-
2
-
-
77957077814
-
Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions
-
C.L. Anderson, and R. Agarwal Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions MIS Quarterly 34 3 2010 613-A615
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
-
-
Anderson, C.L.1
Agarwal, R.2
-
4
-
-
33845275228
-
Who are the victims of identity theft? the effect of demographics
-
K.B. Anderson Who are the victims of identity theft? The effect of demographics Journal of Public Policy & Marketing 25 2 2006 160 171
-
(2006)
Journal of Public Policy & Marketing
, vol.25
, Issue.2
, pp. 160-171
-
-
Anderson, K.B.1
-
5
-
-
84870957747
-
Validating formative partial least squares (PLS) models: Methodological review and empirical illustration
-
P. Andreev, T. Hearty, H. Maozz, and N. Pliskin Validating formative partial least squares (PLS) models: methodological review and empirical illustration ICIS 2009 Proceedings 2009
-
(2009)
ICIS 2009 Proceedings
-
-
Andreev, P.1
Hearty, T.2
Maozz, H.3
Pliskin, N.4
-
6
-
-
24944504048
-
Online privacy policies: An empirical perspective on self-regulatory practices
-
N. Ashrafi, and J. Juilboer Online privacy policies: an empirical perspective on self-regulatory practices Journal of Electronic Commerce in Organizations 3 4 2006 61 74
-
(2006)
Journal of Electronic Commerce in Organizations
, vol.3
, Issue.4
, pp. 61-74
-
-
Ashrafi, N.1
Juilboer, J.2
-
8
-
-
84962052143
-
Identity theft, social security numbers, and the web
-
H. Berghel Identity theft, social security numbers, and the web Communications of the ACM 43 2 2000 17 21
-
(2000)
Communications of the ACM
, vol.43
, Issue.2
, pp. 17-21
-
-
Berghel, H.1
-
9
-
-
33745186426
-
Phishing mongers and posers
-
H. Berghel Phishing mongers and posers Communications of the ACM 49 4 2006 21 25
-
(2006)
Communications of the ACM
, vol.49
, Issue.4
, pp. 21-25
-
-
Berghel, H.1
-
11
-
-
84988266348
-
What drives the adoption of antiphishing measures by Hong Kong banks?
-
I. Bose, and A.C.M. Leung What drives the adoption of antiphishing measures by Hong Kong banks? Communications of the ACM 52 8 2009 141 143
-
(2009)
Communications of the ACM
, vol.52
, Issue.8
, pp. 141-143
-
-
Bose, I.1
Leung, A.C.M.2
-
12
-
-
33745804732
-
Privacy rights on the internet: Self-regulation or Government regulation?
-
N.E. Bowie, and K. Jamal Privacy rights on the Internet: self-regulation or government regulation? Business Ethics Quarterly 16 3 2006 323 342 (Pubitemid 44020437)
-
(2006)
Business Ethics Quarterly
, vol.16
, Issue.3
, pp. 323-342
-
-
Bowie, N.E.1
Jamal, K.2
-
13
-
-
61349159889
-
Perceptions of information security in the workplace: Linking information security climate to compliant behavior
-
M. Chan, I. Woon, and A. Kankanhalli Perceptions of information security in the workplace: linking information security climate to compliant behavior Journal of Information Privacy and Security 1 3 2005 18 41
-
(2005)
Journal of Information Privacy and Security
, vol.1
, Issue.3
, pp. 18-41
-
-
Chan, M.1
Woon, I.2
Kankanhalli, A.3
-
14
-
-
0002042337
-
Issues and opinion on structural equation modeling
-
W.W. Chin Issues and opinion on structural equation modeling MIS Quarterly 22 1 1998 7 16
-
(1998)
MIS Quarterly
, vol.22
, Issue.1
, pp. 7-16
-
-
Chin, W.W.1
-
15
-
-
79952922395
-
How to write up and report PLS analyses
-
V.E. Vinzi, W.W. Chin, J. Henseler, H. Wang, Springer Berlin, Germany
-
W.W. Chin How to write up and report PLS analyses V.E. Vinzi, W.W. Chin, J. Henseler, H. Wang, Handbook of Partial Least Squares: Concepts, Methods and Applications 2010 Springer Berlin, Germany
-
(2010)
Handbook of Partial Least Squares: Concepts, Methods and Applications
-
-
Chin, W.W.1
-
16
-
-
33847309878
-
E-commerce and information privacy: Privacy policies as personal information protectors
-
C.A. Ciocchetti E-commerce and information privacy: privacy policies as personal information protectors American Business Law Journal 44 1 2007 55 126
-
(2007)
American Business Law Journal
, vol.44
, Issue.1
, pp. 55-126
-
-
Ciocchetti, C.A.1
-
17
-
-
82255167870
-
What you need to know about identity theft
-
L. Cohn What you need to know about identity theft Kiplinger's Personal Finance 63 7 2009 79
-
(2009)
Kiplinger's Personal Finance
, vol.63
, Issue.7
, pp. 79
-
-
Cohn, L.1
-
18
-
-
55249087535
-
Perceived usefulness, perceived ease of use and user acceptance of information technology
-
F.D. Davis Perceived usefulness, perceived ease of use and user acceptance of information technology MIS Quarterly 13 3 1989 319 340
-
(1989)
MIS Quarterly
, vol.13
, Issue.3
, pp. 319-340
-
-
Davis, F.D.1
-
19
-
-
82255170184
-
-
Accessed on 04/26/2011 at
-
Department of Justice Identity theft and identity fraud Accessed on 04/26/2011 at http://www.justice.gov/criminal/fraud/websites/idtheft.html 2011
-
(2011)
Identity Theft and Identity Fraud
-
-
Of Justice, D.1
-
21
-
-
23044525969
-
Current directions in is security research: Towards socio-organizational perspectives
-
G. Dhillon, and J. Backhouse Current directions in is security research: towards socio-organizational perspectives Information Systems Journal 11 2 2001 127
-
(2001)
Information Systems Journal
, vol.11
, Issue.2
, pp. 127
-
-
Dhillon, G.1
Backhouse, J.2
-
22
-
-
33845439549
-
Formative versus reflective indicators in organizational measure development: A comparison and empirical illustration
-
DOI 10.1111/j.1467-8551.2006.00500.x
-
A. Diamantopoulos, and J.A. Siguaw Formative versus reflective indicators in organizational measure development: a comparison and empirical illustration British Journal of Management 17 4 2006 263 282 (Pubitemid 44893384)
-
(2006)
British Journal of Management
, vol.17
, Issue.4
, pp. 263-282
-
-
Diamantopoulos, A.1
Siguaw, J.A.2
-
23
-
-
33749551929
-
Why spoofing is serious internet fraud
-
T. Dinev Why spoofing is serious in Internet fraud Communications of the ACM 49 10 2006 77 82 (Pubitemid 44536639)
-
(2006)
Communications of the ACM
, vol.49
, Issue.10
, pp. 77-82
-
-
Dinev, T.1
-
24
-
-
67650318762
-
User behaviour towards protective information technologies: The role of national cultural differences
-
T. Dinev, J. Goo, Q. Hu, and K. Nam User behaviour towards protective information technologies: the role of national cultural differences Information Systems Journal 19 4 2009 391 412
-
(2009)
Information Systems Journal
, vol.19
, Issue.4
, pp. 391-412
-
-
Dinev, T.1
Goo, J.2
Hu, Q.3
Nam, K.4
-
25
-
-
49049114397
-
The centrality of awareness in the formation of user behavioral intention toward protective information technologies
-
T. Dinev, and Q. Hu The centrality of awareness in the formation of user behavioral intention toward protective information technologies Journal of the Association for Information Systems 8 7 2007 386 408
-
(2007)
Journal of the Association for Information Systems
, vol.8
, Issue.7
, pp. 386-408
-
-
Dinev, T.1
Hu, Q.2
-
26
-
-
50349086151
-
Identity theft: An exploratory study with implications for marketers
-
E.M. Eisenstein Identity theft: an exploratory study with implications for marketers Journal of Business Research 61 11 2008 1160 1172
-
(2008)
Journal of Business Research
, vol.61
, Issue.11
, pp. 1160-1172
-
-
Eisenstein, E.M.1
-
27
-
-
33746237883
-
Technology-based new product development partnerships
-
DOI 10.1111/j.1540-5915.2006.00119.x
-
J.E. Ettlie, and P.A. Pavlou Technology-based new product development partnerships Decision Sciences 37 2 2006 117 147 (Pubitemid 44099934)
-
(2006)
Decision Sciences
, vol.37
, Issue.2
, pp. 117-147
-
-
Ettlie, J.E.1
Pavlou, P.A.2
-
28
-
-
80053388839
-
-
Federal Bureau of Investigation Accessed on 04/26/2011 at
-
Federal Bureau of Investigation Web 'spoofing' scams are a growing problem Accessed on 04/26/2011 at http://www.fbi.gov/news/pressrel/press- releases/fbi-says-web-spoofing-scams-are-a-growing-problem 2003
-
(2003)
Web 'Spoofing' Scams Are A Growing Problem
-
-
-
29
-
-
82255167872
-
-
Federal Bureau of Investigation Accessed on 04/26/2011 at
-
Federal Bureau of Investigation How to protect your good name from identity theft Accessed on 04/26/2011 at http://www.fbi.gov/news/stories/2004/ october/preventidt-102104 2004
-
(2004)
How to Protect Your Good Name from Identity Theft
-
-
-
30
-
-
82255171342
-
-
Federal Trade Commission Accessed on 04/26/2011 at
-
Federal Trade Commission Take charge: fighting back against identity theft Accessed on 04/26/2011 at http://www.ftc.gov/bcp/edu/pubs/consumer/ idtheft/idt04.pdf 2006
-
(2006)
Take Charge: Fighting Back Against Identity Theft
-
-
-
35
-
-
0000009769
-
Evaluating structural equation models with unobservable variables and measurement error
-
C. Fornell, and D.F. Larcker Evaluating structural equation models with unobservable variables and measurement error Journal of Marketing Research 18 1 1981 39 50
-
(1981)
Journal of Marketing Research
, vol.18
, Issue.1
, pp. 39-50
-
-
Fornell, C.1
Larcker, D.F.2
-
36
-
-
29444460597
-
A practical guide to factorial validity using PLS-graph: Tutorial and annotated example
-
D. Gefen, and D. Straub A practical guide to factorial validity using PLS-graph: tutorial and annotated example Communications of AIS 16 2005 91 109
-
(2005)
Communications of AIS
, vol.16
, pp. 91-109
-
-
Gefen, D.1
Straub, D.2
-
37
-
-
79960536814
-
Evaluation of structural equation models using the partial least squares (PLS) approach
-
V.E. Vinzi, W.W. Chin, J. Henseler, H. Wang, Springer Berlin, Gernmany
-
O. Götz, K. Liehr-Gobbers, and M. Krafft Evaluation of structural equation models using the partial least squares (PLS) approach V.E. Vinzi, W.W. Chin, J. Henseler, H. Wang, Handbook of Partial Least Squares: Concepts, Methods and Applications 2010 Springer Berlin, Gernmany
-
(2010)
Handbook of Partial Least Squares: Concepts, Methods and Applications
-
-
Götz, O.1
Liehr-Gobbers, K.2
Krafft, M.3
-
38
-
-
70349151365
-
Consumer motivations in taking action against spyware: An empirical investigation
-
A. Gurung, X. Luo, and Q. Liao Consumer motivations in taking action against spyware: an empirical investigation Information Management & Computer Security 17 3 2009 276 289
-
(2009)
Information Management & Computer Security
, vol.17
, Issue.3
, pp. 276-289
-
-
Gurung, A.1
Luo, X.2
Liao, Q.3
-
39
-
-
0040236696
-
Communicating innovations: Convincing computer phobics to adopt innovative technologies
-
T. Hill, N.D. Smith, and M.F. Mann Communicating innovations: convincing computer phobics to adopt innovative technologies Advances in Consumer Research 13 1 1986 419 422
-
(1986)
Advances in Consumer Research
, vol.13
, Issue.1
, pp. 419-422
-
-
Hill, T.1
Smith, N.D.2
Mann, M.F.3
-
40
-
-
23344444212
-
Is spyware an internet nuisance or public menance?
-
DOI 10.1145/1076211.1076241
-
Q. Hu, and T. Dinev Is spyware an Internet nuisance or public menace? Communications of the ACM 48 8 2005 61 66 (Pubitemid 41101416)
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 61-66
-
-
Qing, H.U.1
Dinev, T.2
-
41
-
-
42449100748
-
Lack of trust hampering online direct marketing
-
G. Hulme Lack of trust hampering online direct marketing B to B 90 12 2005 4 45
-
(2005)
B to B
, vol.90
, Issue.12
, pp. 4-45
-
-
Hulme, G.1
-
42
-
-
82255167868
-
ID fraud at a record high
-
Institute of Credit Management
-
Institute of Credit Management ID fraud at a record high Credit Management Dec., 2006 8
-
(2006)
Credit Management
, pp. 8
-
-
-
43
-
-
0242424963
-
A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research
-
DOI 10.1086/376806
-
C.B. Jarvis, S.B. Mackenzie, P.M. Podsakoff, D.G. Mick, and W.O. Bearden A critical review of construct indicators and measurement model misspecification in marketing and consumer research Journal of Consumer Research 30 2 2003 199 218 (Pubitemid 37374305)
-
(2003)
Journal of Consumer Research
, vol.30
, Issue.2
, pp. 199-218
-
-
Jarvis, C.B.1
Mackenzie, S.B.2
Podsakoff, P.M.3
Giliatt, N.4
Mee, J.F.5
-
44
-
-
77957057727
-
Fear appeals and information security behaviors: An empirical study
-
A.C. Johnston, and M. Warkentin Fear appeals and information security behaviors: an empirical study MIS Quarterly 34 3 2010 549-A544
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
-
-
Johnston, A.C.1
Warkentin, M.2
-
45
-
-
57649195371
-
Culture and identity-protective cognition: Explaining the white-male effect in risk perception
-
D.M. Kahan, D. Braman, J. Gastil, P. Slovic, and C.K. Mertz Culture and identity-protective cognition: explaining the white-male effect in risk perception Journal of Empirical Legal Studies 4 3 2007 465 505
-
(2007)
Journal of Empirical Legal Studies
, vol.4
, Issue.3
, pp. 465-505
-
-
Kahan, D.M.1
Braman, D.2
Gastil, J.3
Slovic, P.4
Mertz, C.K.5
-
46
-
-
44249099036
-
Credit and identity theft
-
C. Kahn Credit and identity theft Journal of Monetary Economics 55 2 2008 251 264
-
(2008)
Journal of Monetary Economics
, vol.55
, Issue.2
, pp. 251-264
-
-
Kahn, C.1
-
48
-
-
33745183962
-
Usable privacy and security for personal information management
-
C. Karat, C. Brodie, and J. Karat Usable privacy and security for personal information management Communications of the ACM 49 1 2006 56 57
-
(2006)
Communications of the ACM
, vol.49
, Issue.1
, pp. 56-57
-
-
Karat, C.1
Brodie, C.2
Karat, J.3
-
49
-
-
0348042908
-
The development of initial trust in an online company by new customers
-
M. Koufaris, and W. Hampton-Sosa The development of initial trust in an online company by new customers Information Management 41 3 2004 377 397
-
(2004)
Information Management
, vol.41
, Issue.3
, pp. 377-397
-
-
Koufaris, M.1
Hampton-Sosa, W.2
-
51
-
-
24144487101
-
Consumers' attitudes towards online and mobile banking in China
-
DOI 10.1108/02652320510629250
-
S. Laforet, and X. Li Consumers' attitudes towards online and mobile banking in China International Journal of Bank Marketing 23 5 2005 362 380 (Pubitemid 41240294)
-
(2005)
International Journal of Bank Marketing
, vol.23
, Issue.5
, pp. 362-380
-
-
Laforet, S.1
Li, X.2
-
52
-
-
40549099995
-
Promoting personal responsibility for internet safety
-
DOI 10.1145/1325555.1325569
-
R. LaRose, N.J. Rifon, and R. Enbody Promoting personal responsibility for internet safety Communications of the ACM 51 3 2008 71 76 (Pubitemid 351357118)
-
(2008)
Communications of the ACM
, vol.51
, Issue.3
, pp. 71-76
-
-
LaRose, R.1
Rifon, N.J.2
Enbody, R.3
-
53
-
-
18844363978
-
The relationship between consumer innovativeness, personal characteristics, and online banking adoption
-
DOI 10.1108/02652320510584403
-
W.M. Lassar, C. Manolis, and S.S. Lassar The relationship between consumer innovativeness, personal characteristics, and online banking adoption International Journal of Bank Marketing 23 2 2005 176 199 (Pubitemid 40687416)
-
(2005)
International Journal of Bank Marketing
, vol.23
, Issue.2
, pp. 176-199
-
-
Lassar, W.M.1
Manolis, C.2
Lassar, S.S.3
-
55
-
-
0027157559
-
Coping theory and research: Past, present, and future
-
R.S. Lazarus Coping theory and research: past present, and future Psychosomatic Medicine 55 3 1993 234 247 (Pubitemid 23155671)
-
(1993)
Psychosomatic Medicine
, vol.55
, Issue.3
, pp. 234-247
-
-
Lazarus, R.S.1
-
56
-
-
51749090174
-
Keeping our network safe: A model of online protection behaviour
-
D. Lee, R. Larose, and N. Rifon Keeping our network safe: a model of online protection behaviour Behaviour & Information Technology 27 5 2008 445 454
-
(2008)
Behaviour & Information Technology
, vol.27
, Issue.5
, pp. 445-454
-
-
Lee, D.1
Larose, R.2
Rifon, N.3
-
57
-
-
78650169218
-
Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective
-
Y. Lee Understanding anti-plagiarism software adoption: an extended protection motivation theory perspective Decision Support Systems 50 2 2011 361 369
-
(2011)
Decision Support Systems
, vol.50
, Issue.2
, pp. 361-369
-
-
Lee, Y.1
-
59
-
-
75349090403
-
Understanding compliance with internet use policy from the perspective of rational choice theory
-
H. Li, J. Zhang, and R. Sarathy Understanding compliance with internet use policy from the perspective of rational choice theory Decision Support Systems 48 4 2010 635 645
-
(2010)
Decision Support Systems
, vol.48
, Issue.4
, pp. 635-645
-
-
Li, H.1
Zhang, J.2
Sarathy, R.3
-
60
-
-
60649084770
-
Avoidance of information technology threats: A theoretical perspective
-
H. Liang, and Y. Xue Avoidance of information technology threats: a theoretical perspective MIS Quarterly 33 1 2009 71 90
-
(2009)
MIS Quarterly
, vol.33
, Issue.1
, pp. 71-90
-
-
Liang, H.1
Xue, Y.2
-
61
-
-
58349086406
-
Identity theft in cyberspace: Crime control methods and their effectiveness in combating phishing attacks
-
J. Lynch Identity theft in cyberspace: crime control methods and their effectiveness in combating phishing attacks Berkeley Technology Law Journal 20 1 2005 259 300
-
(2005)
Berkeley Technology Law Journal
, vol.20
, Issue.1
, pp. 259-300
-
-
Lynch, J.1
-
62
-
-
24944589695
-
The problem of measurement model misspecification in behavioral and organizational research and some recommended solutions
-
DOI 10.1037/0021-9010.90.4.710
-
S.B. MacKenzie, P.M. Podsakoff, and C.B. Jarvis The problem of measurement model misspecification in behavioral and organizational research and some recommended solutions Journal of Applied Psychology 90 4 2005 710 730 (Pubitemid 41304795)
-
(2005)
Journal of Applied Psychology
, vol.90
, Issue.4
, pp. 710-730
-
-
MacKenzie, S.B.1
Podsakoff, P.M.2
Jarvis, C.B.3
-
63
-
-
33745893541
-
Scoping identity theft
-
Two Decades of the Language-action Perspective
-
R. Mercuri Scoping identity theft Communications of the ACM 49 5 2006 17 21 (Pubitemid 44046397)
-
(2006)
Communications of the ACM
, vol.49
, Issue.5
, pp. 17-21
-
-
Mercuri, R.T.1
-
64
-
-
1542710582
-
The 411 on Mobile Privacy
-
G.R. Milne, and A.J. Rohm The 411 on mobile privacy Marketing Management 12 4 2003 40 45 (Pubitemid 38355359)
-
(2003)
Marketing Management
, vol.12
, Issue.4
, pp. 40-45
-
-
Milne, G.R.1
Rohm, A.J.2
-
65
-
-
10844290435
-
Consumers' protection of online privacy and identity
-
G.R. Milne, A.J. Rohm, and S. Bahl Consumers' protection of online privacy and identity Journal of Consumer Affairs 38 2 2004 217 232 (Pubitemid 39666076)
-
(2004)
Journal of Consumer Affairs
, vol.38
, Issue.2
, pp. 217-232
-
-
Milne, G.R.1
Rohm, A.J.2
Bahl, S.3
-
70
-
-
61349092288
-
Studying users' computer security behavior: A health belief perspective
-
B.-Y. Ng, A. Kankanhalli, and Y. Xu Studying users' computer security behavior: a health belief perspective Decision Support Systems 46 4 2009 815 825
-
(2009)
Decision Support Systems
, vol.46
, Issue.4
, pp. 815-825
-
-
Ng, B.-Y.1
Kankanhalli, A.2
Xu, Y.3
-
72
-
-
47649099066
-
-
Organisations for Economic Co-operation and Development Accessed on 04/26/2011 at
-
Organisations for Economic Co-operation and Development Scoping paper on online identity theft Accessed on 04/26/2011 at http://www.oecd.org/dataoecd/35/ 24/40644196.pdf 2008
-
(2008)
Scoping Paper on Online Identity Theft
-
-
-
73
-
-
33749347189
-
Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior
-
P.A. Pavlou, and M. Fygenson Understanding and prediction electronic commerce adoption: an extension of the theory of planned behavior MIS Quarterly 30 1 2006 115 143 (Pubitemid 44971427)
-
(2006)
MIS Quarterly: Management Information Systems
, vol.30
, Issue.1
, pp. 115-143
-
-
Pavlou, P.A.1
Fygenson, M.2
-
74
-
-
33847764616
-
Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective
-
P.A. Pavlou, H. Liang, and Y. Xue Understanding and mitigating uncertainty in online exchange relationships: a principal-agent perspective MIS Quarterly 31 1 2007 105 136
-
(2007)
MIS Quarterly
, vol.31
, Issue.1
, pp. 105-136
-
-
Pavlou, P.A.1
Liang, H.2
Xue, Y.3
-
76
-
-
23344452974
-
Spyware: A view from the (online) street
-
DOI 10.1145/1076211.1076247
-
R. Poston, T.F. Stafford, and A. Hennington Spyware: a view from the (online) street Communications of the ACM 48 8 2005 96 99 (Pubitemid 41101422)
-
(2005)
Communications of the ACM
, vol.48
, Issue.8
, pp. 96-99
-
-
Poston, R.1
Stafford, T.F.2
Hennington, A.3
-
77
-
-
82255170183
-
-
Privacy Rights Clearinghouse Accessed on 04/26/2011 at
-
Privacy Rights Clearinghouse Coping with identity theft: reducing the risk of fraud Accessed on 04/26/2011 at http://www.privacyrights.org/fs/fs17-it. htm 2011
-
(2011)
Coping with Identity Theft: Reducing the Risk of Fraud
-
-
-
78
-
-
63149147108
-
Identity-theft toolkit
-
V.M. Ramaswamy Identity-theft toolkit CPA Journal 76 10 2006 66 70
-
(2006)
CPA Journal
, vol.76
, Issue.10
, pp. 66-70
-
-
Ramaswamy, V.M.1
-
79
-
-
0001840352
-
A protection motivation theory of fear appeals and attitude change
-
R.W. Rogers A protection motivation theory of fear appeals and attitude change Journal of Psychology 91 1 1975 93 114
-
(1975)
Journal of Psychology
, vol.91
, Issue.1
, pp. 93-114
-
-
Rogers, R.W.1
-
80
-
-
0002247369
-
Cognitive and physiological process in fear appeals and attitude change: A revised theory of protection motivation
-
R. Petty, Guilford Press New York
-
R.W. Rogers Cognitive and physiological process in fear appeals and attitude change: a revised theory of protection motivation R. Petty, Social Psychophysiology: a Source Book 1983 Guilford Press New York
-
(1983)
Social Psychophysiology: A Source Book
-
-
Rogers, R.W.1
-
81
-
-
82255170180
-
The next generation in id theft: Protecting consumers from spiraling crime
-
T. Rusin The next generation in id theft: protecting consumers from spiraling crime ABA Banking Journal 98 11 2006 73
-
(2006)
ABA Banking Journal
, vol.98
, Issue.11
, pp. 73
-
-
Rusin, T.1
-
82
-
-
84891450372
-
Two in three Americans worry about identity theft
-
L. Saad Two in three Americans worry about identity theft Gallup Poll Briefing 10/16/2009 1
-
(2009)
Gallup Poll Briefing
, pp. 1
-
-
Saad, L.1
-
83
-
-
82255167861
-
Risks of identity theft: Can the market protect the payment system?
-
S. Schreft Risks of identity theft: can the market protect the payment system? Economic Review 92 4 2007 5 40
-
(2007)
Economic Review
, vol.92
, Issue.4
, pp. 5-40
-
-
Schreft, S.1
-
84
-
-
0347021055
-
Exploring the psychological and somatic impact of identity theft
-
T. Sharp, A. Shreve-Neiger, W. Fremouw, J. Kane, and S. Hutton Exploring the psychological and somatic impact of identity theft Journal of Forensic Science 49 1 2004 1 6
-
(2004)
Journal of Forensic Science
, vol.49
, Issue.1
, pp. 1-6
-
-
Sharp, T.1
Shreve-Neiger, A.2
Fremouw, W.3
Kane, J.4
Hutton, S.5
-
87
-
-
33846076044
-
The role of espoused national cultural values in technology acceptance
-
M. Srite, and E. Karahanna The role of espoused national cultural values in technology acceptance MIS Quarterly 30 3 2006 679 704 (Pubitemid 46061266)
-
(2006)
MIS Quarterly: Management Information Systems
, vol.30
, Issue.3
, pp. 679-704
-
-
Srite, M.1
Karahanna, E.2
-
88
-
-
79951820897
-
Framing of information security policies and practices
-
D. Straub, S. Goodman, R. Baskerville, M. E. Sharpe Armonk, NY
-
D. Straub, S. Goodman, and R. Baskerville Framing of information security policies and practices D. Straub, S. Goodman, R. Baskerville, Information Security Policies, Processes, and Practices 2008 M. E. Sharpe Armonk, NY
-
(2008)
Information Security Policies, Processes, and Practices
-
-
Straub, D.1
Goodman, S.2
Baskerville, R.3
-
89
-
-
68849085563
-
Identity theft victims skyrocket, surveys say
-
N. Swartz Identity theft victims skyrocket, surveys say The Information Management Journal 37 6 2003 17
-
(2003)
The Information Management Journal
, vol.37
, Issue.6
, pp. 17
-
-
Swartz, N.1
-
91
-
-
0002735809
-
The protection motivation model: A normative model of fear appeals
-
J.F. Tanner, J.B. Hunt, and D.R. Eppright The protection motivation model: a normative model of fear appeals Journal of Marketing 55 3 1991 36 45
-
(1991)
Journal of Marketing
, vol.55
, Issue.3
, pp. 36-45
-
-
Tanner, J.F.1
Hunt, J.B.2
Eppright, D.R.3
-
94
-
-
1542382496
-
User acceptance of information technology: Toward a unified view
-
V. Venkatesh, M.G. Morris, G.B. Davis, and F.D. Davis User acceptance of information technology: toward a unified view MIS Quarterly 27 3 2003 425 478
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.G.2
Davis, G.B.3
Davis, F.D.4
|