-
1
-
-
0032339276
-
Conceptual and operational definition of personal innovativeness in the domain of information technology
-
Agarwal, R. and J. Prasad. "Conceptual and Operational Definition of Personal Innovativeness in the Domain of Information Technology." Information Systems Research, 1998, 9:2, pp. 204-215.
-
(1998)
Information Systems Research
, vol.9
, Issue.2
, pp. 204-215
-
-
Agarwal, R.1
Prasad, J.2
-
3
-
-
84914123837
-
A research model for investigating human behavior related to computer security
-
Tampa, FL, August 4-6. 2003
-
Aytes, K. and Connolly, T. "A Research Model for Investigating Human Behavior Related to Computer Security", Proceedings of the 2003 American Conference On Information Systems, Tampa, FL, August 4-6. 2003.
-
Proceedings of the 2003 American Conference on Information Systems
-
-
Aytes, K.1
Connolly, T.2
-
4
-
-
2642549662
-
Computer and risky computing practices: A rational choice perspective
-
Aytes, K. and Connolly, T. "Computer and Risky Computing Practices: A Rational Choice Perspective", Journal of Organizational and End User Computing, 16:2, 2004, pp. 22-40.
-
(2004)
Journal of Organizational and End User Computing
, vol.16
, Issue.2
, pp. 22-40
-
-
Aytes, K.1
Connolly, T.2
-
5
-
-
30744434347
-
An analysis of the growth of computer and internet security breaches
-
Bagchi, K. and Udo, G. "An analysis of the growth of computer and Internet security breaches", Communications of AIS 12, 2003, pp. 684-700.
-
(2003)
Communications of AIS
, vol.12
, pp. 684-700
-
-
Bagchi, K.1
Udo, G.2
-
6
-
-
0017472917
-
Self-efficacy: Toward a unifying theory of behaviour change
-
Bandura, A. "Self-Efficacy: Toward a Unifying Theory of Behaviour Change", Psychological Review 84:2, 1977, pp. 191-215.
-
(1977)
Psychological Review
, vol.84
, Issue.2
, pp. 191-215
-
-
Bandura, A.1
-
7
-
-
9744260316
-
Validation in information systems research: A state-of-the-art assessment
-
Boudreau, M.-C., Gefen, D. and Straub, D. W. "Validation in information systems research: A state-of-the-art assessment." MIS Quarterly 25:1, 2001, pp. 1-16. (Pubitemid 33738447)
-
(2001)
MIS Quarterly: Management Information Systems
, vol.25
, Issue.1
, pp. 1-16
-
-
Boudreau, M.-C.1
Gefen, D.2
Straub, D.W.3
-
9
-
-
23044525969
-
Current directions in information security research: Toward socio-organizational perspectives
-
Dhillon, G. and Backhouse, J. "Current directions in information security research: toward socio-organizational perspectives", Information Systems Journal, 2001, 11:2.
-
(2001)
Information Systems Journal
, vol.11
, pp. 2
-
-
Dhillon, G.1
Backhouse, J.2
-
11
-
-
84990029315
-
The economics of information security investment
-
Gordon, L & Loeb, M. The economics of information security investment. ACM Transactions on Information and System Security, 2002, 5:4, pp. 438-457.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.1
Loeb, M.2
-
12
-
-
0003506109
-
-
5th ed: Upper Saddle River, New Jersey, Prentice Hall Inc
-
Hair, J.F.J., Anderson, R.E., Tatham, R.L., and Black, W. C. Multivariate data analysis. 5th ed: Upper Saddle River, New Jersey, Prentice Hall Inc, 1998.
-
(1998)
Multivariate Data Analysis
-
-
Hair, J.F.J.1
Anderson, R.E.2
Tatham, R.L.3
Black, W.C.4
-
13
-
-
0003506109
-
-
6th ed. Pearson Prentice Hall
-
Hair, J.F.J., Black,W.C., Babin, B.J. Anderson, R.E., Tatham, R.L. Multivariate data analysis. 6th ed. Pearson Prentice Hall, 2006.
-
(2006)
Multivariate Data Analysis
-
-
Hair, J.F.J.1
Black, W.C.2
Babin, B.J.3
Anderson, R.E.4
Tatham, R.L.5
-
14
-
-
0037411157
-
Factors influencing the usage of websites: The case of a generic portal in the Netherlands
-
Heijden, H. V. D. "Factors influencing the usage of websites: the case of a generic portal in The Netherlands." Information & Management, 2003, 40, pp. 541-549.
-
(2003)
Information & Management
, vol.40
, pp. 541-549
-
-
Heijden, H.V.D.1
-
15
-
-
0002042413
-
The 9 to 5 underground: Are you policing computer crimes
-
Hoffer, J. A. and D. W. Straub. "The 9 to 5 Underground: Are you Policing Computer Crimes." Sloan Management Review, 1989, 30:4, pp. 35-43.
-
(1989)
Sloan Management Review
, vol.30
, Issue.4
, pp. 35-43
-
-
Hoffer, J.A.1
Straub, D.W.2
-
16
-
-
84883023432
-
Structural equation model
-
H. R. Hoyle (ed.), SAGE publications, Inc
-
Hoyle, R.H. Structural Equation Model. Concepts, Issues, and Applications, H. R. Hoyle (ed.), SAGE publications, Inc, 1995.
-
(1995)
Concepts, Issues, and Applications
-
-
Hoyle, R.H.1
-
17
-
-
29444455377
-
An application of deterrence theory to software piracy
-
Higgins, G.E., Wilson, A.L. and Fell, B.D. "An Application of Deterrence Theory to Software Piracy", Journal of Criminal Justice and Popular Culture, 2005, 12:3, pp. 166-184. (Pubitemid 43011663)
-
(2005)
Journal of Criminal Justice and Popular Culture
, vol.12
, Issue.3
, pp. 166-184
-
-
Higgins, G.E.1
Wilson, A.L.2
Fell, B.D.3
-
18
-
-
0036299585
-
Security surveys spring crop
-
DOI 10.1016/S0167-4048(02)00404-2
-
Hinde, S. "Security surveys spring crop", Computers & Security, 2002, 21:4, pp. 310-321. (Pubitemid 34715235)
-
(2002)
Computers and Security
, vol.21
, Issue.4
, pp. 310-321
-
-
Hinde, S.1
-
19
-
-
0001094004
-
Information technology adoption across time: A cross-sectional comparison of pre-adoption and post-adoption beliefs
-
Karahanna, E., Straub, D. W. and Chervany, N. L. "Information technology adoption across time: A cross-sectional comparison of pre-adoption and post-adoption beliefs", MIS Quarterly, 1999, 23:2, pp. 183-213.
-
(1999)
MIS Quarterly
, vol.23
, Issue.2
, pp. 183-213
-
-
Karahanna, E.1
Straub, D.W.2
Chervany, N.L.3
-
20
-
-
12444325211
-
Force of habit and information systems usage: Theory and initial validation
-
Limayem, M., and Hirt, S.G. "Force of Habit and Information Systems Usage: Theory and Initial Validation", Journal of Association for Information Systems, 2003, 4, pp. 65-97.
-
(2003)
Journal of Association for Information Systems
, vol.4
, pp. 65-97
-
-
Limayem, M.1
Hirt, S.G.2
-
21
-
-
0000430606
-
Extending the TAM for a World-Wide-Web context
-
DOI 10.1016/S0378-7206(00)00061-6, PII S0378720600000616
-
Moon, J.-W. and Y.-G. Kim. "Extending the TAM for a World-Wide-Web context." Information & Management, 2001, 38, pp. 217-230. (Pubitemid 33651294)
-
(2001)
Information and Management
, vol.38
, Issue.4
, pp. 217-230
-
-
Moon, J.-W.1
Kim, Y.-G.2
-
22
-
-
73449149291
-
Development of an instrument to measure the perceptions of adopting an information technology innovation
-
Moore, G.C. and Benbasat, I. "Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation". Information Systems Research, 1991, 2:3, pp. 191-222.
-
(1991)
Information Systems Research
, vol.2
, Issue.3
, pp. 191-222
-
-
Moore, G.C.1
Benbasat, I.2
-
25
-
-
0023304222
-
Effects of components of protection - Motivation theory on adaptive and maladaptive coping with a health threat
-
Rippetoe, S. and Rogers, R. W., "Effects of Components of Protection - Motivation Theory on Adaptive and Maladaptive Coping with a Health Threat", Journal of Personality and Social Psychology, 1987, 52:3, pp. 596-604.
-
(1987)
Journal of Personality and Social Psychology
, vol.52
, Issue.3
, pp. 596-604
-
-
Rippetoe, S.1
Rogers, R.W.2
-
26
-
-
0002247369
-
Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation theory
-
J. Cacioppo and R. Petty (Eds.), Guilford, New York
-
Rogers, R. W. "Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation Theory", in Social Psychophysiology, J. Cacioppo and R. Petty (Eds.), Guilford, New York, 1983.
-
(1983)
Social Psychophysiology
-
-
Rogers, R.W.1
-
27
-
-
0001045799
-
Protection motivation theory
-
D. S. Gochman (Ed.) , New York, NY, Plenum Press
-
Rogers, R. W. and Prentice-Dunn, S. "Protection motivation theory", In D. S. Gochman (Ed.), Handbook of Health Behavior Research I: Personal and Social Determinants, New York, NY, Plenum Press, 1997, pp. 113-132.
-
(1997)
Handbook of Health Behavior Research I: Personal and Social Determinants
, pp. 113-132
-
-
Rogers, R.W.1
Prentice-Dunn, S.2
-
28
-
-
0003795888
-
-
Mahwah, New Jersey: Lawrence Erlbaum Associates
-
Schumacker, R.E. and R.G. Lomax, A Beginner's Guide to Structural Equation Modeling, Mahwah, New Jersey: Lawrence Erlbaum Associates, 1996, pp. 288.
-
(1996)
A Beginner's Guide to Structural Equation Modeling
, pp. 288
-
-
Schumacker, R.E.1
Lomax, R.G.2
-
29
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Siponen, M. "A Conceptual Foundation for Organizational Information Security Awareness", Information Management & Computer Security, 2000, 8:1, pp. 31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.1
-
30
-
-
24644436394
-
Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods
-
DOI 10.1016/j.infoandorg.2004.11.001, PII S1471772704000557
-
Siponen, M.T. "Analysis of modern information security development approaches: towards the next generation of social and adaptable ISS methods", Information and organization, 2005, 15:4, pp. 339-375. (Pubitemid 41283300)
-
(2005)
Information and Organization
, vol.15
, Issue.4
, pp. 339-375
-
-
Siponen, M.T.1
-
31
-
-
36248967046
-
Adherence to information security policies: An empirical study
-
Sandton, Gauteng, South Africa
-
Siponen, M. T., Pahnila, S., Mahmood, A. Adherence to Information Security Policies: An Empirical Study. Proceedings of the IFIP SEC2007, Sandton, Gauteng, South Africa, 2007.
-
(2007)
Proceedings of the IFIP SEC2007
-
-
Siponen, M.T.1
Pahnila, S.2
Mahmood, A.3
-
32
-
-
17844366573
-
Analysis of end user security behaviors
-
DOI 10.1016/j.cose.2004.07.001, PII S0167404804001841
-
Stanton, J. M., Stam, K. R., Mastrangelo, P. and Jolton, J. "An analysis of end user security behaviors", Computers & Security, 2005, 24, pp. 124-133 (Pubitemid 40583824)
-
(2005)
Computers and Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
33
-
-
55249123249
-
Validating instruments in MIS research
-
Straub, D. W. "Validating Instruments in MIS Research", MIS Quarterly, 1989, 13:2, pp. 147-169.
-
(1989)
MIS Quarterly
, vol.13
, Issue.2
, pp. 147-169
-
-
Straub, D.W.1
-
34
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub, D.W. "Effective IS Security: An Empirical Study", Information Systems Research, 1990, 1:3, pp. 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
35
-
-
0001133137
-
Coping with systems risk: Security planning models for. Management decision-making
-
Straub, D.W. and Welke, R.J. "Coping with Systems Risk: Security Planning Models for. Management Decision-Making", MIS Quarterly, 1998, 22:4, pp. 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
37
-
-
1542382496
-
User acceptance of information technology: Toward a unified view
-
Venkatesh, V., Morris, M. G., Davis, G. B. and Davis, F. D. "User Acceptance of Information Technology: Toward a Unified View", MIS Quarterly, 2003, 27:3, pp. 425-478
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.G.2
Davis, G.B.3
Davis, F.D.4
-
38
-
-
19944367288
-
Secure information systems development - A survey and comparison
-
DOI 10.1016/j.cose.2004.09.011, PII S016740480400241X
-
Villarroel, R., Fernández-Medina, E. and Piattini, M. "Secure information systems development - a survey and comparison", Computers & Security, 2005, 24:4, pp. 308-321. (Pubitemid 40752314)
-
(2005)
Computers and Security
, vol.24
, Issue.4
, pp. 308-321
-
-
Villarroel, R.1
Fernandez-Medina, E.2
Piattini, M.3
-
39
-
-
84869780575
-
A protection motivation theory approach to home wireless security
-
Las Vegas
-
Woon, I. M. Y., Tan, G. W. and Low, R. T. "A Protection Motivation Theory Approach to Home Wireless Security", Proceedings of the Twenty-Sixth International Conference on Information Systems, Las Vegas, 2005, pp. 367-380.
-
(2005)
Proceedings of the Twenty-Sixth International Conference on Information Systems
, pp. 367-380
-
-
Woon, I.M.Y.1
Tan, G.W.2
Low, R.T.3
|