-
1
-
-
0043232732
-
Users are not the enemy
-
ADAMS, A., AND SASSE, M. Users are not the enemy. Communications of the ACM 42, 12 (1999), 46.
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 46
-
-
Adams, A.1
Sasse, M.2
-
2
-
-
77951204516
-
Improving information security awareness and behaviour through dialogue, participation and collective reection. An intervention study
-
June
-
ALBRECHTSEN, E., AND HOVDEN, J. Improving information security awareness and behaviour through dialogue, participation and collective reection. An intervention study. Computers & Security 29, 4 (June 2010), 432-445.
-
(2010)
Computers & Security
, vol.29
, Issue.4
, pp. 432-445
-
-
Albrechtsen, E.1
Hovden, J.2
-
3
-
-
77957077814
-
Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions
-
ANDERSON, C. Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions. Citeseer 34, 3 (2010), 613-643.
-
(2010)
Citeseer
, vol.34
, Issue.3
, pp. 613-643
-
-
Anderson, C.1
-
5
-
-
2942631191
-
Gossip as cultural learning
-
DOI 10.1037/1089-2680.8.2.111, Gossip
-
Baumeister, R. F., Zhang, L., and Vohs, K. D. Gossip as Cultural Learning. Review of General Psychology 8, 2 (2004), 111-121. (Pubitemid 38782778)
-
(2004)
Review of General Psychology
, vol.8
, Issue.2
, pp. 111-121
-
-
Baumeister, R.F.1
Zhang, L.2
Vohs, K.D.3
-
6
-
-
42249107360
-
Lead is like mercury: Risk comparisons, analogies and mental models
-
Jan.
-
BOSTROM, A. Lead is like mercury: risk comparisons, analogies and mental models. Journal of Risk Research 11, 1 (Jan. 2008), 99-117.
-
(2008)
Journal of Risk Research
, vol.11
, Issue.1
, pp. 99-117
-
-
Bostrom, A.1
-
7
-
-
0002198248
-
The narrative construction of reality
-
BRUNER, J. The narrative construction of reality. Critical inquiry 18, 1 (1991), 1-21.
-
(1991)
Critical Inquiry
, vol.18
, Issue.1
, pp. 1-21
-
-
Bruner, J.1
-
8
-
-
70350230128
-
Mental models of privacy and security
-
CAMP, L. Mental models of privacy and security. Technology and Society Magazine, IEEE 28, 3 (2009), 37-46.
-
(2009)
Technology and Society Magazine, IEEE
, vol.28
, Issue.3
, pp. 37-46
-
-
Camp, L.1
-
9
-
-
84855698343
-
Motivating energy conservation in the workplace: An evaluation of the use of group-level feedback and peer education
-
Nov.
-
CARRICO, A. R., AND RIEMER, M. Motivating energy conservation in the workplace: An evaluation of the use of group-level feedback and peer education. Journal of Environmental Psychology (Nov. 2010).
-
(2010)
Journal of Environmental Psychology
-
-
Carrico, A.R.1
Riemer, M.2
-
13
-
-
70449596008
-
The information security policy unpacked: A critical study of the content of university policies
-
Dec.
-
DOHERTY, N. F., ANASTASAKIS, L., AND FULFORD, H. The information security policy unpacked: A critical study of the content of university policies. International Journal of Information Management 29, 6 (Dec. 2009), 449-457.
-
(2009)
International Journal of Information Management
, vol.29
, Issue.6
, pp. 449-457
-
-
Doherty, N.F.1
Anastasakis, L.2
Fulford, H.3
-
14
-
-
84900482702
-
Security in the wild: User strategies for managing security as an everyday, practical problem
-
Sept.
-
DOURISH, P., GRINTER, R. E., DELGADO DE LAFLOR, J., AND JOSEPH, M. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing 8, 6 (Sept. 2004), 391-401.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 391-401
-
-
Dourish, P.1
Grinter, R.E.2
Delgado De Laflor, J.3
Joseph, M.4
-
15
-
-
34447503284
-
Assessing the security perceptions of personal Internet users
-
Aug.
-
FURNELL, S., BRYANT, P., AND PHIPPEN, A.Assessing the security perceptions of personal Internet users. Computers & Security 26, 5 (Aug. 2007), 410-417.
-
(2007)
Computers & Security
, vol.26
, Issue.5
, pp. 410-417
-
-
Furnell, S.1
Bryant, P.2
Phippen, A.3
-
16
-
-
53549103013
-
A Room with a Viewpoint: Using Social Norms to Motivate Environmental Conservation in Hotels
-
GOLDSTEIN, N. J., CIALDINI, R. B., AND GRISKEVICIUS, V. A Room with a Viewpoint: Using Social Norms to Motivate Environmental Conservation in Hotels. Journal of Consumer Research 35, 3 (2008), 472-482.
-
(2008)
Journal of Consumer Research
, vol.35
, Issue.3
, pp. 472-482
-
-
Goldstein, N.J.1
Cialdini, R.B.2
Griskevicius, V.3
-
17
-
-
84860353734
-
The Work to Make a Home Network Work
-
Springer
-
GRINTER, R., EDWARDS, W., NEWMAN, M., AND DUCHENEAUT, N. The Work to Make a Home Network Work. In ECSCW 2005 (2005), Springer, pp. 469-488.
-
(2005)
ECSCW 2005
, pp. 469-488
-
-
Grinter, R.1
Edwards, W.2
Newman, M.3
Ducheneaut, N.4
-
19
-
-
85029015966
-
Emotional Selection in Memes: The Case of Urban Legends
-
HEATH, C., BELL, C., AND STEINBERG, E. Emotional Selection in Memes: The Case of Urban Legends. Journal of Personality 81, 6 (2001), 1028-1041.
-
(2001)
Journal of Personality
, vol.81
, Issue.6
, pp. 1028-1041
-
-
Heath, C.1
Bell, C.2
Steinberg, E.3
-
21
-
-
33745151504
-
The effects of metaphors on novice and expert learners' performance and mental-model development
-
July
-
HSU, Y. The effects of metaphors on novice and expert learners' performance and mental-model development. Interacting with Computers 18, 4 (July 2006), 770-792.
-
(2006)
Interacting with Computers
, vol.18
, Issue.4
, pp. 770-792
-
-
Hsu, Y.1
-
24
-
-
77957057727
-
Fear Appeals and Information Security Behaviors: An Empirical Study
-
JOHNSTON, A. Fear Appeals and Information Security Behaviors: An Empirical Study. MIS Quarterly 34, 3 (2010), 549-566.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 549-566
-
-
Johnston, A.1
-
25
-
-
79954547308
-
Mental Models: An Interdisciplinary Synthesis of Theory and Methods
-
JONES, N. A., ROSS, H., LYNAM, T., PEREZ, P., AND LEITCH, A. Mental Models: An Interdisciplinary Synthesis of Theory and Methods. Ecology And Society 16, 1 (2011).
-
(2011)
Ecology and Society
, vol.16
, pp. 1
-
-
Jones, N.A.1
Ross, H.2
Lynam, T.3
Perez, P.4
Leitch, A.5
-
26
-
-
77955812474
-
The Feasibility of Folk Science
-
May
-
KEIL, F. C. The Feasibility of Folk Science. Cognitive science 34, 5 (May 2010), 826-862.
-
(2010)
Cognitive Science
, vol.34
, Issue.5
, pp. 826-862
-
-
Keil, F.C.1
-
27
-
-
38249042045
-
Two Theories of Home Heat Control
-
KEMPTON, W. Two Theories of Home Heat Control. Cognitive Science 10, 1 (1986), 75-90.
-
(1986)
Cognitive Science
, vol.10
, Issue.1
, pp. 75-90
-
-
Kempton, W.1
-
28
-
-
56049103535
-
Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software rewalls
-
Dec.
-
KUMAR, N., MOHAN, K., AND HOLOWCZAK, R. Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software rewalls. Decision Support Systems 46, 1 (Dec. 2008), 254-264.
-
(2008)
Decision Support Systems
, vol.46
, Issue.1
, pp. 254-264
-
-
Kumar, N.1
Mohan, K.2
Holowczak, R.3
-
29
-
-
0004235785
-
-
Oxford University Press, ch. 11 Externalities and Public Goods
-
MAS-COLELL, A., WHINSTON, M. D., AND GREEN, J. R. Microeconomic Theory. Oxford University Press, 1995, ch. 11 Externalities and Public Goods, pp. 350-382.
-
(1995)
Microeconomic Theory
, pp. 350-382
-
-
Mas-Colell, A.1
Whinston, M.D.2
Green, J.R.3
-
30
-
-
34547408374
-
The Effects of a Prior Story-Bank on the Processing of a Related Narrative
-
MAZZOCCO, P., GREEN, M., AND BROCK, T. The Effects of a Prior Story-Bank on the Processing of a Related Narrative. Media Psychology 10, 1 (2007), 64-90.
-
(2007)
Media Psychology
, vol.10
, Issue.1
, pp. 64-90
-
-
Mazzocco, P.1
Green, M.2
Brock, T.3
-
31
-
-
0036579437
-
Of Tabloids and Family Secrets: The Evolutionary Psychology of Gossip
-
May
-
MCANDREW, F. T., AND MILENKOVIC, M. A. Of Tabloids and Family Secrets: The Evolutionary Psychology of Gossip. Journal of Applied Social Psychology 32, 5 (May 2002), 1064-1082.
-
(2002)
Journal of Applied Social Psychology
, vol.32
, Issue.5
, pp. 1064-1082
-
-
Mcandrew, F.T.1
Milenkovic, M.A.2
-
32
-
-
33645885367
-
Folkbiology of freshwater fish
-
MEDIN, D. L., ROSS, N. O., ATRAN, S., COX, D., COLEY, J., PROFFITT, J. B., AND BLOK, S. Folkbiology of freshwater fish. Cognition 99 (2006), 237-273.
-
(2006)
Cognition
, vol.99
, pp. 237-273
-
-
Medin, D.L.1
Ross, N.O.2
Atran, S.3
Cox, D.4
Coley, J.5
Proffitt, J.B.6
Blok, S.7
-
35
-
-
84855653949
-
-
NCSA-Norton-Symantec Online Safety Study, 2010. http://www. staysafeonline.org/blog/ ncsanorton-symantec-online-safety-study-released-today.
-
(2010)
NCSA-Norton-Symantec Online Safety Study
-
-
-
36
-
-
61349106575
-
Information and the decision to recycle: Results from a survey of US households
-
Mar.
-
NIXON, H., AND SAPHORES, J.-D. Information and the decision to recycle: results from a survey of US households. Journal of Environmental Planning and Management 52, 2 (Mar. 2009), 257-277.
-
(2009)
Journal of Environmental Planning and Management
, vol.52
, Issue.2
, pp. 257-277
-
-
Nixon, H.1
Saphores, J.-D.2
-
37
-
-
62249199920
-
Talking about others: Emotionality and the dissemination of social information
-
PETERS, K., KASHIMA, Y., AND CLARK, A. Talking about others: Emotionality and the dissemination of social information. European Journal of Social Psychology 39, 2 (2009), 207-222.
-
(2009)
European Journal of Social Psychology
, vol.39
, Issue.2
, pp. 207-222
-
-
Peters, K.1
Kashima, Y.2
Clark, A.3
-
38
-
-
77954713332
-
How the Public Views Strategies Designed to Reduce the Threat of Botnets
-
May
-
ROWE, B., AND WOOD, D. How the Public Views Strategies Designed to Reduce the Threat of Botnets. Trust and Trustworthy Computing 6101, May 2009 (2010), 337-351.
-
(2009)
Trust and Trustworthy Computing
, vol.6101
, pp. 337-351
-
-
Rowe, B.1
Wood, D.2
-
39
-
-
77957018869
-
Subjective theories of organizing and learning from events
-
Jan.
-
SCHÖBEL, M., AND MANZEY, D. Subjective theories of organizing and learning from events. Safety Science 49, 1 (Jan. 2011), 47-54.
-
(2011)
Safety Science
, vol.49
, Issue.1
, pp. 47-54
-
-
Schöbel, M.1
Manzey, D.2
-
40
-
-
58149433367
-
Rational choice and the structure of the environment
-
SIMON, H. A. Rational choice and the structure of the environment. Psychological Review 63, 2 (1956), 129-138.
-
(1956)
Psychological Review
, vol.63
, Issue.2
, pp. 129-138
-
-
Simon, H.A.1
-
41
-
-
55249123334
-
Promoting household energy conservation
-
Dec.
-
STEG, L. Promoting household energy conservation. Energy Policy 36, 12 (Dec. 2008), 4449-4453.
-
(2008)
Energy Policy
, vol.36
, Issue.12
, pp. 4449-4453
-
-
Steg, L.1
-
43
-
-
46149091551
-
Back vs. stack: Training the correct mental model affects web browsing
-
May
-
UTHER, M., AND HALEY, H. Back vs. stack: training the correct mental model affects web browsing. Behaviour & Information Technology 27, 3 (May 2008), 211-218.
-
(2008)
Behaviour & Information Technology
, vol.27
, Issue.3
, pp. 211-218
-
-
Uther, M.1
Haley, H.2
-
46
-
-
33845341413
-
Mental models: A theoretical overview and preliminary study
-
WESTBROOK, L. Mental models: a theoretical overview and preliminary study. Journal of Information Science 32, 6 (2006), 563.
-
(2006)
Journal of Information Science
, vol.32
, Issue.6
, pp. 563
-
-
Westbrook, L.1
-
47
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
Sept.
-
WORKMAN, M., BOMMER, W., AND STRAUB, D.Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior 24, 6 (Sept. 2008), 2799-2816.
-
(2008)
Computers in Human Behavior
, vol.24
, Issue.6
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.2
Straub, D.3
|