메뉴 건너뛰기




Volumn , Issue , 2011, Pages 57-66

Influencing mental models of security: A research agenda

Author keywords

home computer security; mental models

Indexed keywords

COMPUTER USERS; EMAIL MESSAGES; INTERNET CONNECTION; MENTAL MODEL; NON-TECHNICAL USERS; RESEARCH AGENDA;

EID: 84855674771     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2073276.2073283     Document Type: Conference Paper
Times cited : (67)

References (48)
  • 2
    • 77951204516 scopus 로고    scopus 로고
    • Improving information security awareness and behaviour through dialogue, participation and collective reection. An intervention study
    • June
    • ALBRECHTSEN, E., AND HOVDEN, J. Improving information security awareness and behaviour through dialogue, participation and collective reection. An intervention study. Computers & Security 29, 4 (June 2010), 432-445.
    • (2010) Computers & Security , vol.29 , Issue.4 , pp. 432-445
    • Albrechtsen, E.1    Hovden, J.2
  • 3
    • 77957077814 scopus 로고    scopus 로고
    • Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions
    • ANDERSON, C. Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions. Citeseer 34, 3 (2010), 613-643.
    • (2010) Citeseer , vol.34 , Issue.3 , pp. 613-643
    • Anderson, C.1
  • 5
    • 2942631191 scopus 로고    scopus 로고
    • Gossip as cultural learning
    • DOI 10.1037/1089-2680.8.2.111, Gossip
    • Baumeister, R. F., Zhang, L., and Vohs, K. D. Gossip as Cultural Learning. Review of General Psychology 8, 2 (2004), 111-121. (Pubitemid 38782778)
    • (2004) Review of General Psychology , vol.8 , Issue.2 , pp. 111-121
    • Baumeister, R.F.1    Zhang, L.2    Vohs, K.D.3
  • 6
    • 42249107360 scopus 로고    scopus 로고
    • Lead is like mercury: Risk comparisons, analogies and mental models
    • Jan.
    • BOSTROM, A. Lead is like mercury: risk comparisons, analogies and mental models. Journal of Risk Research 11, 1 (Jan. 2008), 99-117.
    • (2008) Journal of Risk Research , vol.11 , Issue.1 , pp. 99-117
    • Bostrom, A.1
  • 7
    • 0002198248 scopus 로고
    • The narrative construction of reality
    • BRUNER, J. The narrative construction of reality. Critical inquiry 18, 1 (1991), 1-21.
    • (1991) Critical Inquiry , vol.18 , Issue.1 , pp. 1-21
    • Bruner, J.1
  • 8
    • 70350230128 scopus 로고    scopus 로고
    • Mental models of privacy and security
    • CAMP, L. Mental models of privacy and security. Technology and Society Magazine, IEEE 28, 3 (2009), 37-46.
    • (2009) Technology and Society Magazine, IEEE , vol.28 , Issue.3 , pp. 37-46
    • Camp, L.1
  • 9
    • 84855698343 scopus 로고    scopus 로고
    • Motivating energy conservation in the workplace: An evaluation of the use of group-level feedback and peer education
    • Nov.
    • CARRICO, A. R., AND RIEMER, M. Motivating energy conservation in the workplace: An evaluation of the use of group-level feedback and peer education. Journal of Environmental Psychology (Nov. 2010).
    • (2010) Journal of Environmental Psychology
    • Carrico, A.R.1    Riemer, M.2
  • 13
    • 70449596008 scopus 로고    scopus 로고
    • The information security policy unpacked: A critical study of the content of university policies
    • Dec.
    • DOHERTY, N. F., ANASTASAKIS, L., AND FULFORD, H. The information security policy unpacked: A critical study of the content of university policies. International Journal of Information Management 29, 6 (Dec. 2009), 449-457.
    • (2009) International Journal of Information Management , vol.29 , Issue.6 , pp. 449-457
    • Doherty, N.F.1    Anastasakis, L.2    Fulford, H.3
  • 14
    • 84900482702 scopus 로고    scopus 로고
    • Security in the wild: User strategies for managing security as an everyday, practical problem
    • Sept.
    • DOURISH, P., GRINTER, R. E., DELGADO DE LAFLOR, J., AND JOSEPH, M. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing 8, 6 (Sept. 2004), 391-401.
    • (2004) Personal and Ubiquitous Computing , vol.8 , Issue.6 , pp. 391-401
    • Dourish, P.1    Grinter, R.E.2    Delgado De Laflor, J.3    Joseph, M.4
  • 15
    • 34447503284 scopus 로고    scopus 로고
    • Assessing the security perceptions of personal Internet users
    • Aug.
    • FURNELL, S., BRYANT, P., AND PHIPPEN, A.Assessing the security perceptions of personal Internet users. Computers & Security 26, 5 (Aug. 2007), 410-417.
    • (2007) Computers & Security , vol.26 , Issue.5 , pp. 410-417
    • Furnell, S.1    Bryant, P.2    Phippen, A.3
  • 16
    • 53549103013 scopus 로고    scopus 로고
    • A Room with a Viewpoint: Using Social Norms to Motivate Environmental Conservation in Hotels
    • GOLDSTEIN, N. J., CIALDINI, R. B., AND GRISKEVICIUS, V. A Room with a Viewpoint: Using Social Norms to Motivate Environmental Conservation in Hotels. Journal of Consumer Research 35, 3 (2008), 472-482.
    • (2008) Journal of Consumer Research , vol.35 , Issue.3 , pp. 472-482
    • Goldstein, N.J.1    Cialdini, R.B.2    Griskevicius, V.3
  • 19
    • 85029015966 scopus 로고    scopus 로고
    • Emotional Selection in Memes: The Case of Urban Legends
    • HEATH, C., BELL, C., AND STEINBERG, E. Emotional Selection in Memes: The Case of Urban Legends. Journal of Personality 81, 6 (2001), 1028-1041.
    • (2001) Journal of Personality , vol.81 , Issue.6 , pp. 1028-1041
    • Heath, C.1    Bell, C.2    Steinberg, E.3
  • 21
    • 33745151504 scopus 로고    scopus 로고
    • The effects of metaphors on novice and expert learners' performance and mental-model development
    • July
    • HSU, Y. The effects of metaphors on novice and expert learners' performance and mental-model development. Interacting with Computers 18, 4 (July 2006), 770-792.
    • (2006) Interacting with Computers , vol.18 , Issue.4 , pp. 770-792
    • Hsu, Y.1
  • 24
    • 77957057727 scopus 로고    scopus 로고
    • Fear Appeals and Information Security Behaviors: An Empirical Study
    • JOHNSTON, A. Fear Appeals and Information Security Behaviors: An Empirical Study. MIS Quarterly 34, 3 (2010), 549-566.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 549-566
    • Johnston, A.1
  • 25
    • 79954547308 scopus 로고    scopus 로고
    • Mental Models: An Interdisciplinary Synthesis of Theory and Methods
    • JONES, N. A., ROSS, H., LYNAM, T., PEREZ, P., AND LEITCH, A. Mental Models: An Interdisciplinary Synthesis of Theory and Methods. Ecology And Society 16, 1 (2011).
    • (2011) Ecology and Society , vol.16 , pp. 1
    • Jones, N.A.1    Ross, H.2    Lynam, T.3    Perez, P.4    Leitch, A.5
  • 26
    • 77955812474 scopus 로고    scopus 로고
    • The Feasibility of Folk Science
    • May
    • KEIL, F. C. The Feasibility of Folk Science. Cognitive science 34, 5 (May 2010), 826-862.
    • (2010) Cognitive Science , vol.34 , Issue.5 , pp. 826-862
    • Keil, F.C.1
  • 27
    • 38249042045 scopus 로고
    • Two Theories of Home Heat Control
    • KEMPTON, W. Two Theories of Home Heat Control. Cognitive Science 10, 1 (1986), 75-90.
    • (1986) Cognitive Science , vol.10 , Issue.1 , pp. 75-90
    • Kempton, W.1
  • 28
    • 56049103535 scopus 로고    scopus 로고
    • Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software rewalls
    • Dec.
    • KUMAR, N., MOHAN, K., AND HOLOWCZAK, R. Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software rewalls. Decision Support Systems 46, 1 (Dec. 2008), 254-264.
    • (2008) Decision Support Systems , vol.46 , Issue.1 , pp. 254-264
    • Kumar, N.1    Mohan, K.2    Holowczak, R.3
  • 29
    • 0004235785 scopus 로고
    • Oxford University Press, ch. 11 Externalities and Public Goods
    • MAS-COLELL, A., WHINSTON, M. D., AND GREEN, J. R. Microeconomic Theory. Oxford University Press, 1995, ch. 11 Externalities and Public Goods, pp. 350-382.
    • (1995) Microeconomic Theory , pp. 350-382
    • Mas-Colell, A.1    Whinston, M.D.2    Green, J.R.3
  • 30
    • 34547408374 scopus 로고    scopus 로고
    • The Effects of a Prior Story-Bank on the Processing of a Related Narrative
    • MAZZOCCO, P., GREEN, M., AND BROCK, T. The Effects of a Prior Story-Bank on the Processing of a Related Narrative. Media Psychology 10, 1 (2007), 64-90.
    • (2007) Media Psychology , vol.10 , Issue.1 , pp. 64-90
    • Mazzocco, P.1    Green, M.2    Brock, T.3
  • 31
    • 0036579437 scopus 로고    scopus 로고
    • Of Tabloids and Family Secrets: The Evolutionary Psychology of Gossip
    • May
    • MCANDREW, F. T., AND MILENKOVIC, M. A. Of Tabloids and Family Secrets: The Evolutionary Psychology of Gossip. Journal of Applied Social Psychology 32, 5 (May 2002), 1064-1082.
    • (2002) Journal of Applied Social Psychology , vol.32 , Issue.5 , pp. 1064-1082
    • Mcandrew, F.T.1    Milenkovic, M.A.2
  • 35
  • 36
    • 61349106575 scopus 로고    scopus 로고
    • Information and the decision to recycle: Results from a survey of US households
    • Mar.
    • NIXON, H., AND SAPHORES, J.-D. Information and the decision to recycle: results from a survey of US households. Journal of Environmental Planning and Management 52, 2 (Mar. 2009), 257-277.
    • (2009) Journal of Environmental Planning and Management , vol.52 , Issue.2 , pp. 257-277
    • Nixon, H.1    Saphores, J.-D.2
  • 37
    • 62249199920 scopus 로고    scopus 로고
    • Talking about others: Emotionality and the dissemination of social information
    • PETERS, K., KASHIMA, Y., AND CLARK, A. Talking about others: Emotionality and the dissemination of social information. European Journal of Social Psychology 39, 2 (2009), 207-222.
    • (2009) European Journal of Social Psychology , vol.39 , Issue.2 , pp. 207-222
    • Peters, K.1    Kashima, Y.2    Clark, A.3
  • 38
    • 77954713332 scopus 로고    scopus 로고
    • How the Public Views Strategies Designed to Reduce the Threat of Botnets
    • May
    • ROWE, B., AND WOOD, D. How the Public Views Strategies Designed to Reduce the Threat of Botnets. Trust and Trustworthy Computing 6101, May 2009 (2010), 337-351.
    • (2009) Trust and Trustworthy Computing , vol.6101 , pp. 337-351
    • Rowe, B.1    Wood, D.2
  • 39
    • 77957018869 scopus 로고    scopus 로고
    • Subjective theories of organizing and learning from events
    • Jan.
    • SCHÖBEL, M., AND MANZEY, D. Subjective theories of organizing and learning from events. Safety Science 49, 1 (Jan. 2011), 47-54.
    • (2011) Safety Science , vol.49 , Issue.1 , pp. 47-54
    • Schöbel, M.1    Manzey, D.2
  • 40
    • 58149433367 scopus 로고
    • Rational choice and the structure of the environment
    • SIMON, H. A. Rational choice and the structure of the environment. Psychological Review 63, 2 (1956), 129-138.
    • (1956) Psychological Review , vol.63 , Issue.2 , pp. 129-138
    • Simon, H.A.1
  • 41
    • 55249123334 scopus 로고    scopus 로고
    • Promoting household energy conservation
    • Dec.
    • STEG, L. Promoting household energy conservation. Energy Policy 36, 12 (Dec. 2008), 4449-4453.
    • (2008) Energy Policy , vol.36 , Issue.12 , pp. 4449-4453
    • Steg, L.1
  • 43
    • 46149091551 scopus 로고    scopus 로고
    • Back vs. stack: Training the correct mental model affects web browsing
    • May
    • UTHER, M., AND HALEY, H. Back vs. stack: training the correct mental model affects web browsing. Behaviour & Information Technology 27, 3 (May 2008), 211-218.
    • (2008) Behaviour & Information Technology , vol.27 , Issue.3 , pp. 211-218
    • Uther, M.1    Haley, H.2
  • 46
    • 33845341413 scopus 로고    scopus 로고
    • Mental models: A theoretical overview and preliminary study
    • WESTBROOK, L. Mental models: a theoretical overview and preliminary study. Journal of Information Science 32, 6 (2006), 563.
    • (2006) Journal of Information Science , vol.32 , Issue.6 , pp. 563
    • Westbrook, L.1
  • 47
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • Sept.
    • WORKMAN, M., BOMMER, W., AND STRAUB, D.Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior 24, 6 (Sept. 2008), 2799-2816.
    • (2008) Computers in Human Behavior , vol.24 , Issue.6 , pp. 2799-2816
    • Workman, M.1    Bommer, W.2    Straub, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.