-
1
-
-
14744275332
-
Privacy and Rationality in Individual Decision Making
-
January/February
-
Acquisti, A., and Grossklags, J. "Privacy and Rationality in Individual Decision Making, " IEEE Security & Privacy (3:1), January/February 2005, pp 24-30.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.1
, pp. 24-30
-
-
Acquisti, A.1
Grossklags, J.2
-
2
-
-
77956256623
-
Mental Models of Computer Security Risks
-
Pittsburgh, PA
-
Asgharpour, F., Liu, D., and Camp, L.J. "Mental Models of Computer Security Risks, " in: Workshop on the Economics of Information Security, Pittsburgh, PA, 2007.
-
(2007)
Workshop on the Economics of Information Security
-
-
Asgharpour, F.1
Liu, D.2
Camp, L.J.3
-
3
-
-
2642549662
-
Computer Security and Risky Computing Practices: A Rational Choice Perspective
-
Jul-Sep
-
Aytes, K., and Connolly, T. "Computer Security and Risky Computing Practices: A Rational Choice Perspective, " Journal of Organizational and End User Computing (16:3), Jul-Sep 2004, pp 22-40.
-
(2004)
Journal of Organizational and End User Computing
, vol.16
, Issue.3
, pp. 22-40
-
-
Aytes, K.1
Connolly, T.2
-
4
-
-
0001794061
-
On Risk Convenience, and Internet Shopping Behavior
-
November
-
Bhatnagar, A., Misra, S., and Rao, H.R. "On Risk Convenience, and Internet Shopping Behavior, " Communications of the ACM (43:11), November 2000, pp 98-105.
-
(2000)
Communications of the ACM
, vol.43
, Issue.11
, pp. 98-105
-
-
Bhatnagar, A.1
Misra, S.2
Rao, H.R.3
-
5
-
-
42149112876
-
Information Security and Risk Management
-
April
-
Bodin, L.D., Gordon, L.A., and Loeb, M.P. "Information Security and Risk Management, " Communications of ACM (51:4), April 2008.
-
(2008)
Communications of ACM
, vol.51
, pp. 4
-
-
Bodin, L.D.1
Gordon, L.A.2
Loeb, M.P.3
-
6
-
-
84863240847
-
Individual Risk Perception and Attitude towards Computer Security Risks
-
North Wales, UK
-
Chen, L.-C., and Farkas, D. "Individual Risk Perception and Attitude towards Computer Security Risks, " International conferences on Internet Technologies and Applications, North Wales, UK, 2009.
-
(2009)
International conferences on Internet Technologies and Applications
-
-
Chen, L.-C.1
Farkas, D.2
-
7
-
-
33750343605
-
-
(eds.), O'Reilly, Sebastopol, CA
-
Cranor, L.F., and Garfinkel, S. (eds.) Security and Usability. O'Reilly, Sebastopol, CA, 2005.
-
(2005)
Security and Usability
-
-
Cranor, L.F.1
Garfinkel, S.2
-
8
-
-
34748877099
-
Why Phishing Works
-
Montreal, Canada
-
Dhamija, R., Tygar, J.D., and Hearst, M. "Why Phishing Works, " in: ACM CHI, Montreal, Canada, 2006.
-
(2006)
ACM CHI
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
9
-
-
84863289185
-
Mental models of data privacy and security extracted from interviews with indians
-
New York, NY
-
Diesner, J., Kumaraguru, P., and Carley, K.M. "Mental models of data privacy and security extracted from interviews with indians, " 55th Annual Conference of the International Communication Association, New York, NY, 2005.
-
(2005)
55th Annual Conference of the International Communication Association
-
-
Diesner, J.1
Kumaraguru, P.2
Carley, K.M.3
-
10
-
-
42149158069
-
Behavioral Response to Phishing Risk
-
Pittsburgh, PA
-
Downs, J.S., Holbrook, M., and Cranor, L.F. "Behavioral Response to Phishing Risk, " in: APWG eCrime Researchers Summit, Pittsburgh, PA, 2007.
-
(2007)
APWG eCrime Researchers Summit
-
-
Downs, J.S.1
Holbrook, M.2
Cranor, L.F.3
-
11
-
-
0000418866
-
The Utility Analysis of Choices Involving Risk
-
August
-
Friedman, M., and Savage, L.J. "The Utility Analysis of Choices Involving Risk, " The Journal of Political Economy (56:4), August 1948, pp 279-304
-
(1948)
The Journal of Political Economy
, vol.56
, Issue.4
, pp. 279-304
-
-
Friedman, M.1
Savage, L.J.2
-
12
-
-
85076444426
-
Predicted and Observed User Behavior in the Weakest-Link Security Game
-
Psychology, and Security San Francisco, CA
-
Grossklags, J., Christin, N., and Chuang, J. "Predicted and Observed User Behavior in the Weakest-Link Security Game, " in: Usability, Psychology, and Security San Francisco, CA, 2008.
-
(2008)
Usability
-
-
Grossklags, J.1
Christin, N.2
Chuang, J.3
-
13
-
-
33646679400
-
To Download or Not to Download: An Examination of Computer Security Decision Making
-
May/June 32-27
-
Hardee, J.B., West, R., and Mayhorn, C.B. "To Download or Not to Download: An Examination of Computer Security Decision Making, " ACM Interactions), May/June 2006, pp 32-27.
-
(2006)
ACM Interactions)
-
-
Hardee, J.B.1
West, R.2
Mayhorn, C.B.3
-
14
-
-
84870382954
-
When 25 Cents is too much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information
-
Pittsburgh, PA
-
Jens Grossklags, A.A. "When 25 Cents is too much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information " Workshop on the Economics of Information Security, Pittsburgh, PA, 2007.
-
(2007)
Workshop on the Economics of Information Security
-
-
Jens Grossklags, A.A.1
-
15
-
-
0000125532
-
Prospect Theory: An Analysis of Decision under Risk
-
March
-
Kahneman, D., and Tversky, A. "Prospect Theory: An Analysis of Decision under Risk, " Econometrica (47:2), March 1979, pp 263-291.
-
(1979)
Econometrica
, vol.47
, Issue.2
, pp. 263-291
-
-
Kahneman, D.1
Tversky, A.2
-
16
-
-
84870329964
-
Risk Communication in Computer Security Using Mental Models
-
Trinidad/Tobago
-
Liu, D., Asgharpour, F., and Camp, L.J. "Risk Communication in Computer Security Using Mental Models, " Usable Security, Trinidad/Tobago, 2007.
-
(2007)
Usable Security
-
-
Liu, D.1
Asgharpour, F.2
Camp, L.J.3
-
17
-
-
0002597563
-
The Fall and Rise of Psychological Explanations in the Economics of Intertemporal Choice
-
G. Loewenstein and J. Elster (eds.), Russell Sage Foundation, New York
-
Loewenstein, G. "The Fall and Rise of Psychological Explanations in the Economics of Intertemporal Choice, " in: Choice over Time, G. Loewenstein and J. Elster (eds.), Russell Sage Foundation, New York, 1992.
-
(1992)
Choice over Time
-
-
Loewenstein, G.1
-
18
-
-
84960566726
-
Anomalies in Intertemporal Choice: Evidence and an Interpretation
-
May
-
Loewenstein, G., and Prelec, D. "Anomalies in Intertemporal Choice: Evidence and an Interpretation, " The Quarterly Journal of Economics (107:2), May 1992, pp 573-597.
-
(1992)
The Quarterly Journal of Economics
, vol.107
, Issue.2
, pp. 573-597
-
-
Loewenstein, G.1
Prelec, D.2
-
19
-
-
84863241940
-
Expected Utility Hypothesis
-
J. Eatwell, M. Milgate and P. Newman (eds.), W. W. Norton & Company
-
Machina, M.J. "Expected Utility Hypothesis, " in: Utility and Probability: Utility and Probability, J. Eatwell, M. Milgate and P. Newman (eds.), W. W. Norton & Company, 1990.
-
(1990)
Utility and Probability: Utility and Probability
-
-
McHina, M.J.1
-
20
-
-
0035587412
-
Consumer Perceptions of Privacy and Security Risks for Online Shopping
-
Miyazaki, A.D., and Fernadez, A. "Consumer Perceptions of Privacy and Security Risks for Online Shopping, " The Journal of Consumer Affairs (35:1) 2001, pp 27-44.
-
(2001)
The Journal of Consumer Affairs
, vol.35
, Issue.1
, pp. 27-44
-
-
Miyazaki, A.D.1
Fernadez, A.2
-
21
-
-
3042590367
-
Probing the Question of Technology-Induced Risk
-
November
-
Morgan, M.G. "Probing the Question of Technology-Induced Risk, " IEEE Spectrum (18:11), November 1981, pp 58-64.
-
(1981)
IEEE Spectrum
, vol.18
, Issue.11
, pp. 58-64
-
-
Morgan, M.G.1
-
22
-
-
0003750452
-
-
Cambridge University Press, Cambridge, UK
-
Morgon, M.G., Fischhoff, B., Bostrom, A., and Atman, C.J. Risk Communication: A Mental Models Approach Cambridge University Press, Cambridge, UK, 2001.
-
(2001)
Risk Communication: A Mental Models Approach
-
-
Morgon, M.G.1
Fischhoff, B.2
Bostrom, A.3
Atman, C.J.4
-
23
-
-
0002485160
-
Some Observations on Mental Models
-
D. Gentner and A. Stevens (eds.), LEA
-
Norman, D. "Some Observations on Mental Models, " in: Mental Models, D. Gentner and A. Stevens (eds.), LEA, 1983.
-
(1983)
Mental Models
-
-
Norman, D.1
-
24
-
-
17644399080
-
Risk Management Guide for Information Technology Systems
-
(ed.)
-
Stoneburner, G., Goguen, A., and Feringa, A. "Risk Management Guide for Information Technology Systems, " D.o.C. National Institute of Standards and Technology (ed.), 2002.
-
(2002)
D.o.C. National Institute of Standards and Technology
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
25
-
-
0019392722
-
The Framing of Decisions and the Psychology of Choice
-
Jan. 30
-
Tversky, A., and Kahneman, D. "The Framing of Decisions and the Psychology of Choice, " Science (211:4481), Jan. 30 1981, pp 453-458.
-
Science
, vol.211
, Issue.4481
, pp. 453-458
-
-
Tversky, A.1
Kahneman, D.2
-
26
-
-
31744450082
-
Advances in Prospect Theory: Cumulative Representation of Uncertainty
-
October
-
Tversky, A., and Kahneman, D. " Advances in Prospect Theory: Cumulative Representation of Uncertainty, " Journal of Risk and Uncertainty (5:4), October 1992, pp 297-323.
-
(1992)
Journal of Risk and Uncertainty
, vol.5
, Issue.4
, pp. 297-323
-
-
Tversky, A.1
Kahneman, D.2
-
27
-
-
0036394383
-
A domain-specific risk-attitude scale: Measuring risk perceptions and risk behaviors
-
October
-
Weber, E.U., Blais, A.-R., and Betz, N.E. "A domain-specific risk-attitude scale: measuring risk perceptions and risk behaviors, " Journal of Behavioral Decision Making (15:4), October 2002.
-
(2002)
Journal of Behavioral Decision Making
, vol.15
, Issue.4
-
-
Weber, E.U.1
Blais, A.-R.2
Betz, N.E.3
-
28
-
-
0032154218
-
Cross-Cultural Differences in Risk Perception, but Cross-Cultural Similarities in Attitudes towards Perceived Risk
-
September
-
Weber, E.U., and Hsee, C. "Cross-Cultural Differences in Risk Perception, but Cross-Cultural Similarities in Attitudes towards Perceived Risk, " Management Science (44:9), September 1998, pp 1205-1217.
-
(1998)
Management Science
, vol.44
, Issue.9
, pp. 1205-1217
-
-
Weber, E.U.1
Hsee, C.2
-
29
-
-
42149161709
-
The Psychology of Security
-
West, R. "The Psychology of Security, " Communications of ACM (51:4) 2008, pp 34-40.
-
(2008)
Communications of ACM
, vol.51
, Issue.4
, pp. 34-40
-
-
West, R.1
|