-
1
-
-
0043232732
-
Users are not the enemy
-
Adams, A. and Sasse, M.A. (1999), "Users are not the enemy", Communications of the ACM, Vol. 42 No. 12, pp. 41-6. (Pubitemid 129568045)
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 41-46
-
-
Adams, A.1
Sasse, M.A.2
-
2
-
-
34249871944
-
A qualitative study of users' view on information security
-
DOI 10.1016/j.cose.2006.11.004, PII S0167404806002033
-
Albrechtsen, E. (2007), "A qualitative study of users' view on information security", Computers and Security, Vol. 26, pp. 276-89. (Pubitemid 46873753)
-
(2007)
Computers and Security
, vol.26
, Issue.4
, pp. 276-289
-
-
Albrechtsen, E.1
-
3
-
-
0002545789
-
Students as surrogates in behavioral accounting research: Some evidence
-
Ashton, R. and Kramer, S. (1980), "Students as surrogates in behavioral accounting research: Some evidence", Journal of Accounting Research, Vol. 18 No. 1, pp. 1-15.
-
(1980)
Journal of Accounting Research
, vol.18
, Issue.1
, pp. 1-15
-
-
Ashton, R.1
Kramer, S.2
-
5
-
-
43649105033
-
Quo vadis, TAM
-
Benbasat, I. and Barki, H. (2007), "Quo vadis, TAM", Journal of the Association for Information Systems, Vol. 8 No. 4, pp. 211-8.
-
(2007)
Journal of the Association for Information Systems
, vol.8
, Issue.4
, pp. 211-8
-
-
Benbasat, I.1
Barki, H.2
-
6
-
-
2342598277
-
Computer security impaired by legitimate users
-
Besnard, D. and Arief, B. (2004), "Computer security impaired by legitimate users", Computers and Security, Vol. 23, pp. 229-37.
-
(2004)
Computers and Security
, vol.23
, pp. 229-37
-
-
Besnard, D.1
Arief, B.2
-
7
-
-
15044341950
-
Laboratory experimentation in accounting research
-
Birnberg, J. and Nath, R. (1968), "Laboratory experimentation in accounting research", Accounting Review, Vol. 43 No. 1, pp. 38-45.
-
(1968)
Accounting Review
, vol.43
, Issue.1
, pp. 38-45
-
-
Birnberg, J.1
Nath, R.2
-
8
-
-
0021731753
-
Empirical validation of affect, behavior, and cognition as distinct components of attitude
-
Breckler, S.J. (1984), "Empirical validation of affect, behavior, and cognition as distinct components of attitude", Journal of Personality and Social Psychology, Vol. 47 No. 6, pp. 1191-205.
-
(1984)
Journal of Personality and Social Psychology
, vol.47
, Issue.6
, pp. 1191-205
-
-
Breckler, S.J.1
-
9
-
-
0003526482
-
-
Sage Thousand Oaks, CA
-
Byrne, B. (1994), Structural Equation Modeling with EQS and EQS/Windows: Basic Concepts, Applications, and Programming, Sage, Thousand Oaks, CA.
-
(1994)
Structural Equation Modeling with EQS and EQS/Windows: Basic Concepts, Applications, and Programming
-
-
Byrne, B.1
-
10
-
-
0001698113
-
Designing research for application
-
Calder, B.J., Phillips, L.W. and Tybout, A.M. (1981), "Designing research for application", Journal of Consumer Research, Vol. 8, pp. 197-207.
-
(1981)
Journal of Consumer Research
, vol.8
, pp. 197-207
-
-
Calder, B.J.1
Phillips, L.W.2
Tybout, A.M.3
-
11
-
-
33845770414
-
Initial trust and online buyer behaviour
-
Chen, Y. and Barnes, S. (2007), "Initial trust and online buyer behaviour", Industrial Management & Data Systems, Vol. 107 No. 1, p. 21.
-
(2007)
Industrial Management & Data Systems
, vol.107
, Issue.1
, pp. 21
-
-
Chen, Y.1
Barnes, S.2
-
12
-
-
21844490735
-
Measuring the affective and cognitive properties of attitudes: Conceptual and methodological issues
-
Crites, S.L., Fabrigar, L.R. and Petty, R.E. (1994), "Measuring the affective and cognitive properties of attitudes: Conceptual and methodological issues", Personality and Social Psychology Bulletin, Vol. 20 No. 6, pp. 619-34.
-
(1994)
Personality and Social Psychology Bulletin
, vol.20
, Issue.6
, pp. 619-34
-
-
Crites, S.L.1
Fabrigar, L.R.2
Petty, R.E.3
-
13
-
-
0003002898
-
Test reliability: Its meaning and determination
-
Cronbach, L. (1947), "Test reliability: Its meaning and determination", Psychometrika, Vol. 12 No. 1, pp. 1-16.
-
(1947)
Psychometrika
, vol.12
, Issue.1
, pp. 1-16
-
-
Cronbach, L.1
-
14
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
Davis, F. (1989), "Perceived usefulness, perceived ease of use, and user acceptance of information technology", MIS Quarterly, Vol. 13 No. 3, pp. 319-40.
-
(1989)
MIS Quarterly
, vol.13
, Issue.3
, pp. 319-40
-
-
Davis, F.1
-
15
-
-
84936823933
-
User acceptance of computer technology: A comparison of two theoretical models
-
Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1989), "User acceptance of computer technology: A comparison of two theoretical models", Management Science, Vol. 35 No. 8, pp. 982-1003.
-
(1989)
Management Science
, vol.35
, Issue.8
, pp. 982-1003
-
-
Davis, F.D.1
Bagozzi, R.P.2
Warshaw, P.R.3
-
16
-
-
34548317576
-
Information security resources: A selected annotated bibliography
-
DOI 10.1300/J122v27n03-03
-
Dotson, D.S. (2007), "Information security resources: A selected annotated bibliography", Science & Technology Libraries, Vol. 27 No. 3, pp. 29-51. (Pubitemid 47337411)
-
(2007)
Science and Technology Libraries
, vol.27
, Issue.3
, pp. 29-51
-
-
Dotson, D.S.1
-
17
-
-
0003714701
-
-
Harcourt Brace Jovanovich sCollege Publishers, Fort Worth, TX
-
Eagly, H. and Chaiken, S. (1993), The Psychology of Attitudes, Harcourt Brace Jovanovich College Publishers, Fort Worth, TX.
-
(1993)
The Psychology of Attitudes
-
-
Eagly, H.1
Chaiken, S.2
-
18
-
-
0000203039
-
The effect of framing on choice: Interactions with risk-taking propensity, cognitivestyle, and sex
-
Fagley, N. and Miller, P. (1990), "The effect of framing on choice: Interactions with risk-taking propensity, cognitivestyle, and sex", Personality and Social Psychology Bulletin, Vol. 16 No. 3, p. 496.
-
(1990)
Personality and Social Psychology Bulletin
, vol.16
, Issue.3
, pp. 496
-
-
Fagley, N.1
Miller, P.2
-
19
-
-
33646354609
-
Consumer trust, perceived security and privacy policy
-
Flavian, C. and Guinaliu, M. (2006), "Consumer trust, perceived security and privacy policy", Industrial Management & Data Systems, Vol. 106 No. 5, pp. 601-20.
-
(2006)
Industrial Management & Data Systems
, vol.106
, Issue.5
, pp. 601-20
-
-
Flavian, C.1
Guinaliu, M.2
-
20
-
-
0002000341
-
Causal inference from panel data
-
Heise, D.R. (1970), "Causal inference from panel data", Sociological Methodology, Vol. 2, pp. 3-27.
-
(1970)
Sociological Methodology
, vol.2
, pp. 3-27
-
-
Heise, D.R.1
-
21
-
-
33644586763
-
Balancing performance measures for information security management: A balanced scorecard framework
-
Huang, S., Lee, C. and Kao, A. (2006), "Balancing performance measures for information security management: A balanced scorecard framework", Industrial Management & Data Systems, Vol. 106 Nos 1/2, pp. 242-55.
-
(2006)
Industrial Management & Data Systems
, vol.106
, Issue.1-2
, pp. 242-55
-
-
Huang, S.1
Lee, C.2
Kao, A.3
-
22
-
-
33744779400
-
Biometrics: A tool for information security
-
DOI 10.1109/TIFS.2006.873653
-
Jain, A.K., Ross, A. and Pankati, S. (2006), "Biometrics: A tool for information security", IEEE Transactions on Information Forensics and Security, Vol. 1 No. 2, pp. 125-43. (Pubitemid 43824625)
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 125-143
-
-
Jain, A.K.1
Ross, A.2
Pankanti, S.3
-
23
-
-
0003613437
-
-
Abt Books, Cambridge, MA
-
Jöreskog, K., Sörbom, D., Magidson, J. and Cooley, W. (1979), Advances in Factor Analysis and Structural Equation Models, Abt Books, Cambridge, MA.
-
(1979)
Advances in Factor Analysis and Structural Equation Models
-
-
Jöreskog, K.1
Sörbom, D.2
Magidson, J.3
Cooley, W.4
-
24
-
-
0003489786
-
-
McGraw-Hill, New York, NY
-
Katz, D. and Stotland, E. (1959), Psychology: A Study of a Science, McGraw-Hill, New York, NY.
-
(1959)
Psychology: A Study of a Science
-
-
Katz, D.1
Stotland, E.2
-
26
-
-
79955694058
-
Foiling the cracker: A survey of, and improvements to, password security
-
Klien, D.V. (1990), "Foiling the cracker: A survey of, and improvements to, password security", Proceedings of the USENIX UNIX Security Workshop, Portland.
-
(1990)
Proceedings of the USENIX UNIX Security Workshop, Portland
-
-
Klien, D.V.1
-
27
-
-
34548139401
-
The International Journal of Information Security special issue on privacy, security and trust technologies and E-business services
-
DOI 10.1007/s10207-007-0036-8
-
Knight, S., Buffett, S. and Hung, P. (2007), "Special issue on privacy, security and trust technologies and e-business services. Guest editors' introduction", International Journal of Information Security, Vol. 6 No. 5, pp. 285-6. (Pubitemid 47299555)
-
(2007)
International Journal of Information Security
, vol.6
, Issue.5
, pp. 285-286
-
-
Knight, S.1
Buffett, S.2
Hung, P.C.K.3
-
28
-
-
21044442407
-
Media richness or media naturalness? The evolution of our biological communication apparatus and its influence on our behavior toward e-communication tools
-
DOI 10.1109/TPC.2005.849649
-
Kock, N. (2005), "Media richness or media naturalness? The evolution of our biological communication apparatus and its influence on our behavior toward e-communication tools", IEEE Transactions on Professional Communication, Vol. 48 No. 2, pp. 117-30. (Pubitemid 40871091)
-
(2005)
IEEE Transactions on Professional Communication
, vol.48
, Issue.2
, pp. 117-130
-
-
Kock, N.1
-
29
-
-
0015117222
-
Validation of feeling, belief, and intention to act as three components of attitude and their contribution to prediction of contraceptive behavior
-
Kothandapani, V. (1971), "Validation of feeling, belief, and intention to act as three components of attitude and their contribution to prediction of contraceptive behavior", Journal of Personality and Social Psychology, Vol. 19 No. 3, pp. 321-33.
-
(1971)
Journal of Personality and Social Psychology
, vol.19
, Issue.3
, pp. 321-33
-
-
Kothandapani, V.1
-
30
-
-
15044345951
-
Comparing the investment decisions of accounting practitioners and students: An empirical study on the adequacy of student surrogates
-
DOI 10.1016/j.accfor.2004.05.001
-
Liyanarachchi, G. and Milne, M. (2005), "Comparing the investment decisions of accounting practitioners and students: An empirical study on the adequacy of student surrogates", In Accounting Forum, Vol. 29, pp. 121-35. (Pubitemid 40382442)
-
(2005)
Accounting Forum
, vol.29
, Issue.2
, pp. 121-135
-
-
Liyanarachchi, G.A.1
Milne, M.J.2
-
31
-
-
33746870727
-
The agency of hybrids: Overcoming the symmetrophobic block
-
McMaster, T. and Wastell, D.G. (2005), "The agency of hybrids: Overcoming the symmetrophobic block", Scandinavian Journal of Information Systems, Vol. 17 No. 1, pp. 175-82.
-
(2005)
Scandinavian Journal of Information Systems
, vol.17
, Issue.1
, pp. 175-82
-
-
McMaster, T.1
Wastell, D.G.2
-
32
-
-
1642644154
-
-
Lawrence-Erlbaum, Mahwah, NJ
-
Maxwell, S. and Delaney, H. (2004), Designing Experiments and Analyzing Data: A Model Comparison Perspective, Lawrence-Erlbaum, Mahwah, NJ.
-
(2004)
Designing Experiments and Analyzing Data: A Model Comparison Perspective
-
-
Maxwell, S.1
Delaney, H.2
-
33
-
-
17344370576
-
Personality and domain-specific risk taking
-
DOI 10.1080/1366987032000123856, PII T96297
-
Nicholson, N., Soane, E., Fenton-O'Creevy, M. and Willman, P. (2005), "Personality and domain-specific risk taking", Journal of Risk Research, Vol. 8 No. 2, pp. 157-76. (Pubitemid 43203546)
-
(2005)
Journal of Risk Research
, vol.8
, Issue.2
, pp. 157-176
-
-
Nicholson, N.1
Soane, E.2
Fenton-O'Creevy, M.3
Willman, P.4
-
34
-
-
33847382472
-
The privacy paradox: Personal information disclosure intentions versus behaviors
-
Norberg, P., Horne, D. and Horne, D. (2007), "The privacy paradox: Personal information disclosure intentions versus behaviors", Journal of Consumer Affairs, Vol. 41 No. 1, pp. 100-26.
-
(2007)
Journal of Consumer Affairs
, vol.41
, Issue.1
, pp. 100-26
-
-
Norberg, P.1
Horne, D.2
Horne, D.3
-
35
-
-
0003623149
-
-
University of Illinois Press, Urbana, IL
-
Osgood, C.E., Suci, G.J. and Tannenbaum, P.H. (1957), The Measurement of Meaning, University of Illinois Press, Urbana, IL.
-
(1957)
The Measurement of Meaning
-
-
Osgood, C.E.1
Suci, G.J.2
Tannenbaum, P.H.3
-
36
-
-
38149089032
-
The relationship between the affective, behavioral, and cognitive components of attitude
-
Ostrom, T.M. (1969), "The relationship between the affective, behavioral, and cognitive components of attitude", Journal of Experimental Social Psychology, Vol. 15 No. 1, pp. 12-30.
-
(1969)
Journal of Experimental Social Psychology
, vol.15
, Issue.1
, pp. 12-30
-
-
Ostrom, T.M.1
-
37
-
-
0035542105
-
On the use of college students in social science research: Insights from a second-order meta-analysis
-
DOI 10.1086/323732
-
Peterson, R. (2001), "On the use of college students in social science research: Insights from a second-order meta-analysis", Journal of Consumer Research, Vol. 28 No. 3, pp. 450-61. (Pubitemid 33403469)
-
(2001)
Journal of Consumer Research
, vol.28
, Issue.3
, pp. 450-461
-
-
Peterson, R.A.1
-
38
-
-
34248334263
-
Evaluating information security tradeoffs: Restricting access can interfere with user tasks
-
Post, G.V. and Kagan, A. (2007), "Evaluating information security tradeoffs: Restricting access can interfere with user tasks", Computers and Security, Vol. 26, pp. 253-64.
-
(2007)
Computers and Security
, vol.26
, pp. 253-64
-
-
Post, G.V.1
Kagan, A.2
-
39
-
-
0036559882
-
Improving computer security for authentication of users: Influence of proactive password restrictions
-
Proctor, R., Lien, M., Schultz, E. and Salvendy, G. (2002), "Improving computer security for authentication of users: Influence of proactive password restrictions", Behavior Research Methods, Instruments, & Computers, Vol. 34 No. 2, pp. 163-9.
-
(2002)
Behavior Research Methods, Instruments, & Computers
, vol.34
, Issue.2
, pp. 163-9
-
-
Proctor, R.1
Lien, M.2
Schultz, E.3
Salvendy, G.4
-
40
-
-
0024768109
-
Passwords in use in a university timesharing environment
-
Riddle, B.L., Miron, M.S. and Semo, J.A. (1989), "Passwords in use in a university timesharing environment", Computers and Security, Vol. 8 No. 7, pp. 569-79.
-
(1989)
Computers and Security
, vol.8
, Issue.7
, pp. 569-79
-
-
Riddle, B.L.1
Miron, M.S.2
Semo, J.A.3
-
41
-
-
0004140201
-
-
Yale University Press, New Haven, CT
-
Rosenberg, M.J. and Hovland, C.I. (1960), Attitude Organization and Change: An Analysis of Consistency, Yale University Press, New Haven, CT.
-
(1960)
Attitude Organization and Change: An Analysis of Consistency
-
-
Rosenberg, M.J.1
Hovland, C.I.2
-
42
-
-
34347333511
-
Research on usability in information security
-
DOI 10.1016/S1361-3723(07)70075-1, PII S1361372307700751
-
Schultz, E.E. (2007), "Research on usability in information security", Computer Fraud & Security, Vol. 6, pp. 8-10. (Pubitemid 47009036)
-
(2007)
Computer Fraud and Security
, vol.2007
, Issue.6
, pp. 8-10
-
-
Schultz, E.E.1
-
43
-
-
69749091797
-
The role of social cognitive career theory in information technology based academic performance
-
Smith, S. (2002), "The role of social cognitive career theory in information technology based academic performance", Information Technology Learning and Performance Journal, Vol. 20, pp. 1-10.
-
(2002)
Information Technology Learning and Performance Journal
, vol.20
, pp. 1-10
-
-
Smith, S.1
-
44
-
-
70350162420
-
-
NIST Special Publication 800-60, Gaithersburg MD
-
Stine, K., Barker, W.C., Fahlsing, J. and Gulick, J. (2008), Guide for Mapping Types of Information and Information Systems to Security Categories, Vol. I, NIST Special Publication 800-60, Gaithersburg, MD.
-
(2008)
Guide for Mapping Types of Information and Information Systems to Security Categories
, vol.1
-
-
Stine, K.1
Barker, W.C.2
Fahlsing, J.3
Gulick, J.4
-
46
-
-
59249084781
-
Survey accesses the state of information security worldwide
-
Swartz, N. (2004), "Survey accesses the state of information security worldwide", Information Management Journal, Vol. 38 No. 1.
-
(2004)
Information Management Journal
, vol.38
, Issue.1
-
-
Swartz, N.1
-
47
-
-
0242517401
-
Information security awareness: Educating your users effectively
-
Thomson, K.-L. and von Solms, R. (1998), "Information security awareness: Educating our users effectively", Information Management & Computer Security, Vol. 6 No. 4, pp. 167-73. (Pubitemid 128623423)
-
(1998)
Information Management and Computer Security
, vol.6
, Issue.4
, pp. 167-173
-
-
Thomson, M.E.1
Von Solms, R.2
-
48
-
-
1542382496
-
User acceptance of information technology: Toward a unified view
-
Venkatesh, V., Morris, M.G., Davis, G.B. and Fred, D. (2003), "User acceptance of information technology: Toward a unified view", MIS Quarterly, Vol. 27 No. 3, pp. 425-78.
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. 425-78
-
-
Venkatesh, V.1
Morris, M.G.2
Davis, G.B.3
Fred, D.4
-
49
-
-
2642569127
-
Introducing the check-off password system (COPS): An advancement in user authentication methods and information security
-
Warkentin, M., Davis, K. and Bekkering, E. (2004), "Introducing the check-off password system (COPS): An advancement in user authentication methods and information security", Journal of Organizational and End User Computing, Vol. 16 No. 3, pp. 41-58.
-
(2004)
Journal of Organizational and End User Computing
, vol.16
, Issue.3
, pp. 41-58
-
-
Warkentin, M.1
Davis, K.2
Bekkering, E.3
-
50
-
-
0038992759
-
-
Cambridge University Press, New York, NY
-
Zanna, M.P. and Rempel, J.K. (1988), The Social Psychology of Knowledge, Cambridge University Press, New York, NY.
-
(1988)
The Social Psychology of Knowledge
-
-
Zanna, M.P.1
Rempel, J.K.2
-
51
-
-
0034547827
-
Personality and risk-taking: Common bisocial factors
-
Zuckerman, M. and Kuhlman, D. (2000), "Personality and risk-taking: Common bisocial factors", Journal of Personality, Vol. 68 No. 6, pp. 999-1029.
-
(2000)
Journal of Personality
, vol.68
, Issue.6
, pp. 999-1029
-
-
Zuckerman, M.1
Kuhlman, D.2
|