-
2
-
-
0036248592
-
Residual effects of past on later behaviour: Habituation and reasoned action perspectives
-
Ajzen, I. (2002) Residual effects of past on later behaviour: Habituation and reasoned action perspectives. Personality and Social Psychology Review 6 (2): 107-122.
-
(2002)
Personality and Social Psychology Review
, vol.6
, Issue.2
, pp. 107-122
-
-
Ajzen, I.1
-
3
-
-
80755135686
-
-
accessed 19 February 2009
-
Ajzen, I. (2006) Theory of planned behaviour, http://people.umass.edu/ aizen/index.html, accessed 19 February 2009.
-
(2006)
Theory of Planned Behaviour
-
-
Ajzen, I.1
-
5
-
-
37249036235
-
Prediction of goal-directed behavior: Attitudes, intentions, and perceived behavioral control
-
Ajzen, I. and Madden, T. J. (1986) Prediction of goal-directed behavior: Attitudes, intentions, and perceived behavioral control. Journal of Experimental Social Psychology 22 (5): 453-474.
-
(1986)
Journal of Experimental Social Psychology
, vol.22
, Issue.5
, pp. 453-474
-
-
Ajzen, I.1
Madden, T.J.2
-
6
-
-
84885893408
-
Dealing with the problem of cybercrime
-
4-6 October, Abu Dhabi
-
Alkaabi, A., Mohay, G. M., McCullagh, A. J. and Chantler, A. N. (2010) Dealing with the problem of cybercrime. In: Conference Proceedings of 2nd International ICST Conference on Digital Forensics & Cyber Crime, 4-6 October, Abu Dhabi.
-
(2010)
Conference Proceedings of 2nd International ICST Conference on Digital Forensics & Cyber Crime
-
-
Alkaabi, A.1
Mohay, G.M.2
McCullagh, A.J.3
Chantler, A.N.4
-
7
-
-
0035753278
-
Effi cacy of the theory of planned behavior: A meta-analytic review
-
Armitage, C. J. and Conner, M. (2001) Effi cacy of the theory of planned behavior: A meta-analytic review. British Journal of Social Psychology 40 (4): 471-499.
-
(2001)
British Journal of Social Psychology
, vol.40
, Issue.4
, pp. 471-499
-
-
Armitage, C.J.1
Conner, M.2
-
8
-
-
0023020183
-
The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations
-
Baron, R. M. and Kenny, D. A. (1986) The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology 51 (6): 1173-1182.
-
(1986)
Journal of Personality and Social Psychology
, vol.51
, Issue.6
, pp. 1173-1182
-
-
Baron, R.M.1
Kenny, D.A.2
-
9
-
-
0038469975
-
The interplay of cultural syndromes and personality in predicting life satisfaction
-
Benet-Mart í nez, V. and Karakitapoglu-Ayg ü n, Z. (2003) The interplay of cultural syndromes and personality in predicting life satisfaction. Journal of Cross-cultural Psychology 34 (1): 38-60.
-
(2003)
Journal of Cross-cultural Psychology
, vol.34
, Issue.1
, pp. 38-60
-
-
Benet-Martínez, V.1
Karakitapoglu-Aygün, Z.2
-
10
-
-
33846372664
-
Development of measures of online privacy concern and protection for use on the internet
-
Buchanan, T., Paine, C., Joinson, A. N. and Reips, U. (2007) Development of measures of online privacy concern and protection for use on the internet. Journal of the American Society for Information Science and Technology 58 (2): 157-165.
-
(2007)
Journal of the American Society for Information Science and Technology
, vol.58
, Issue.2
, pp. 157-165
-
-
Buchanan, T.1
Paine, C.2
Joinson, A.N.3
Reips, U.4
-
11
-
-
77955280007
-
Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience
-
Cho, H., Lee, J. S. and Chung, S. (2010) Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience. Computers in Human Behaviour 26 (5): 987-995.
-
(2010)
Computers in Human Behaviour
, vol.26
, Issue.5
, pp. 987-995
-
-
Cho, H.1
Lee, J.S.2
Chung, S.3
-
12
-
-
65449135623
-
A multinational study on online privacy: Global concerns and local responses
-
Cho, H., Rivera-Sanchez, M. and Lim, S. S. (2009) A multinational study on online privacy: Global concerns and local responses. New Media & Society 11 (3): 395-416.
-
(2009)
New Media & Society
, vol.11
, Issue.3
, pp. 395-416
-
-
Cho, H.1
Rivera-Sanchez, M.2
Lim, S.S.3
-
13
-
-
11944272254
-
A power primer
-
Cohen, J. A. (1992) A power primer. Psychological Bulletin 112 (1): 155-159.
-
(1992)
Psychological Bulletin
, vol.112
, Issue.1
, pp. 155-159
-
-
Cohen, J.A.1
-
14
-
-
67650318762
-
User behaviour towards protective information technologies: The role of national cultural differences
-
Dinev, T., Goo, J. M., Hu, Q. and Nam, K. (2009) User behaviour towards protective information technologies: The role of national cultural differences. Information Systems Journal 19 (4): 391-412.
-
(2009)
Information Systems Journal
, vol.19
, Issue.4
, pp. 391-412
-
-
Dinev, T.1
Goo, J.M.2
Hu, Q.3
Nam, K.4
-
15
-
-
49049114397
-
The centrality of awareness in the formation of user behavioral intention toward protective information technologies
-
Dinev, T. and Hu, Q. (2007) The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems 8 (7): 386-408.
-
(2007)
Journal of the Association for Information Systems
, vol.8
, Issue.7
, pp. 386-408
-
-
Dinev, T.1
Hu, Q.2
-
16
-
-
84958634296
-
Incentives in web studies: Methodological issues and a review
-
Goritz, A. S. (2006) Incentives in web studies: Methodological issues and a review. International Journal of Internet Science 1 (1): 58-70.
-
(2006)
International Journal of Internet Science
, vol.1
, Issue.1
, pp. 58-70
-
-
Goritz, A.S.1
-
17
-
-
80051936286
-
Security in the 21st century
-
Henson, B., Reyns, B. W. and Fisher, B. S. (2011) Security in the 21st century. Criminal Justice Review 36 (3): 253-268.
-
(2011)
Criminal Justice Review
, vol.36
, Issue.3
, pp. 253-268
-
-
Henson, B.1
Reyns, B.W.2
Fisher, B.S.3
-
20
-
-
84873464407
-
The internet and its opportunities for cybercrime
-
M. Herzog-Evans (ed.), Nijmegen: WLP
-
Koops, B. (2010) The internet and its opportunities for cybercrime. In: M. Herzog-Evans (ed.) Transnational Criminology Manual. Nijmegen: WLP, pp. 735-754.
-
(2010)
Transnational Criminology Manual
, pp. 735-754
-
-
Koops, B.1
-
22
-
-
56649104920
-
The taste for privacy: An analysis of college student privacy settings in an online social network
-
Lewis, K., Kaufman, J. and Christakis, N. (2008) The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computermediated Communication 14 (1): 79-100.
-
(2008)
Journal of Computermediated Communication
, vol.14
, Issue.1
, pp. 79-100
-
-
Lewis, K.1
Kaufman, J.2
Christakis, N.3
-
23
-
-
84862108053
-
Digitalizing crime prevention theories: How technology affects victim and offender behavior
-
Lewis, S. and Lewis, D. A. (2011) Digitalizing crime prevention theories: How technology affects victim and offender behavior. International Journal of Criminology and Sociological Theory 4 (2): 756-769.
-
(2011)
International Journal of Criminology and Sociological Theory
, vol.4
, Issue.2
, pp. 756-769
-
-
Lewis, S.1
Lewis, D.A.2
-
24
-
-
0346406657
-
Human identifi cation theory and the identity theft problem
-
LoPucki, L. M. (2001) Human identifi cation theory and the identity theft problem. Texas Law Review 80 (1): 89-135.
-
(2001)
Texas Law Review
, vol.80
, Issue.1
, pp. 89-135
-
-
Lopucki, L.M.1
-
25
-
-
3042808205
-
In search of golden rules: Comment on hypothesis-testing approaches to setting cutoff values for fi t indexes and dangers in overgeneralizing Hu and Bentler's (1999) fi ndings
-
Marsh, H. W., Hau, K. T. and Wen, Z. (2004) In search of golden rules: Comment on hypothesis-testing approaches to setting cutoff values for fi t indexes and dangers in overgeneralizing Hu and Bentler's (1999) fi ndings. Structural Equation Modeling 11 (3): 320-341.
-
(2004)
Structural Equation Modeling
, vol.11
, Issue.3
, pp. 320-341
-
-
Marsh, H.W.1
Hau, K.T.2
Wen, Z.3
-
26
-
-
77953707140
-
Building better Government IT: Understanding community beliefs and attitudes towards smart card technologies
-
Martin, N. and Rice, J. (2010) Building better Government IT: Understanding community beliefs and attitudes towards smart card technologies. Behaviour and Information Technology 29 (4): 433-444.
-
(2010)
Behaviour and Information Technology
, vol.29
, Issue.4
, pp. 433-444
-
-
Martin, N.1
Rice, J.2
-
27
-
-
80955163816
-
Cybercrime: Understanding and addressing the concerns of stakeholders
-
Martin, N. and Rice, J. (2011) Cybercrime: Understanding and addressing the concerns of stakeholders. Computers & Security 30 (8): 803-814.
-
(2011)
Computers & Security
, vol.30
, Issue.8
, pp. 803-814
-
-
Martin, N.1
Rice, J.2
-
28
-
-
4644261336
-
Public opinion and policy initiatives for online privacy protection
-
Metzger, M. and Docter, S. (2003) Public opinion and policy initiatives for online privacy protection. Journal of Broadcasting and Electronic Media 47 (3): 350-374.
-
(2003)
Journal of Broadcasting and Electronic Media
, vol.47
, Issue.3
, pp. 350-374
-
-
Metzger, M.1
Docter, S.2
-
29
-
-
4644366146
-
Strategies for reducing online privacy risks: Why consumers read (or don ' t read) online privacy notices
-
Milne, G. and Culnan, M. (2004) Strategies for reducing online privacy risks: Why consumers read (or don ' t read) online privacy notices. Journal of Interactive Marketing 18 (3): 15-29.
-
(2004)
Journal of Interactive Marketing
, vol.18
, Issue.3
, pp. 15-29
-
-
Milne, G.1
Culnan, M.2
-
30
-
-
10844290435
-
Consumers ' protection of online privacy and identity
-
Milne, G. R., Rohm, A. J. and Bahl, S. (2004) Consumers ' protection of online privacy and identity. Journal of Consumer Affairs 38 (2): 217-232.
-
(2004)
Journal of Consumer Affairs
, vol.38
, Issue.2
, pp. 217-232
-
-
Milne, G.R.1
Rohm, A.J.2
Bahl, S.3
-
31
-
-
0035587412
-
Consumer perceptions of privacy and security risks for online shopping
-
Miyazaki, A. D. and Fernandez, A. (2001) Consumer perceptions of privacy and security risks for online shopping. Journal of Consumer Affairs 35 (1): 27-44.
-
(2001)
Journal of Consumer Affairs
, vol.35
, Issue.1
, pp. 27-44
-
-
Miyazaki, A.D.1
Fernandez, A.2
-
32
-
-
84873443277
-
Cybercrime victimization: An examination of individual and situational level factors
-
Ngo, F. T. and Paternoster, R. (2011) Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology 5 (1): 773-793.
-
(2011)
International Journal of Cyber Criminology
, vol.5
, Issue.1
, pp. 773-793
-
-
Ngo, F.T.1
Paternoster, R.2
-
33
-
-
33847382472
-
The privacy paradox: Personal information disclosure intentions versus behaviours
-
Norberg, P. A., Horne, D. R. and Horne, D. A. (2007) The privacy paradox: Personal information disclosure intentions versus behaviours. Journal of Consumer Affairs 41 (1): 100-126.
-
(2007)
Journal of Consumer Affairs
, vol.41
, Issue.1
, pp. 100-126
-
-
Norberg, P.A.1
Horne, D.R.2
Horne, D.A.3
-
34
-
-
0035530890
-
Analysis of internet users ' level of online privacy concerns
-
O'Neil, D. (2001) Analysis of internet users ' level of online privacy concerns. Social Science Computer Review 19 (1): 17-31.
-
(2001)
Social Science Computer Review
, vol.19
, Issue.1
, pp. 17-31
-
-
O'Neil, D.1
-
35
-
-
0032385513
-
Habit and intention in everyday life: The multiple processes by which past behaviour predicts future behaviour
-
Ouellette, J. A. and Wood, W. (1998) Habit and intention in everyday life: The multiple processes by which past behaviour predicts future behaviour. Psychological Bulletin 124 (1): 54-74.
-
(1998)
Psychological Bulletin
, vol.124
, Issue.1
, pp. 54-74
-
-
Ouellette, J.A.1
Wood, W.2
-
37
-
-
77949590385
-
A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers
-
Reyns, B. W. (2010) A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers. Crime Prevention and Community Safety 12 (2): 99-118.
-
(2010)
Crime Prevention and Community Safety
, vol.12
, Issue.2
, pp. 99-118
-
-
Reyns, B.W.1
-
38
-
-
84878072805
-
Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses
-
published online 8 November. doi: 10.1177/0022427811425539
-
Reyns, B. W. (2011) Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, published online 8 November. doi: 10.1177/0022427811425539.
-
(2011)
Journal of Research in Crime and Delinquency
-
-
Reyns, B.W.1
-
39
-
-
0037330558
-
Modelling the theory of planned behaviour and past behaviour
-
Rhodes, R. E. and Courneya, K. S. (2003) Modelling the theory of planned behaviour and past behaviour. Psychology, Health and Medicine 8 (1): 57-68.
-
(2003)
Psychology, Health and Medicine
, vol.8
, Issue.1
, pp. 57-68
-
-
Rhodes, R.E.1
Courneya, K.S.2
-
41
-
-
84873474762
-
Cyber-victimisation
-
R. Luppicini and R. Adell (eds.), New York: Information Science Reference
-
Roberts, L. (2009a) Cyber-victimisation. In: R. Luppicini and R. Adell (eds.) Handbook of Research on Technoethics. New York: Information Science Reference, pp. 575-592.
-
(2009)
Handbook of Research on Technoethics
, pp. 575-592
-
-
Roberts, L.1
-
42
-
-
84873473421
-
Cyber identity theft
-
R. Luppicini and R. Adell (eds.), New York: Information Science Reference
-
Roberts, L. (2009b) Cyber identity theft. In: R. Luppicini and R. Adell (eds.) Handbook of Research on Technoethics. New York: Information Science Reference, pp. 542-557.
-
(2009)
Handbook of Research on Technoethics
, pp. 542-557
-
-
Roberts, L.1
-
44
-
-
0347021055
-
Exploring the psychological and somatic impact of identity theft
-
Sharp, T., Shreve-Neiger, A., Fremouw, W., Kane, J. and Hutton, S. (2004) Exploring the psychological and somatic impact of identity theft. Journal of Forensic Sciences 49 (1): 131-136.
-
(2004)
Journal of Forensic Sciences
, vol.49
, Issue.1
, pp. 131-136
-
-
Sharp, T.1
Shreve-Neiger, A.2
Fremouw, W.3
Kane, J.4
Hutton, S.5
-
45
-
-
0009946245
-
An investigation of gender differences in online privacy concerns and resultant behaviours
-
Sheehan, K. B. (1999) An investigation of gender differences in online privacy concerns and resultant behaviours. Journal of Interactive Marketing 13 (4): 24-38.
-
(1999)
Journal of Interactive Marketing
, vol.13
, Issue.4
, pp. 24-38
-
-
Sheehan, K.B.1
-
46
-
-
0033242014
-
Does the temporal stability of behavioral intentions moderate intention-behavior and past behavior-future behavior relations?
-
Sheeran, P., Orbell, S. and Trafi mow, D. (1999) Does the temporal stability of behavioral intentions moderate intention-behavior and past behavior-future behavior relations? Personality and Social Psychology Bulletin 25 (6): 724-734.
-
(1999)
Personality and Social Psychology Bulletin
, vol.25
, Issue.6
, pp. 724-734
-
-
Sheeran, P.1
Orbell, S.2
Trafimow, D.3
-
48
-
-
52749096686
-
Predicting self-protections of online privacy
-
Yao, M. Z. and Linz, D. G. (2008) Predicting self-protections of online privacy. CyberPsychology and Behaviour 11 (5): 615-617.
-
(2008)
CyberPsychology and Behaviour
, vol.11
, Issue.5
, pp. 615-617
-
-
Yao, M.Z.1
Linz, D.G.2
-
49
-
-
33947397191
-
Predicting user concerns about online privacy
-
Yao, M. Z., Rice, R. E. and Wallis, K. (2007) Predicting user concerns about online privacy. Journal of the American Society for Information Science and Technology 58 (5): 710-722.
-
(2007)
Journal of the American Society for Information Science and Technology
, vol.58
, Issue.5
, pp. 710-722
-
-
Yao, M.Z.1
Rice, R.E.2
Wallis, K.3
|