-
2
-
-
84865034598
-
Symantec Internet Security Threat Report: Trends for January 06-June 06
-
Symantec Internet Security Threat Report: Trends for January 06-June 06. Technical report, Symantec, 2006.
-
(2006)
Technical Report, Symantec
-
-
-
4
-
-
77951204516
-
Improving information security awareness and behaviour through dialogue, participation and collective reection. An intervention study
-
June
-
E. Albrechtsen and J. Hovden. Improving information security awareness and behaviour through dialogue, participation and collective reection. An intervention study. Computers & Security, 29(4):432-445, June 2010.
-
(2010)
Computers & Security
, vol.29
, Issue.4
, pp. 432-445
-
-
Albrechtsen, E.1
Hovden, J.2
-
5
-
-
77957077814
-
Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions
-
C. Anderson. Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions. Citeseer, 34(3):613-643, 2010.
-
(2010)
Citeseer
, vol.34
, Issue.3
, pp. 613-643
-
-
Anderson, C.1
-
7
-
-
2942631191
-
Gossip as cultural learning
-
DOI 10.1037/1089-2680.8.2.111, Gossip
-
R. F. Baumeister, L. Zhang, and K. D. Vohs. Gossip as Cultural Learning. Review of General Psychology, 8(2):111-121, 2004. (Pubitemid 38782778)
-
(2004)
Review of General Psychology
, vol.8
, Issue.2
, pp. 111-121
-
-
Baumeister, R.F.1
Zhang, L.2
Vohs, K.D.3
-
8
-
-
0002198248
-
The narrative construction of reality
-
J. Bruner. The narrative construction of reality. Critical inquiry, 18(1):1-21, 1991.
-
(1991)
Critical Inquiry
, vol.18
, Issue.1
, pp. 1-21
-
-
Bruner, J.1
-
11
-
-
70449596008
-
The information security policy unpacked: A critical study of the content of university policies
-
Dec
-
N. F. Doherty, L. Anastasakis, and H. Fulford. The information security policy unpacked: A critical study of the content of university policies. International Journal of Information Management, 29(6):449-457, Dec. 2009.
-
(2009)
International Journal of Information Management
, vol.29
, Issue.6
, pp. 449-457
-
-
Doherty, N.F.1
Anastasakis, L.2
Fulford, H.3
-
12
-
-
84900482702
-
Security in the wild: User strategies for managing security as an everyday, practical problem
-
Sept
-
P. Dourish, R. E. Grinter, J. Delgado De La Flor, and M. Joseph. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 8(6):391-401, Sept. 2004.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 391-401
-
-
Dourish, P.1
Grinter, R.E.2
Flor De La J.Delgado3
Joseph, M.4
-
13
-
-
34447503284
-
Assessing the security perceptions of personal Internet users
-
DOI 10.1016/j.cose.2007.03.001, PII S0167404807000363
-
S. Furnell, P. Bryant, and A. Phippen. Assessing the security perceptions of personal Internet users. Computers & Security, 26(5):410-417, Aug. 2007. (Pubitemid 47079135)
-
(2007)
Computers and Security
, vol.26
, Issue.5
, pp. 410-417
-
-
Furnell, S.M.1
Bryant, P.2
Phippen, A.D.3
-
14
-
-
53549103013
-
A room with a viewpoint: Using social norms to motivate environmental conservation in hotels
-
N. J. Goldstein, R. B. Cialdini, and V. Griskevicius. A Room with a Viewpoint: Using Social Norms to Motivate Environmental Conservation in Hotels. Journal of Consumer Research, 35(3):472-482, 2008.
-
(2008)
Journal of Consumer Research
, vol.35
, Issue.3
, pp. 472-482
-
-
Goldstein, N.J.1
Cialdini, R.B.2
Griskevicius, V.3
-
16
-
-
85029015966
-
Emotional selection in memes: The case of urban legends
-
DOI 10.1037//0022-3514.81.6.1028
-
C. Heath, C. Bell, and E. Steinberg. Emotional Selection in Memes: The Case of Urban Legends. Journal of Personality, 81(6):1028-1041, 2001. (Pubitemid 33594527)
-
(2001)
Journal of Personality and Social Psychology
, vol.81
, Issue.6
, pp. 1028-1041
-
-
Heath, C.1
Bell, C.2
Sternberg, E.3
-
19
-
-
42249108493
-
Assessing emotions related to learning new software: The computer emotion scale
-
DOI 10.1016/j.chb.2007.06.002, PII S0747563207001148
-
R. Kay and S. Loverock. Assessing emotions related to learning new software: The computer emotion scale. Computers in Human Behavior, 24(4):1605-1623, July 2008. (Pubitemid 351551483)
-
(2008)
Computers in Human Behavior
, vol.24
, Issue.4
, pp. 1605-1623
-
-
Kay, R.H.1
Loverock, S.2
-
20
-
-
56049103535
-
Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software firewalls
-
Dec
-
N. Kumar, K. Mohan, and R. Holowczak. Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software firewalls.Decision Support Systems, 46(1):254-264, Dec. 2008.
-
(2008)
Decision Support Systems
, vol.46
, Issue.1
, pp. 254-264
-
-
Kumar, N.1
Mohan, K.2
Holowczak, R.3
-
21
-
-
0036579437
-
Of tabloids and family secrets: The evolutionary psychology of gossip
-
May
-
F. T. McAndrew and M. A. Milenkovic. Of Tabloids and Family Secrets: The Evolutionary Psychology of Gossip. Journal of Applied Social Psychology, 32(5):1064-1082, May 2002.
-
(2002)
Journal of Applied Social Psychology
, vol.32
, Issue.5
, pp. 1064-1082
-
-
McAndrew, F.T.1
Milenkovic, M.A.2
-
22
-
-
62249199920
-
Talking about others: Emotionality and the dissemination of social information
-
K. Peters, Y. Kashima, and A. Clark. Talking about others: Emotionality and the dissemination of social information. European Journal of Social Psychology, 39(2):207-222, 2009.
-
(2009)
European Journal of Social Psychology
, vol.39
, Issue.2
, pp. 207-222
-
-
Peters, K.1
Kashima, Y.2
Clark, A.3
-
23
-
-
55249123334
-
Promoting household energy conservation
-
Dec
-
L. Steg. Promoting household energy conservation. Energy Policy, 36(12):4449-4453, Dec. 2008.
-
(2008)
Energy Policy
, vol.36
, Issue.12
, pp. 4449-4453
-
-
Steg, L.1
-
26
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
Sept
-
M. Workman, W. Bommer, and D. Straub. Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior, 24(6):2799-2816, Sept. 2008.
-
(2008)
Computers in Human Behavior
, vol.24
, Issue.6
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.2
Straub, D.3
|