-
1
-
-
0043232732
-
Users Are Not The Enemy
-
Adams, A., and Sasse, M. A. "Users Are Not The Enemy," Communications of the ACM (42:12), 1999, pp. 40-46.
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
2
-
-
0242621900
-
-
Washington, DC: Rand
-
Anderson, R. H., Feldman, P. M., Gerwehr, W., Houghton, B., Mesic, R., Pinder, J. D., Rothenberg, J., and Chiesa, J. "Securing the U.S. Defense Information Infrastructure: A Proposed Approach, Washington, DC: Rand, 1999.
-
(1999)
Securing the U.S. Defense Information Infrastructure: A Proposed Approach
-
-
Anderson, R.H.1
Feldman, P.M.2
Gerwehr, W.3
Houghton, B.4
Mesic, R.5
Pinder, J.D.6
Rothenberg, J.7
Chiesa, J.8
-
3
-
-
55249087535
-
Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology
-
Davis, F. D. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, MIS Quarterly (13:3), 1989, pp. 319-339.
-
(1989)
MIS Quarterly
, vol.13
, Issue.3
, pp. 319-339
-
-
Davis, F.D.1
-
4
-
-
33645589662
-
A Prototype Tool for Information Security Awareness and Training
-
Furnell, S. M., Gennatou, M., and Dowland, P. S. "A Prototype Tool for Information Security Awareness and Training," Logistics Information Management (15:6), 2002, pp. 352-357.
-
(2002)
Logistics Information Management
, vol.15
, Issue.6
, pp. 352-357
-
-
Furnell, S.M.1
Gennatou, M.2
Dowland, P.S.3
-
5
-
-
84871032505
-
-
Google Scholar. Search conducted March 3, accessed at
-
Google Scholar. Search conducted March 3, 2007, accessed at http://scholar.google.com/scholar?hl=en&lr=&q=Perceived+usefulness%2C+perceived+ease+of+use%2C+and+user+acceptance+of+information+technology.&btnG=Search
-
(2007)
-
-
-
6
-
-
0242424963
-
A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research
-
Jarvis, C. B., Mackenzie, S. B., and Podsakoff, P. M. "A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research, Journal of Consumer Research (30:2), 2003, pp. 199-218.
-
(2003)
Journal of Consumer Research
, vol.30
, Issue.2
, pp. 199-218
-
-
Jarvis, C.B.1
Mackenzie, S.B.2
Podsakoff, P.M.3
-
7
-
-
33846005128
-
Reconceptualizing Compatibility Beliefs in Technology Acceptance Research
-
Karahanna, E., Agarwal, R., and Angst, C. "Reconceptualizing Compatibility Beliefs in Technology Acceptance Research," MIS Quarterly (30:4), 2006, pp. 781-804.
-
(2006)
MIS Quarterly
, vol.30
, Issue.4
, pp. 781-804
-
-
Karahanna, E.1
Agarwal, R.2
Angst, C.3
-
8
-
-
84870224179
-
Legal Issues Alone Are Not Enough to Manage Computer Fraud Committed by Employees
-
Kesar, S. "Legal Issues Alone Are Not Enough to Manage Computer Fraud Committed by Employees," Journal of International Commercial Law and Technology (1:1), 2006, pp. 25-40.
-
(2006)
Journal of International Commercial Law and Technology
, vol.1
, Issue.1
, pp. 25-40
-
-
Kesar, S.1
-
9
-
-
0345764837
-
Improving Security Use Behavior
-
Leach, J. "Improving Security Use Behavior," Computers & Security (22:8), 2003, pp. 685-693.
-
(2003)
Computers & Security
, vol.22
, Issue.8
, pp. 685-693
-
-
Leach, J.1
-
10
-
-
0037322632
-
Diffusing the Internet in the Arab World: The Role of Social Norms and Technological Culturation
-
Loch, K. D., Straub, D. W., Kamel, S. "Diffusing the Internet in the Arab World: The Role of Social Norms and Technological Culturation," IEEE Transactions on Engineering Management (50:1), 2003, pp. 45-63.
-
(2003)
IEEE Transactions On Engineering Management
, vol.50
, Issue.1
, pp. 45-63
-
-
Loch, K.D.1
Straub, D.W.2
Kamel, S.3
-
11
-
-
33846704341
-
IT Security: In Search of the Holy Grail
-
Oppliger, R. "IT Security: In Search of the Holy Grail," Communications of the ACM (50:2), 2007, pp. 96-98.
-
(2007)
Communications of the ACM
, vol.50
, Issue.2
, pp. 96-98
-
-
Oppliger, R.1
-
12
-
-
29444459006
-
Psychological Contract Violation in Online Marketplaces: Antecedents, Consequences, and Moderating Role
-
Pavlou, P., and Gefen, D. "Psychological Contract Violation in Online Marketplaces: Antecedents, Consequences, and Moderating Role," Information Systems Research (16:4), 2005, pp. 372-399.
-
(2005)
Information Systems Research
, vol.16
, Issue.4
, pp. 372-399
-
-
Pavlou, P.1
Gefen, D.2
-
13
-
-
58349121168
-
-
Georgia State University, working paper
-
Petter, S., Straub, D. W., and Rai, A. "Specification and Validation of Formative Constructs in IS Research," Georgia State University, working paper.
-
Specification and Validation of Formative Constructs In is Research
-
-
Petter, S.1
Straub, D.W.2
Rai, A.3
-
14
-
-
49249132931
-
Intrusion Detection Technology: Leveraging the Organization's Security Posture
-
Rosenthal, D. A. "Intrusion Detection Technology: Leveraging the Organization's Security Posture," Information Systems Management (19:1), 2002, pp. 35-44.
-
(2002)
Information Systems Management
, vol.19
, Issue.1
, pp. 35-44
-
-
Rosenthal, D.A.1
-
15
-
-
53049103906
-
Five Dimensions of Information Security Awareness
-
Siponen, M. T. "Five Dimensions of Information Security Awareness," Computers and Society (31:2), 2001, pp. 24-29.
-
(2001)
Computers and Society
, vol.31
, Issue.2
, pp. 24-29
-
-
Siponen, M.T.1
-
16
-
-
33845962305
-
A Meta-Analysis of the Technology Acceptance Model: Investigating Subjective Norm and Moderation Effects
-
Schepers, J., and Wetzels, M. "A Meta-Analysis of the Technology Acceptance Model: Investigating Subjective Norm and Moderation Effects," Information & Management (44:1), 2007, pp. 90-103.
-
(2007)
Information & Management
, vol.44
, Issue.1
, pp. 90-103
-
-
Schepers, J.1
Wetzels, M.2
-
17
-
-
0242637628
-
Examining the Linkage Between Organizational Commitment and Information Security
-
Washington, DC
-
Stanton, J. M., Stam, K. R., Guzman, I., and Caldera, C. "Examining the Linkage Between Organizational Commitment and Information Security," Proceedings of the IEEE Systems, Man, and Cybernetics Conference, Washington, DC, 2003.
-
(2003)
Proceedings of the IEEE Systems, Man, and Cybernetics Conference
-
-
Stanton, J.M.1
Stam, K.R.2
Guzman, I.3
Caldera, C.4
-
18
-
-
0001133137
-
Coping with Systems Risk: Security Planning Models for Management Decision Making
-
Straub, D. W., and Welke, R. J. "Coping with Systems Risk: Security Planning Models for Management Decision Making," MIS Quarterly (22:4), 1998, pp. 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
19
-
-
1542382496
-
User Acceptance of Information Technology: Toward a Unified View
-
Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D. "User Acceptance of Information Technology: Toward a Unified View," MIS Quarterly (27:3), 2003, pp. 425-478.
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.G.2
Davis, G.B.3
Davis, F.D.4
-
20
-
-
2642569127
-
Introducing the Check-off Password System (COPS): An Advancement in User Authentication Methods and Information Security
-
Warkentin, M., Davis, K., and Bekkering, E. "Introducing the Check-off Password System (COPS): An Advancement in User Authentication Methods and Information Security," Journal of Organizational & End User Computing (16:3), 2004, pp. 41-58.
-
(2004)
Journal of Organizational & End User Computing
, vol.16
, Issue.3
, pp. 41-58
-
-
Warkentin, M.1
Davis, K.2
Bekkering, E.3
-
21
-
-
4243198165
-
Enemy at the Gates: Threats to Information Security
-
Whitman, M. Enemy at the Gates: Threats to Information Security, Communications of the ACM (46:8), 2003, pp. 91-95.
-
(2003)
Communications of the ACM
, vol.46
, Issue.8
, pp. 91-95
-
-
Whitman, M.1
|