be monitored? Journal of Health Care Compliance 7(4), 56-58.
-
(2005)
Journal of Health Care Compliance
, vol.7
, Issue.4
, pp. 56-58
-
-
Vogt, N.1
-
87
-
-
2342475711
-
Towards information security behavioural compliance
-
VROOM C and VON SOLMS R (2004) Towards information security behavioural compliance. Computers & Security 23(3), 191-198.
-
(2004)
Computers & Security
, vol.23
, Issue.3
, pp. 191-198
-
-
Vroom, C.1
Von Solms, R.2
-
88
-
-
67650170305
-
Behavioral and policy issues in information systems security: The insider threat
-
WARKENTIN M and WILLISON R (2009) Behavioral and policy issues in information systems security: The insider threat. European Journal of Information Systems 18(2), 101-105.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 101-105
-
-
Warkentin, M.1
Willison, R.2
-
90
-
-
70350572582
-
Making users mindful of IT security; awareness training is vital to keeping the idea of IT security uppermost in employees' minds
-
WHITMAN EM and MATTORD HJ (2004) Making users mindful of IT security; awareness training is vital to keeping the idea of IT security uppermost in employees' minds. Security Management 48(11), 32-34.
-
(2004)
Security Management
, vol.48
, Issue.11
, pp. 32-34
-
-
Whitman, E.M.1
Mattord, H.J.2
-
91
-
-
33749351964
-
Opportunities for computer crime: Considering systems risk from a criminological perspective
-
DOI 10.1057/palgrave.ejis.3000592, PII 3000592
-
WILLISON R and BACKHOUSE J (2006) Opportunities for computer crime: Considering systems risk from a criminological perspective. European Journal of Information Systems 15(4), 403-414. (Pubitemid 44494839)
-
(2006)
European Journal of Information Systems
, vol.15
, Issue.4
, pp. 403-414
-
-
Willison, R.1
Backhouse, J.2
-
92
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
WORKMAN M, BOMMER WH and STRAUB D (2008) Security lapses and the omission of information security measures: A threat control model and empirical test. Computer in Human Behavior 24(6), 2799-2816.
-
(2008)
Computer in Human Behavior
, vol.24
, Issue.6
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.H.2
Straub, D.3
|