메뉴 건너뛰기




Volumn 52, Issue 2, 2012, Pages 353-363

Fighting identity theft: The coping perspective

Author keywords

Coping; Identity theft; Perceived effectiveness; Security; Self efficacy; Social influence

Indexed keywords

CRIME; ECONOMIC AND SOCIAL EFFECTS; ELECTRONIC COMMERCE;

EID: 82255175850     PISSN: 01679236     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dss.2011.09.002     Document Type: Article
Times cited : (98)

References (94)
  • 2
    • 77957077814 scopus 로고    scopus 로고
    • Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions
    • C.L. Anderson, and R. Agarwal Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions MIS Quarterly 34 3 2010 613-A615
    • (2010) MIS Quarterly , vol.34 , Issue.3
    • Anderson, C.L.1    Agarwal, R.2
  • 4
    • 33845275228 scopus 로고    scopus 로고
    • Who are the victims of identity theft? the effect of demographics
    • K.B. Anderson Who are the victims of identity theft? The effect of demographics Journal of Public Policy & Marketing 25 2 2006 160 171
    • (2006) Journal of Public Policy & Marketing , vol.25 , Issue.2 , pp. 160-171
    • Anderson, K.B.1
  • 5
    • 84870957747 scopus 로고    scopus 로고
    • Validating formative partial least squares (PLS) models: Methodological review and empirical illustration
    • P. Andreev, T. Hearty, H. Maozz, and N. Pliskin Validating formative partial least squares (PLS) models: methodological review and empirical illustration ICIS 2009 Proceedings 2009
    • (2009) ICIS 2009 Proceedings
    • Andreev, P.1    Hearty, T.2    Maozz, H.3    Pliskin, N.4
  • 6
    • 24944504048 scopus 로고    scopus 로고
    • Online privacy policies: An empirical perspective on self-regulatory practices
    • N. Ashrafi, and J. Juilboer Online privacy policies: an empirical perspective on self-regulatory practices Journal of Electronic Commerce in Organizations 3 4 2006 61 74
    • (2006) Journal of Electronic Commerce in Organizations , vol.3 , Issue.4 , pp. 61-74
    • Ashrafi, N.1    Juilboer, J.2
  • 8
    • 84962052143 scopus 로고    scopus 로고
    • Identity theft, social security numbers, and the web
    • H. Berghel Identity theft, social security numbers, and the web Communications of the ACM 43 2 2000 17 21
    • (2000) Communications of the ACM , vol.43 , Issue.2 , pp. 17-21
    • Berghel, H.1
  • 9
    • 33745186426 scopus 로고    scopus 로고
    • Phishing mongers and posers
    • H. Berghel Phishing mongers and posers Communications of the ACM 49 4 2006 21 25
    • (2006) Communications of the ACM , vol.49 , Issue.4 , pp. 21-25
    • Berghel, H.1
  • 11
    • 84988266348 scopus 로고    scopus 로고
    • What drives the adoption of antiphishing measures by Hong Kong banks?
    • I. Bose, and A.C.M. Leung What drives the adoption of antiphishing measures by Hong Kong banks? Communications of the ACM 52 8 2009 141 143
    • (2009) Communications of the ACM , vol.52 , Issue.8 , pp. 141-143
    • Bose, I.1    Leung, A.C.M.2
  • 12
    • 33745804732 scopus 로고    scopus 로고
    • Privacy rights on the internet: Self-regulation or Government regulation?
    • N.E. Bowie, and K. Jamal Privacy rights on the Internet: self-regulation or government regulation? Business Ethics Quarterly 16 3 2006 323 342 (Pubitemid 44020437)
    • (2006) Business Ethics Quarterly , vol.16 , Issue.3 , pp. 323-342
    • Bowie, N.E.1    Jamal, K.2
  • 13
    • 61349159889 scopus 로고    scopus 로고
    • Perceptions of information security in the workplace: Linking information security climate to compliant behavior
    • M. Chan, I. Woon, and A. Kankanhalli Perceptions of information security in the workplace: linking information security climate to compliant behavior Journal of Information Privacy and Security 1 3 2005 18 41
    • (2005) Journal of Information Privacy and Security , vol.1 , Issue.3 , pp. 18-41
    • Chan, M.1    Woon, I.2    Kankanhalli, A.3
  • 14
    • 0002042337 scopus 로고    scopus 로고
    • Issues and opinion on structural equation modeling
    • W.W. Chin Issues and opinion on structural equation modeling MIS Quarterly 22 1 1998 7 16
    • (1998) MIS Quarterly , vol.22 , Issue.1 , pp. 7-16
    • Chin, W.W.1
  • 15
    • 79952922395 scopus 로고    scopus 로고
    • How to write up and report PLS analyses
    • V.E. Vinzi, W.W. Chin, J. Henseler, H. Wang, Springer Berlin, Germany
    • W.W. Chin How to write up and report PLS analyses V.E. Vinzi, W.W. Chin, J. Henseler, H. Wang, Handbook of Partial Least Squares: Concepts, Methods and Applications 2010 Springer Berlin, Germany
    • (2010) Handbook of Partial Least Squares: Concepts, Methods and Applications
    • Chin, W.W.1
  • 16
    • 33847309878 scopus 로고    scopus 로고
    • E-commerce and information privacy: Privacy policies as personal information protectors
    • C.A. Ciocchetti E-commerce and information privacy: privacy policies as personal information protectors American Business Law Journal 44 1 2007 55 126
    • (2007) American Business Law Journal , vol.44 , Issue.1 , pp. 55-126
    • Ciocchetti, C.A.1
  • 17
    • 82255167870 scopus 로고    scopus 로고
    • What you need to know about identity theft
    • L. Cohn What you need to know about identity theft Kiplinger's Personal Finance 63 7 2009 79
    • (2009) Kiplinger's Personal Finance , vol.63 , Issue.7 , pp. 79
    • Cohn, L.1
  • 18
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use and user acceptance of information technology
    • F.D. Davis Perceived usefulness, perceived ease of use and user acceptance of information technology MIS Quarterly 13 3 1989 319 340
    • (1989) MIS Quarterly , vol.13 , Issue.3 , pp. 319-340
    • Davis, F.D.1
  • 19
  • 21
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in is security research: Towards socio-organizational perspectives
    • G. Dhillon, and J. Backhouse Current directions in is security research: towards socio-organizational perspectives Information Systems Journal 11 2 2001 127
    • (2001) Information Systems Journal , vol.11 , Issue.2 , pp. 127
    • Dhillon, G.1    Backhouse, J.2
  • 22
    • 33845439549 scopus 로고    scopus 로고
    • Formative versus reflective indicators in organizational measure development: A comparison and empirical illustration
    • DOI 10.1111/j.1467-8551.2006.00500.x
    • A. Diamantopoulos, and J.A. Siguaw Formative versus reflective indicators in organizational measure development: a comparison and empirical illustration British Journal of Management 17 4 2006 263 282 (Pubitemid 44893384)
    • (2006) British Journal of Management , vol.17 , Issue.4 , pp. 263-282
    • Diamantopoulos, A.1    Siguaw, J.A.2
  • 23
    • 33749551929 scopus 로고    scopus 로고
    • Why spoofing is serious internet fraud
    • T. Dinev Why spoofing is serious in Internet fraud Communications of the ACM 49 10 2006 77 82 (Pubitemid 44536639)
    • (2006) Communications of the ACM , vol.49 , Issue.10 , pp. 77-82
    • Dinev, T.1
  • 24
    • 67650318762 scopus 로고    scopus 로고
    • User behaviour towards protective information technologies: The role of national cultural differences
    • T. Dinev, J. Goo, Q. Hu, and K. Nam User behaviour towards protective information technologies: the role of national cultural differences Information Systems Journal 19 4 2009 391 412
    • (2009) Information Systems Journal , vol.19 , Issue.4 , pp. 391-412
    • Dinev, T.1    Goo, J.2    Hu, Q.3    Nam, K.4
  • 25
    • 49049114397 scopus 로고    scopus 로고
    • The centrality of awareness in the formation of user behavioral intention toward protective information technologies
    • T. Dinev, and Q. Hu The centrality of awareness in the formation of user behavioral intention toward protective information technologies Journal of the Association for Information Systems 8 7 2007 386 408
    • (2007) Journal of the Association for Information Systems , vol.8 , Issue.7 , pp. 386-408
    • Dinev, T.1    Hu, Q.2
  • 26
    • 50349086151 scopus 로고    scopus 로고
    • Identity theft: An exploratory study with implications for marketers
    • E.M. Eisenstein Identity theft: an exploratory study with implications for marketers Journal of Business Research 61 11 2008 1160 1172
    • (2008) Journal of Business Research , vol.61 , Issue.11 , pp. 1160-1172
    • Eisenstein, E.M.1
  • 27
    • 33746237883 scopus 로고    scopus 로고
    • Technology-based new product development partnerships
    • DOI 10.1111/j.1540-5915.2006.00119.x
    • J.E. Ettlie, and P.A. Pavlou Technology-based new product development partnerships Decision Sciences 37 2 2006 117 147 (Pubitemid 44099934)
    • (2006) Decision Sciences , vol.37 , Issue.2 , pp. 117-147
    • Ettlie, J.E.1    Pavlou, P.A.2
  • 28
    • 80053388839 scopus 로고    scopus 로고
    • Federal Bureau of Investigation Accessed on 04/26/2011 at
    • Federal Bureau of Investigation Web 'spoofing' scams are a growing problem Accessed on 04/26/2011 at http://www.fbi.gov/news/pressrel/press- releases/fbi-says-web-spoofing-scams-are-a-growing-problem 2003
    • (2003) Web 'Spoofing' Scams Are A Growing Problem
  • 29
    • 82255167872 scopus 로고    scopus 로고
    • Federal Bureau of Investigation Accessed on 04/26/2011 at
    • Federal Bureau of Investigation How to protect your good name from identity theft Accessed on 04/26/2011 at http://www.fbi.gov/news/stories/2004/ october/preventidt-102104 2004
    • (2004) How to Protect Your Good Name from Identity Theft
  • 30
    • 82255171342 scopus 로고    scopus 로고
    • Federal Trade Commission Accessed on 04/26/2011 at
    • Federal Trade Commission Take charge: fighting back against identity theft Accessed on 04/26/2011 at http://www.ftc.gov/bcp/edu/pubs/consumer/ idtheft/idt04.pdf 2006
    • (2006) Take Charge: Fighting Back Against Identity Theft
  • 35
    • 0000009769 scopus 로고
    • Evaluating structural equation models with unobservable variables and measurement error
    • C. Fornell, and D.F. Larcker Evaluating structural equation models with unobservable variables and measurement error Journal of Marketing Research 18 1 1981 39 50
    • (1981) Journal of Marketing Research , vol.18 , Issue.1 , pp. 39-50
    • Fornell, C.1    Larcker, D.F.2
  • 36
    • 29444460597 scopus 로고    scopus 로고
    • A practical guide to factorial validity using PLS-graph: Tutorial and annotated example
    • D. Gefen, and D. Straub A practical guide to factorial validity using PLS-graph: tutorial and annotated example Communications of AIS 16 2005 91 109
    • (2005) Communications of AIS , vol.16 , pp. 91-109
    • Gefen, D.1    Straub, D.2
  • 37
    • 79960536814 scopus 로고    scopus 로고
    • Evaluation of structural equation models using the partial least squares (PLS) approach
    • V.E. Vinzi, W.W. Chin, J. Henseler, H. Wang, Springer Berlin, Gernmany
    • O. Götz, K. Liehr-Gobbers, and M. Krafft Evaluation of structural equation models using the partial least squares (PLS) approach V.E. Vinzi, W.W. Chin, J. Henseler, H. Wang, Handbook of Partial Least Squares: Concepts, Methods and Applications 2010 Springer Berlin, Gernmany
    • (2010) Handbook of Partial Least Squares: Concepts, Methods and Applications
    • Götz, O.1    Liehr-Gobbers, K.2    Krafft, M.3
  • 38
    • 70349151365 scopus 로고    scopus 로고
    • Consumer motivations in taking action against spyware: An empirical investigation
    • A. Gurung, X. Luo, and Q. Liao Consumer motivations in taking action against spyware: an empirical investigation Information Management & Computer Security 17 3 2009 276 289
    • (2009) Information Management & Computer Security , vol.17 , Issue.3 , pp. 276-289
    • Gurung, A.1    Luo, X.2    Liao, Q.3
  • 39
    • 0040236696 scopus 로고
    • Communicating innovations: Convincing computer phobics to adopt innovative technologies
    • T. Hill, N.D. Smith, and M.F. Mann Communicating innovations: convincing computer phobics to adopt innovative technologies Advances in Consumer Research 13 1 1986 419 422
    • (1986) Advances in Consumer Research , vol.13 , Issue.1 , pp. 419-422
    • Hill, T.1    Smith, N.D.2    Mann, M.F.3
  • 40
    • 23344444212 scopus 로고    scopus 로고
    • Is spyware an internet nuisance or public menance?
    • DOI 10.1145/1076211.1076241
    • Q. Hu, and T. Dinev Is spyware an Internet nuisance or public menace? Communications of the ACM 48 8 2005 61 66 (Pubitemid 41101416)
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 61-66
    • Qing, H.U.1    Dinev, T.2
  • 41
    • 42449100748 scopus 로고    scopus 로고
    • Lack of trust hampering online direct marketing
    • G. Hulme Lack of trust hampering online direct marketing B to B 90 12 2005 4 45
    • (2005) B to B , vol.90 , Issue.12 , pp. 4-45
    • Hulme, G.1
  • 42
    • 82255167868 scopus 로고    scopus 로고
    • ID fraud at a record high
    • Institute of Credit Management
    • Institute of Credit Management ID fraud at a record high Credit Management Dec., 2006 8
    • (2006) Credit Management , pp. 8
  • 43
    • 0242424963 scopus 로고    scopus 로고
    • A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research
    • DOI 10.1086/376806
    • C.B. Jarvis, S.B. Mackenzie, P.M. Podsakoff, D.G. Mick, and W.O. Bearden A critical review of construct indicators and measurement model misspecification in marketing and consumer research Journal of Consumer Research 30 2 2003 199 218 (Pubitemid 37374305)
    • (2003) Journal of Consumer Research , vol.30 , Issue.2 , pp. 199-218
    • Jarvis, C.B.1    Mackenzie, S.B.2    Podsakoff, P.M.3    Giliatt, N.4    Mee, J.F.5
  • 44
    • 77957057727 scopus 로고    scopus 로고
    • Fear appeals and information security behaviors: An empirical study
    • A.C. Johnston, and M. Warkentin Fear appeals and information security behaviors: an empirical study MIS Quarterly 34 3 2010 549-A544
    • (2010) MIS Quarterly , vol.34 , Issue.3
    • Johnston, A.C.1    Warkentin, M.2
  • 45
    • 57649195371 scopus 로고    scopus 로고
    • Culture and identity-protective cognition: Explaining the white-male effect in risk perception
    • D.M. Kahan, D. Braman, J. Gastil, P. Slovic, and C.K. Mertz Culture and identity-protective cognition: explaining the white-male effect in risk perception Journal of Empirical Legal Studies 4 3 2007 465 505
    • (2007) Journal of Empirical Legal Studies , vol.4 , Issue.3 , pp. 465-505
    • Kahan, D.M.1    Braman, D.2    Gastil, J.3    Slovic, P.4    Mertz, C.K.5
  • 46
    • 44249099036 scopus 로고    scopus 로고
    • Credit and identity theft
    • C. Kahn Credit and identity theft Journal of Monetary Economics 55 2 2008 251 264
    • (2008) Journal of Monetary Economics , vol.55 , Issue.2 , pp. 251-264
    • Kahn, C.1
  • 48
    • 33745183962 scopus 로고    scopus 로고
    • Usable privacy and security for personal information management
    • C. Karat, C. Brodie, and J. Karat Usable privacy and security for personal information management Communications of the ACM 49 1 2006 56 57
    • (2006) Communications of the ACM , vol.49 , Issue.1 , pp. 56-57
    • Karat, C.1    Brodie, C.2    Karat, J.3
  • 49
    • 0348042908 scopus 로고    scopus 로고
    • The development of initial trust in an online company by new customers
    • M. Koufaris, and W. Hampton-Sosa The development of initial trust in an online company by new customers Information Management 41 3 2004 377 397
    • (2004) Information Management , vol.41 , Issue.3 , pp. 377-397
    • Koufaris, M.1    Hampton-Sosa, W.2
  • 51
    • 24144487101 scopus 로고    scopus 로고
    • Consumers' attitudes towards online and mobile banking in China
    • DOI 10.1108/02652320510629250
    • S. Laforet, and X. Li Consumers' attitudes towards online and mobile banking in China International Journal of Bank Marketing 23 5 2005 362 380 (Pubitemid 41240294)
    • (2005) International Journal of Bank Marketing , vol.23 , Issue.5 , pp. 362-380
    • Laforet, S.1    Li, X.2
  • 52
    • 40549099995 scopus 로고    scopus 로고
    • Promoting personal responsibility for internet safety
    • DOI 10.1145/1325555.1325569
    • R. LaRose, N.J. Rifon, and R. Enbody Promoting personal responsibility for internet safety Communications of the ACM 51 3 2008 71 76 (Pubitemid 351357118)
    • (2008) Communications of the ACM , vol.51 , Issue.3 , pp. 71-76
    • LaRose, R.1    Rifon, N.J.2    Enbody, R.3
  • 53
    • 18844363978 scopus 로고    scopus 로고
    • The relationship between consumer innovativeness, personal characteristics, and online banking adoption
    • DOI 10.1108/02652320510584403
    • W.M. Lassar, C. Manolis, and S.S. Lassar The relationship between consumer innovativeness, personal characteristics, and online banking adoption International Journal of Bank Marketing 23 2 2005 176 199 (Pubitemid 40687416)
    • (2005) International Journal of Bank Marketing , vol.23 , Issue.2 , pp. 176-199
    • Lassar, W.M.1    Manolis, C.2    Lassar, S.S.3
  • 55
    • 0027157559 scopus 로고
    • Coping theory and research: Past, present, and future
    • R.S. Lazarus Coping theory and research: past present, and future Psychosomatic Medicine 55 3 1993 234 247 (Pubitemid 23155671)
    • (1993) Psychosomatic Medicine , vol.55 , Issue.3 , pp. 234-247
    • Lazarus, R.S.1
  • 56
    • 51749090174 scopus 로고    scopus 로고
    • Keeping our network safe: A model of online protection behaviour
    • D. Lee, R. Larose, and N. Rifon Keeping our network safe: a model of online protection behaviour Behaviour & Information Technology 27 5 2008 445 454
    • (2008) Behaviour & Information Technology , vol.27 , Issue.5 , pp. 445-454
    • Lee, D.1    Larose, R.2    Rifon, N.3
  • 57
    • 78650169218 scopus 로고    scopus 로고
    • Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective
    • Y. Lee Understanding anti-plagiarism software adoption: an extended protection motivation theory perspective Decision Support Systems 50 2 2011 361 369
    • (2011) Decision Support Systems , vol.50 , Issue.2 , pp. 361-369
    • Lee, Y.1
  • 59
    • 75349090403 scopus 로고    scopus 로고
    • Understanding compliance with internet use policy from the perspective of rational choice theory
    • H. Li, J. Zhang, and R. Sarathy Understanding compliance with internet use policy from the perspective of rational choice theory Decision Support Systems 48 4 2010 635 645
    • (2010) Decision Support Systems , vol.48 , Issue.4 , pp. 635-645
    • Li, H.1    Zhang, J.2    Sarathy, R.3
  • 60
    • 60649084770 scopus 로고    scopus 로고
    • Avoidance of information technology threats: A theoretical perspective
    • H. Liang, and Y. Xue Avoidance of information technology threats: a theoretical perspective MIS Quarterly 33 1 2009 71 90
    • (2009) MIS Quarterly , vol.33 , Issue.1 , pp. 71-90
    • Liang, H.1    Xue, Y.2
  • 61
    • 58349086406 scopus 로고    scopus 로고
    • Identity theft in cyberspace: Crime control methods and their effectiveness in combating phishing attacks
    • J. Lynch Identity theft in cyberspace: crime control methods and their effectiveness in combating phishing attacks Berkeley Technology Law Journal 20 1 2005 259 300
    • (2005) Berkeley Technology Law Journal , vol.20 , Issue.1 , pp. 259-300
    • Lynch, J.1
  • 62
    • 24944589695 scopus 로고    scopus 로고
    • The problem of measurement model misspecification in behavioral and organizational research and some recommended solutions
    • DOI 10.1037/0021-9010.90.4.710
    • S.B. MacKenzie, P.M. Podsakoff, and C.B. Jarvis The problem of measurement model misspecification in behavioral and organizational research and some recommended solutions Journal of Applied Psychology 90 4 2005 710 730 (Pubitemid 41304795)
    • (2005) Journal of Applied Psychology , vol.90 , Issue.4 , pp. 710-730
    • MacKenzie, S.B.1    Podsakoff, P.M.2    Jarvis, C.B.3
  • 63
    • 33745893541 scopus 로고    scopus 로고
    • Scoping identity theft
    • Two Decades of the Language-action Perspective
    • R. Mercuri Scoping identity theft Communications of the ACM 49 5 2006 17 21 (Pubitemid 44046397)
    • (2006) Communications of the ACM , vol.49 , Issue.5 , pp. 17-21
    • Mercuri, R.T.1
  • 64
    • 1542710582 scopus 로고    scopus 로고
    • The 411 on Mobile Privacy
    • G.R. Milne, and A.J. Rohm The 411 on mobile privacy Marketing Management 12 4 2003 40 45 (Pubitemid 38355359)
    • (2003) Marketing Management , vol.12 , Issue.4 , pp. 40-45
    • Milne, G.R.1    Rohm, A.J.2
  • 65
    • 10844290435 scopus 로고    scopus 로고
    • Consumers' protection of online privacy and identity
    • G.R. Milne, A.J. Rohm, and S. Bahl Consumers' protection of online privacy and identity Journal of Consumer Affairs 38 2 2004 217 232 (Pubitemid 39666076)
    • (2004) Journal of Consumer Affairs , vol.38 , Issue.2 , pp. 217-232
    • Milne, G.R.1    Rohm, A.J.2    Bahl, S.3
  • 70
    • 61349092288 scopus 로고    scopus 로고
    • Studying users' computer security behavior: A health belief perspective
    • B.-Y. Ng, A. Kankanhalli, and Y. Xu Studying users' computer security behavior: a health belief perspective Decision Support Systems 46 4 2009 815 825
    • (2009) Decision Support Systems , vol.46 , Issue.4 , pp. 815-825
    • Ng, B.-Y.1    Kankanhalli, A.2    Xu, Y.3
  • 72
    • 47649099066 scopus 로고    scopus 로고
    • Organisations for Economic Co-operation and Development Accessed on 04/26/2011 at
    • Organisations for Economic Co-operation and Development Scoping paper on online identity theft Accessed on 04/26/2011 at http://www.oecd.org/dataoecd/35/ 24/40644196.pdf 2008
    • (2008) Scoping Paper on Online Identity Theft
  • 73
    • 33749347189 scopus 로고    scopus 로고
    • Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior
    • P.A. Pavlou, and M. Fygenson Understanding and prediction electronic commerce adoption: an extension of the theory of planned behavior MIS Quarterly 30 1 2006 115 143 (Pubitemid 44971427)
    • (2006) MIS Quarterly: Management Information Systems , vol.30 , Issue.1 , pp. 115-143
    • Pavlou, P.A.1    Fygenson, M.2
  • 74
    • 33847764616 scopus 로고    scopus 로고
    • Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective
    • P.A. Pavlou, H. Liang, and Y. Xue Understanding and mitigating uncertainty in online exchange relationships: a principal-agent perspective MIS Quarterly 31 1 2007 105 136
    • (2007) MIS Quarterly , vol.31 , Issue.1 , pp. 105-136
    • Pavlou, P.A.1    Liang, H.2    Xue, Y.3
  • 76
    • 23344452974 scopus 로고    scopus 로고
    • Spyware: A view from the (online) street
    • DOI 10.1145/1076211.1076247
    • R. Poston, T.F. Stafford, and A. Hennington Spyware: a view from the (online) street Communications of the ACM 48 8 2005 96 99 (Pubitemid 41101422)
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 96-99
    • Poston, R.1    Stafford, T.F.2    Hennington, A.3
  • 77
    • 82255170183 scopus 로고    scopus 로고
    • Privacy Rights Clearinghouse Accessed on 04/26/2011 at
    • Privacy Rights Clearinghouse Coping with identity theft: reducing the risk of fraud Accessed on 04/26/2011 at http://www.privacyrights.org/fs/fs17-it. htm 2011
    • (2011) Coping with Identity Theft: Reducing the Risk of Fraud
  • 78
    • 63149147108 scopus 로고    scopus 로고
    • Identity-theft toolkit
    • V.M. Ramaswamy Identity-theft toolkit CPA Journal 76 10 2006 66 70
    • (2006) CPA Journal , vol.76 , Issue.10 , pp. 66-70
    • Ramaswamy, V.M.1
  • 79
    • 0001840352 scopus 로고
    • A protection motivation theory of fear appeals and attitude change
    • R.W. Rogers A protection motivation theory of fear appeals and attitude change Journal of Psychology 91 1 1975 93 114
    • (1975) Journal of Psychology , vol.91 , Issue.1 , pp. 93-114
    • Rogers, R.W.1
  • 80
    • 0002247369 scopus 로고
    • Cognitive and physiological process in fear appeals and attitude change: A revised theory of protection motivation
    • R. Petty, Guilford Press New York
    • R.W. Rogers Cognitive and physiological process in fear appeals and attitude change: a revised theory of protection motivation R. Petty, Social Psychophysiology: a Source Book 1983 Guilford Press New York
    • (1983) Social Psychophysiology: A Source Book
    • Rogers, R.W.1
  • 81
    • 82255170180 scopus 로고    scopus 로고
    • The next generation in id theft: Protecting consumers from spiraling crime
    • T. Rusin The next generation in id theft: protecting consumers from spiraling crime ABA Banking Journal 98 11 2006 73
    • (2006) ABA Banking Journal , vol.98 , Issue.11 , pp. 73
    • Rusin, T.1
  • 82
    • 84891450372 scopus 로고    scopus 로고
    • Two in three Americans worry about identity theft
    • L. Saad Two in three Americans worry about identity theft Gallup Poll Briefing 10/16/2009 1
    • (2009) Gallup Poll Briefing , pp. 1
    • Saad, L.1
  • 83
    • 82255167861 scopus 로고    scopus 로고
    • Risks of identity theft: Can the market protect the payment system?
    • S. Schreft Risks of identity theft: can the market protect the payment system? Economic Review 92 4 2007 5 40
    • (2007) Economic Review , vol.92 , Issue.4 , pp. 5-40
    • Schreft, S.1
  • 87
    • 33846076044 scopus 로고    scopus 로고
    • The role of espoused national cultural values in technology acceptance
    • M. Srite, and E. Karahanna The role of espoused national cultural values in technology acceptance MIS Quarterly 30 3 2006 679 704 (Pubitemid 46061266)
    • (2006) MIS Quarterly: Management Information Systems , vol.30 , Issue.3 , pp. 679-704
    • Srite, M.1    Karahanna, E.2
  • 89
    • 68849085563 scopus 로고    scopus 로고
    • Identity theft victims skyrocket, surveys say
    • N. Swartz Identity theft victims skyrocket, surveys say The Information Management Journal 37 6 2003 17
    • (2003) The Information Management Journal , vol.37 , Issue.6 , pp. 17
    • Swartz, N.1
  • 91
    • 0002735809 scopus 로고
    • The protection motivation model: A normative model of fear appeals
    • J.F. Tanner, J.B. Hunt, and D.R. Eppright The protection motivation model: a normative model of fear appeals Journal of Marketing 55 3 1991 36 45
    • (1991) Journal of Marketing , vol.55 , Issue.3 , pp. 36-45
    • Tanner, J.F.1    Hunt, J.B.2    Eppright, D.R.3
  • 94
    • 1542382496 scopus 로고    scopus 로고
    • User acceptance of information technology: Toward a unified view
    • V. Venkatesh, M.G. Morris, G.B. Davis, and F.D. Davis User acceptance of information technology: toward a unified view MIS Quarterly 27 3 2003 425 478
    • (2003) MIS Quarterly , vol.27 , Issue.3 , pp. 425-478
    • Venkatesh, V.1    Morris, M.G.2    Davis, G.B.3    Davis, F.D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.