-
2
-
-
77957077814
-
Practicing safe computing: A multimethod empirical examination of home computer user security behavioral Intentions
-
ANDERSON, C. L. AND AGARWAL, R. 2010. Practicing safe computing: A multimethod empirical examination of home computer user security behavioral Intentions. MIS Quart. 34, 3, 613-643.
-
(2010)
MIS Quart.
, vol.34
, Issue.3
, pp. 613-643
-
-
Anderson, C.L.1
Agarwal, R.2
-
3
-
-
0000218526
-
Rejection of outliers
-
ANSCOMBE, F. J. 1960. Rejection of outliers. Technomet. 2, 2, 123-147.
-
(1960)
Technomet.
, vol.2
, Issue.2
, pp. 123-147
-
-
Anscombe, F.J.1
-
4
-
-
0345327807
-
Internet anonymity practices in computer crime
-
ARMSTRONG, H. L. AND FORDE, P. J. 2003. Internet anonymity practices in computer crime. Inform. Manag. Comput. Secur. 11, 5, 209-215.
-
(2003)
Inform. Manag. Comput. Secur.
, vol.11
, Issue.5
, pp. 209-215
-
-
Armstrong, H.L.1
Forde, P.J.2
-
5
-
-
77954250852
-
An empirical analysis of software vendors' patch release behavior: Impact of vulnerability disclosure
-
ARORA, A.,KRISHNAN, R.,TELANG, R., AND YANG, Y. 2010. An empirical analysis of software vendors' patch release behavior: Impact of vulnerability disclosure. Inf. Syst. Res. 21, 1, 115-132.
-
(2010)
Inf. Syst. Res.
, vol.21
, Issue.1
, pp. 115-132
-
-
Arora, A.1
Krishnan, R.2
Telang, R.3
Yang, Y.4
-
6
-
-
33846183559
-
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
-
DOI 10.1007/s10796-006-9012-5, Economic aspects of Information Security
-
ARORA, A., NANDKUMAR, A., AND TELANG, R. 2006. Does information security attack frequency increase with vulnerability disclosure? An empirical analysis. Inf. Syst. Frontiers 8, 5, 350-362. (Pubitemid 46088509)
-
(2006)
Information Systems Frontiers
, vol.8
, Issue.5
, pp. 350-362
-
-
Arora, A.1
Nandkumar, A.2
Telang, R.3
-
7
-
-
0000399057
-
Decision quality using ranked attribute weights
-
BARRON, F. H. AND BARRETT, B. E. 1996. Decision quality using ranked attribute weights. Manag. Sci. 42, 11, 1515-1523. (Pubitemid 126590218)
-
(1996)
Management Science
, vol.42
, Issue.11
, pp. 1515-1523
-
-
Barron, F.H.1
Barrett, B.E.2
-
8
-
-
35448998999
-
-
Penguin Books, New York
-
BATTELLE, J. 2005. The Search. Penguin Books, New York.
-
(2005)
The Search
-
-
Battelle, J.1
-
9
-
-
0003410292
-
-
Prentice Hall, Englewood Cliffs, NJ
-
BOX, G.E. P., JENKINS, G. M., AND REINSEL, G. C. 1994. Time Series Analysis: Forecasting and Control, Prentice Hall, Englewood Cliffs, NJ.
-
(1994)
Time Series Analysis: Forecasting and Control
-
-
Box, G.E.P.1
Jenkins, G.M.2
Reinsel, G.C.3
-
10
-
-
21144464269
-
Uncertainty orientation and protection motivation theory: The role of individual differences in health compliance
-
BROUWERS, M. C. AND SORRENTINO, R. M. 1993. Uncertainty orientation and protection motivation theory: The role of individual differences in health compliance. J. Person. Social Psych. 65, 1, 102-112.
-
(1993)
J. Person. Social Psych.
, vol.65
, Issue.1
, pp. 102-112
-
-
Brouwers, M.C.1
Sorrentino, R.M.2
-
11
-
-
36749092418
-
Using daily stock returns the case of event studies
-
BROWN, S. J. ANDWARNER, J. B. 1985. Using daily stock returns the case of event studies. J. Finan. Econ. 14, 3-31.
-
(1985)
J. Finan. Econ.
, vol.14
, pp. 3-31
-
-
Brown, S.J.1
Warner, J.B.2
-
12
-
-
33847760264
-
Cognitive stopping rules for terminating information search in online tasks
-
BROWNE, G. J., PITTS, M. G., AND WETHERBE, J. C. 2007. Cognitive stopping rules for terminating information search in online tasks. MIS Quart. 31, 1, 89-104. (Pubitemid 46382519)
-
(2007)
MIS Quarterly: Management Information Systems
, vol.31
, Issue.1
, pp. 89-104
-
-
Browne, G.J.1
Pitts, M.G.2
Wetherbe, J.C.3
-
13
-
-
84890656542
-
-
Princeton University Press, Princeton, NJ
-
CAMPBELL, J. Y., LO, A. W., AND MACKINLAY, A. C. 1996. The Econometrics of Financial Markets, Princeton University Press, Princeton, NJ.
-
(1996)
The Econometrics of Financial Markets
-
-
Campbell, J.Y.1
Lo, A.W.2
Mackinlay, A.C.3
-
14
-
-
33947376004
-
Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge
-
DOI 10.1109/TSE.2007.26
-
CAVUSOGLU, H., CAVUSOGLU, H., AND RAGHUNATHAN, S. 2007. Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge. IEEE Trans. Softw. Engin. 33, 3, 171-185. (Pubitemid 46443998)
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.3
, pp. 171-185
-
-
Cavusoglu, H.1
Cavusoglu, H.2
Raghunathan, S.3
-
16
-
-
33947710830
-
What are people searching on government web sites?
-
DOI 10.1145/1232743.1232753
-
CHAU, M.,FANG, X., AND SHENG, O.R.L. 2007. What are people searching on government web sites? Comm. ACM 50, 4, 87-92 (Pubitemid 46494533)
-
(2007)
Communications of the ACM
, vol.50
, Issue.4
, pp. 87-92
-
-
Chau, M.1
Fang, X.2
Liu Sheng, O.R.3
-
17
-
-
33645225914
-
From cues to action: Information seeking and exercise self-care among older adults managing chronic illness
-
CHOU, P. H. B. AND WISTER, A. V. 2005. From cues to action: Information seeking and exercise self-care among older adults managing chronic illness. Canad. J. Aging 24, 4, 395-408.
-
(2005)
Canad. J. Aging
, vol.24
, Issue.4
, pp. 395-408
-
-
Chou, P.H.B.1
Wister, A.V.2
-
18
-
-
29144482775
-
Cancer Internet search activity on a major search engine, United States 2001-2003
-
COOPER, C. P.,MALLON, K. P., LEADBETTER, S., POLLACK, L. A., AND PEIPINS, L. A. 2005. Cancer Internet search activity on a major search engine, United States 2001-2003. J. Med. Internet Res. 7, 3, e6.
-
(2005)
J. Med. Internet Res.
, vol.7
, Issue.3
-
-
Cooper, C.P.1
Mallon, K.P.2
Leadbetter, S.3
Pollack, L.A.4
Peipins, L.A.5
-
20
-
-
85036258669
-
Distribution of the estimators for autoregressive time series with a unit root
-
DICKEY, D. AND FULLER, W. 1979. Distribution of the estimators for autoregressive time series with a unit root. J. Amer. Statist. Assoc. 74, 427-431.
-
(1979)
J. Amer. Statist. Assoc.
, vol.74
, pp. 427-431
-
-
Dickey, D.1
Fuller, W.2
-
21
-
-
0000472488
-
Likelihood ratio tests for autoregressive time series with a unit root
-
DICKEY, D. AND FULLER, W. 1981. Likelihood ratio tests for autoregressive time series with a unit root. Econometr. 49, 4, 1057-1072.
-
(1981)
Econometr.
, vol.49
, Issue.4
, pp. 1057-1072
-
-
Dickey, D.1
Fuller, W.2
-
22
-
-
0033339151
-
Computer crime and abuse: A survey of public attitudes and awareness
-
DOWLAND, P. S., FURNELLL, S. M., ILLINGWORTH, H. M., AND REYNOLDS, P. L. 1999. Computer crime and abuse: A survey of public attitudes and awareness. Comput. Secur. 18, 8, 715-729.
-
(1999)
Comput. Secur.
, vol.18
, Issue.8
, pp. 715-729
-
-
Dowland, P.S.1
Furnelll, S.M.2
Illingworth, H.M.3
Reynolds, P.L.4
-
23
-
-
0001331172
-
Knowledge and the ordered protection motivation model: Tools for preventing AIDS
-
EPPRIGHT, D. R., JOHN F. TANNER, J., AND HUNT, J. B. 1994. Knowledge and the ordered protection motivation model: Tools for preventing AIDS. J. Bus. Res. 30, 1, 13-24.
-
(1994)
J. Bus. Res.
, vol.30
, Issue.1
, pp. 13-24
-
-
Eppright, D.R.1
John, F.2
Tanner, J.3
Hunt, J.B.4
-
24
-
-
33745211430
-
Using web-based search data to predict macroeconomic statistics
-
DOI 10.1145/1096000.1096010
-
ETTREDGE, M., GERDES, J., AND KARUGA, G. 2005. Using web-based search data to predict macroeconomic statistics. Comm. ACM 48, 11, 87-92 (Pubitemid 43906448)
-
(2005)
Communications of the ACM
, vol.48
, Issue.11
, pp. 87-92
-
-
Ettredge, M.1
Gerdes, J.2
Karuga, G.3
-
25
-
-
0034397237
-
A meta-analysis of research on protection motivation theory
-
FLOYD, D. L., PRENTICE-DUNN, S., AND ROGERS, R. W. 2000. A meta-analysis of research on protection motivation theory. J. Appl. Soc. Psych. 30, 2, 407-429.
-
(2000)
J. Appl. Soc. Psych.
, vol.30
, Issue.2
, pp. 407-429
-
-
Floyd, D.L.1
Prentice-Dunn, S.2
Rogers, R.W.3
-
26
-
-
32444433117
-
The challenges of understanding and using security: A survey of end-users
-
DOI 10.1016/j.cose.2005.12.004, PII S0167404805002038
-
FURNELL, S. M., JUSOH, A., AND KATSABAS, D. 2006. The challenges of understanding and using security: A survey of end-users. Comput. Secur. 25, 1, 27-35. (Pubitemid 43227229)
-
(2006)
Computers and Security
, vol.25
, Issue.1
, pp. 27-35
-
-
Furnell, S.M.1
Jusoh, A.2
Katsabas, D.3
-
27
-
-
60549098239
-
Detecting influenza epidemics using search engine query data
-
GINSBERG, J., MOHEBBI, M. H., PATEL, R.S., BRAMMER, L., SMOLINSKI, M.S., AND BRILLIANT, L. 2008. Detecting influenza epidemics using search engine query data. Nature 457, 19, 1012-1014.
-
(2008)
Nature
, vol.457
, Issue.19
, pp. 1012-1014
-
-
Ginsberg, J.1
Mohebbi, M.H.2
Patel, R.S.3
Brammer, L.4
Smolinski, M.S.5
Brilliant, L.6
-
28
-
-
0033043069
-
Proposed model of the relationship of risk information seeking and processing to the development of preventive behaviors
-
DOI 10.1006/enrs.1998.3940
-
GRIFFIN, R. J., DUNWOODY, S., AND NEUWIRTH, K. 1999. Proposed model of the relationship of risk information seeking and processing to the development of preventive behaviors. Environ. Res. 80, 2, S230-S245. (Pubitemid 29143250)
-
(1999)
Environmental Research
, vol.80
, Issue.2
-
-
Griffin, R.J.1
Dunwoody, S.2
Neuwirth, K.3
-
29
-
-
67349144062
-
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
-
HERATH, T. AND RAO, H. R. 2009a. Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decis. Support Syst. 47, 2, 154-165.
-
(2009)
Decis. Support Syst.
, vol.47
, Issue.2
, pp. 154-165
-
-
Herath, T.1
Rao, H.R.2
-
30
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
HERATH, T. AND RAO,H. R. 2009b. Protection motivation and deterrence: A framework for security policy compliance in organisations. Euro. J. Inf. Syst. 18, 2, 106-125.
-
(2009)
Euro. J. Inf. Syst.
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
31
-
-
1242287724
-
A framework for classifying denial of service attacks
-
HUSSAIN, A., HEIDEMANN, J., AND PAPADOPOULOS, C. 2003. A framework for classifying denial of service attacks. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. 99-110.
-
(2003)
Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications.
, pp. 99-110
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
32
-
-
34248599033
-
The comparative effectiveness of sponsored and nonsponsored links for web E-commerce queries
-
JANSEN, B. J. 2007. The comparative effectiveness of sponsored and nonsponsored links for web E-commerce queries. ACM Trans. Web 1, 1, 3-es.
-
(2007)
ACM Trans. Web
, vol.1
, Issue.1
-
-
Jansen, B.J.1
-
33
-
-
84860590808
-
Counterstrike
-
J.M. Balkin, K. Eddan, J. Grimmelmann, N. Kozlovski, S. Wagman and T. Zarsky, Eds. NYU Press, New York
-
KARNOW, C. E. A. 2007. Counterstrike. In Cybercrime: Digital Cops in A Networked Environment, J.M. Balkin, K. Eddan, J. Grimmelmann, N. Kozlovski, S. Wagman and T. Zarsky, Eds. NYU Press, New York.
-
(2007)
Cybercrime: Digital Cops in A Networked Environment
-
-
Karnow, C.E.A.1
-
35
-
-
56049103535
-
Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software firewalls
-
KUMAR, N., MOHAN, K., AND HOLOWCZAK, R. 2008. Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software firewalls. Decis. Support Syst. 46, 1, 254-264.
-
(2008)
Decis. Support Syst.
, vol.46
, Issue.1
, pp. 254-264
-
-
Kumar, N.1
Mohan, K.2
Holowczak, R.3
-
36
-
-
35548965096
-
An examination of private intermediaries' roles in software vulnerabilities disclosure
-
DOI 10.1007/s10796-007-9047-2
-
LI, P. AND RAO, H. R. 2007. An examination of private intermediaries' roles in software vulnerabilities disclosure. Inf. Syst. Frontiers 9, 5, 531-539. (Pubitemid 350007347)
-
(2007)
Information Systems Frontiers
, vol.9
, Issue.5
, pp. 531-539
-
-
Li, P.1
Rao, H.R.2
-
37
-
-
60649084770
-
Avoidance of information technology threats: A theoretical perspective
-
LIANG, H., AND XUE, Y. 2009. Avoidance of information technology threats: A theoretical perspective. MIS Quart. 33, 1, 71-90.
-
(2009)
MIS Quart.
, vol.33
, Issue.1
, pp. 71-90
-
-
Liang, H.1
Xue, Y.2
-
38
-
-
0036804085
-
Network intrusion and fault detection: A statistical anomaly approach
-
DOI 10.1109/MCOM.2002.1039860
-
MANIKOPOULOS, C. AND PAPAVASSILIOU, S. 2002. Network intrusion and fault detection: A statistical anomaly approach. IEEE Comm. Mag. 40, 10, 76-82. (Pubitemid 35311949)
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 76-82
-
-
Manikopoulos, C.1
Papavassiliou, S.2
-
39
-
-
78650423222
-
Empirical estimates and observations of 0day vulnerabilities
-
MCQUEEN, M. A.,MCQUEEN, T. A., BOYER, W. F., AND CHAFFIN, M. R. 2009. Empirical estimates and observations of 0day vulnerabilities. In Proceedings of the 42nd Hawaii International Conference on System Sciences.
-
(2009)
Proceedings of the 42nd Hawaii International Conference on System Sciences
-
-
Mcqueen, M.A.1
Mcqueen, T.A.2
Boyer, W.F.3
Chaffin, M.R.4
-
40
-
-
0031510754
-
Event studies in management research: Theoretical and empirical issues
-
MCWILLIAMS, A. AND SIEGEL, D. 1997. Event studies in management research: Theoretical and empirical issues Acad. Manag. J. 40, 3, 626-657.
-
(1997)
Acad. Manag. J.
, vol.40
, Issue.3
, pp. 626-657
-
-
Mcwilliams, A.1
Siegel, D.2
-
44
-
-
0033653826
-
Protection motivation and risk communication
-
NEUWIRTH, K., DUNWOODY, S., AND GRIFFIN, R. J. 2000. Protection motivation and risk communication. Risk Anal. 20, 5, 721-734.
-
(2000)
Risk Anal.
, vol.20
, Issue.5
, pp. 721-734
-
-
Neuwirth, K.1
Dunwoody, S.2
Griffin, R.J.3
-
45
-
-
61349092288
-
Studying users' computer security behavior: A health belief perspective
-
NG, B.-Y., KANKANHALLI, A., AND XU, Y. C. 2009. Studying users' computer security behavior: A health belief perspective. Decis. Support Syst. 46, 4, 815-825.
-
(2009)
Decis. Support Syst.
, vol.46
, Issue.4
, pp. 815-825
-
-
Ng, B.-Y.1
Kankanhalli, A.2
Xu, Y.C.3
-
48
-
-
63349088117
-
The deterrent and displacement effects of information security enforcement: International evidence
-
PNG, I., WANG, C., AND WANG, Q. 2008. The deterrent and displacement effects of information security enforcement: International evidence. J. Manag. Inf. Syst. 25, 2, 125-144.
-
(2008)
J. Manag. Inf. Syst.
, vol.25
, Issue.2
, pp. 125-144
-
-
Png, I.1
Wang, C.2
Wang, Q.3
-
51
-
-
55149100303
-
Learning about the world through long-term query logs
-
Article 21
-
RICHARDSON,M. 2008a. Learning about the world through long-term query logs. ACMTrans.Web 2, 4, Article 21.
-
(2008)
ACM Trans. Web
, vol.2
, pp. 4
-
-
Richardson, M.1
-
53
-
-
0023304222
-
Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat
-
RIPPETOE, P. A., AND ROGERS, R.W. 1987. Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat. J. Person. Social Psych. 52, 3, 596-604.
-
(1987)
J. Person. Social Psych.
, vol.52
, Issue.3
, pp. 596-604
-
-
Rippetoe, P.A.1
Rogers, R.W.2
-
54
-
-
0031418329
-
The dynamics of risk perception: How does perceived risk respond to risk events?
-
DOI 10.1111/j.1539-6924.1997.tb01280.x
-
ROGERS, G. O. 1997. The dynamics of risk perception: How does perceived risk respond to risk events? Risk Anal. 17, 6, 745-757. (Pubitemid 28123857)
-
(1997)
Risk Analysis
, vol.17
, Issue.6
, pp. 745-757
-
-
Rogers, G.O.1
-
55
-
-
0001840352
-
A protectionmotivation theory of fear appeals and attitude change
-
ROGERS, R.W. 1975. A protectionmotivation theory of fear appeals and attitude change. J. Psych. 91, 1, 93-114.
-
(1975)
J. Psych.
, vol.91
, Issue.1
, pp. 93-114
-
-
Rogers, R.W.1
-
57
-
-
33645285028
-
Applying a health behavior theory to explore the influence of information and experience on arsenic risk representations, policy beliefs, and protective behavior
-
SEVERTSON, D. J., BAUMANN, L. C., AND BROWN, R.L. 2006. Applying a health behavior theory to explore the influence of information and experience on arsenic risk representations, policy beliefs, and protective behavior. Risk Anal. 26, 2, 353-368.
-
(2006)
Risk Anal.
, vol.26
, Issue.2
, pp. 353-368
-
-
Severtson, D.J.1
Baumann, L.C.2
Brown, R.L.3
-
58
-
-
0346336099
-
Do risk information programs promote mitigating behavior?
-
SMITH, V. K., DESVOUSGES, W. H., AND PAYNE, J. W. 1995. Do risk information programs promote mitigating behavior? J. Risk Uncert. 10, 3, 203-221.
-
(1995)
J. Risk Uncert.
, vol.10
, Issue.3
, pp. 203-221
-
-
Smith, V.K.1
Desvousges, W.H.2
Payne, J.W.3
-
59
-
-
0000495988
-
An empirical test of a model of external search for automobiles
-
SRINIVASAN, N. AND RATCHFORD, B. T. 1991. An empirical test of a model of external search for automobiles. J. Consum. Res. 18, 233-242.
-
(1991)
J. Consum. Res.
, vol.18
, pp. 233-242
-
-
Srinivasan, N.1
Ratchford, B.T.2
-
61
-
-
70349374682
-
A web search model for strategic decision making
-
VENKATSUBRAMANYAN, S. AND KWAN, S. K. 2008. A web search model for strategic decision making. AIMS Int. J. Manag. 2, 3, 197-214.
-
(2008)
AIMS Int. J. Manag.
, vol.2
, Issue.3
, pp. 197-214
-
-
Venkatsubramanyan, S.1
Kwan, S.K.2
-
63
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
WORKMAN, M., BOMMER, W. H., AND STRAUB, D. 2008. Security lapses and the omission of information security measures: A threat control model and empirical test. Comput. Hum. Behav. 24, 6, 2799-2816.
-
(2008)
Comput. Hum. Behav.
, vol.24
, Issue.6
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.H.2
Straub, D.3
-
64
-
-
30444435956
-
Help seeking behavior and the Internet: A national survey
-
DOI 10.1016/j.ijmedinf.2005.07.029, PII S1386505605001474, Health and the Internet for All
-
YBARRA, M. L. AND SUMANB, M. 2006. Help seeking behavior and the Internet: A national survey. Int. J. Med. Inf. 75, 1, 29-41. (Pubitemid 43075560)
-
(2006)
International Journal of Medical Informatics
, vol.75
, Issue.1
, pp. 29-41
-
-
Ybarra, M.L.1
Suman, M.2
|