메뉴 건너뛰기




Volumn 15, Issue 1, 2013, Pages 48-64

Applying the Theory of Planned Behaviour to predicting online safety behaviour

Author keywords

Cyber identity theft; Cyber victimization; Cybercrime; Online privacy; Protective behaviours; Theory of Planned Behaviour

Indexed keywords


EID: 84873421010     PISSN: 14603780     EISSN: 17434629     Source Type: Journal    
DOI: 10.1057/cpcs.2012.13     Document Type: Article
Times cited : (47)

References (49)
  • 2
    • 0036248592 scopus 로고    scopus 로고
    • Residual effects of past on later behaviour: Habituation and reasoned action perspectives
    • Ajzen, I. (2002) Residual effects of past on later behaviour: Habituation and reasoned action perspectives. Personality and Social Psychology Review 6 (2): 107-122.
    • (2002) Personality and Social Psychology Review , vol.6 , Issue.2 , pp. 107-122
    • Ajzen, I.1
  • 3
    • 80755135686 scopus 로고    scopus 로고
    • accessed 19 February 2009
    • Ajzen, I. (2006) Theory of planned behaviour, http://people.umass.edu/ aizen/index.html, accessed 19 February 2009.
    • (2006) Theory of Planned Behaviour
    • Ajzen, I.1
  • 5
    • 37249036235 scopus 로고
    • Prediction of goal-directed behavior: Attitudes, intentions, and perceived behavioral control
    • Ajzen, I. and Madden, T. J. (1986) Prediction of goal-directed behavior: Attitudes, intentions, and perceived behavioral control. Journal of Experimental Social Psychology 22 (5): 453-474.
    • (1986) Journal of Experimental Social Psychology , vol.22 , Issue.5 , pp. 453-474
    • Ajzen, I.1    Madden, T.J.2
  • 7
    • 0035753278 scopus 로고    scopus 로고
    • Effi cacy of the theory of planned behavior: A meta-analytic review
    • Armitage, C. J. and Conner, M. (2001) Effi cacy of the theory of planned behavior: A meta-analytic review. British Journal of Social Psychology 40 (4): 471-499.
    • (2001) British Journal of Social Psychology , vol.40 , Issue.4 , pp. 471-499
    • Armitage, C.J.1    Conner, M.2
  • 8
    • 0023020183 scopus 로고
    • The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations
    • Baron, R. M. and Kenny, D. A. (1986) The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology 51 (6): 1173-1182.
    • (1986) Journal of Personality and Social Psychology , vol.51 , Issue.6 , pp. 1173-1182
    • Baron, R.M.1    Kenny, D.A.2
  • 9
    • 0038469975 scopus 로고    scopus 로고
    • The interplay of cultural syndromes and personality in predicting life satisfaction
    • Benet-Mart í nez, V. and Karakitapoglu-Ayg ü n, Z. (2003) The interplay of cultural syndromes and personality in predicting life satisfaction. Journal of Cross-cultural Psychology 34 (1): 38-60.
    • (2003) Journal of Cross-cultural Psychology , vol.34 , Issue.1 , pp. 38-60
    • Benet-Martínez, V.1    Karakitapoglu-Aygün, Z.2
  • 11
    • 77955280007 scopus 로고    scopus 로고
    • Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience
    • Cho, H., Lee, J. S. and Chung, S. (2010) Optimistic bias about online privacy risks: Testing the moderating effects of perceived controllability and prior experience. Computers in Human Behaviour 26 (5): 987-995.
    • (2010) Computers in Human Behaviour , vol.26 , Issue.5 , pp. 987-995
    • Cho, H.1    Lee, J.S.2    Chung, S.3
  • 12
    • 65449135623 scopus 로고    scopus 로고
    • A multinational study on online privacy: Global concerns and local responses
    • Cho, H., Rivera-Sanchez, M. and Lim, S. S. (2009) A multinational study on online privacy: Global concerns and local responses. New Media & Society 11 (3): 395-416.
    • (2009) New Media & Society , vol.11 , Issue.3 , pp. 395-416
    • Cho, H.1    Rivera-Sanchez, M.2    Lim, S.S.3
  • 13
    • 11944272254 scopus 로고
    • A power primer
    • Cohen, J. A. (1992) A power primer. Psychological Bulletin 112 (1): 155-159.
    • (1992) Psychological Bulletin , vol.112 , Issue.1 , pp. 155-159
    • Cohen, J.A.1
  • 14
    • 67650318762 scopus 로고    scopus 로고
    • User behaviour towards protective information technologies: The role of national cultural differences
    • Dinev, T., Goo, J. M., Hu, Q. and Nam, K. (2009) User behaviour towards protective information technologies: The role of national cultural differences. Information Systems Journal 19 (4): 391-412.
    • (2009) Information Systems Journal , vol.19 , Issue.4 , pp. 391-412
    • Dinev, T.1    Goo, J.M.2    Hu, Q.3    Nam, K.4
  • 15
    • 49049114397 scopus 로고    scopus 로고
    • The centrality of awareness in the formation of user behavioral intention toward protective information technologies
    • Dinev, T. and Hu, Q. (2007) The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems 8 (7): 386-408.
    • (2007) Journal of the Association for Information Systems , vol.8 , Issue.7 , pp. 386-408
    • Dinev, T.1    Hu, Q.2
  • 16
    • 84958634296 scopus 로고    scopus 로고
    • Incentives in web studies: Methodological issues and a review
    • Goritz, A. S. (2006) Incentives in web studies: Methodological issues and a review. International Journal of Internet Science 1 (1): 58-70.
    • (2006) International Journal of Internet Science , vol.1 , Issue.1 , pp. 58-70
    • Goritz, A.S.1
  • 20
    • 84873464407 scopus 로고    scopus 로고
    • The internet and its opportunities for cybercrime
    • M. Herzog-Evans (ed.), Nijmegen: WLP
    • Koops, B. (2010) The internet and its opportunities for cybercrime. In: M. Herzog-Evans (ed.) Transnational Criminology Manual. Nijmegen: WLP, pp. 735-754.
    • (2010) Transnational Criminology Manual , pp. 735-754
    • Koops, B.1
  • 22
    • 56649104920 scopus 로고    scopus 로고
    • The taste for privacy: An analysis of college student privacy settings in an online social network
    • Lewis, K., Kaufman, J. and Christakis, N. (2008) The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computermediated Communication 14 (1): 79-100.
    • (2008) Journal of Computermediated Communication , vol.14 , Issue.1 , pp. 79-100
    • Lewis, K.1    Kaufman, J.2    Christakis, N.3
  • 23
    • 84862108053 scopus 로고    scopus 로고
    • Digitalizing crime prevention theories: How technology affects victim and offender behavior
    • Lewis, S. and Lewis, D. A. (2011) Digitalizing crime prevention theories: How technology affects victim and offender behavior. International Journal of Criminology and Sociological Theory 4 (2): 756-769.
    • (2011) International Journal of Criminology and Sociological Theory , vol.4 , Issue.2 , pp. 756-769
    • Lewis, S.1    Lewis, D.A.2
  • 24
    • 0346406657 scopus 로고    scopus 로고
    • Human identifi cation theory and the identity theft problem
    • LoPucki, L. M. (2001) Human identifi cation theory and the identity theft problem. Texas Law Review 80 (1): 89-135.
    • (2001) Texas Law Review , vol.80 , Issue.1 , pp. 89-135
    • Lopucki, L.M.1
  • 25
    • 3042808205 scopus 로고    scopus 로고
    • In search of golden rules: Comment on hypothesis-testing approaches to setting cutoff values for fi t indexes and dangers in overgeneralizing Hu and Bentler's (1999) fi ndings
    • Marsh, H. W., Hau, K. T. and Wen, Z. (2004) In search of golden rules: Comment on hypothesis-testing approaches to setting cutoff values for fi t indexes and dangers in overgeneralizing Hu and Bentler's (1999) fi ndings. Structural Equation Modeling 11 (3): 320-341.
    • (2004) Structural Equation Modeling , vol.11 , Issue.3 , pp. 320-341
    • Marsh, H.W.1    Hau, K.T.2    Wen, Z.3
  • 26
    • 77953707140 scopus 로고    scopus 로고
    • Building better Government IT: Understanding community beliefs and attitudes towards smart card technologies
    • Martin, N. and Rice, J. (2010) Building better Government IT: Understanding community beliefs and attitudes towards smart card technologies. Behaviour and Information Technology 29 (4): 433-444.
    • (2010) Behaviour and Information Technology , vol.29 , Issue.4 , pp. 433-444
    • Martin, N.1    Rice, J.2
  • 27
    • 80955163816 scopus 로고    scopus 로고
    • Cybercrime: Understanding and addressing the concerns of stakeholders
    • Martin, N. and Rice, J. (2011) Cybercrime: Understanding and addressing the concerns of stakeholders. Computers & Security 30 (8): 803-814.
    • (2011) Computers & Security , vol.30 , Issue.8 , pp. 803-814
    • Martin, N.1    Rice, J.2
  • 28
    • 4644261336 scopus 로고    scopus 로고
    • Public opinion and policy initiatives for online privacy protection
    • Metzger, M. and Docter, S. (2003) Public opinion and policy initiatives for online privacy protection. Journal of Broadcasting and Electronic Media 47 (3): 350-374.
    • (2003) Journal of Broadcasting and Electronic Media , vol.47 , Issue.3 , pp. 350-374
    • Metzger, M.1    Docter, S.2
  • 29
    • 4644366146 scopus 로고    scopus 로고
    • Strategies for reducing online privacy risks: Why consumers read (or don ' t read) online privacy notices
    • Milne, G. and Culnan, M. (2004) Strategies for reducing online privacy risks: Why consumers read (or don ' t read) online privacy notices. Journal of Interactive Marketing 18 (3): 15-29.
    • (2004) Journal of Interactive Marketing , vol.18 , Issue.3 , pp. 15-29
    • Milne, G.1    Culnan, M.2
  • 30
    • 10844290435 scopus 로고    scopus 로고
    • Consumers ' protection of online privacy and identity
    • Milne, G. R., Rohm, A. J. and Bahl, S. (2004) Consumers ' protection of online privacy and identity. Journal of Consumer Affairs 38 (2): 217-232.
    • (2004) Journal of Consumer Affairs , vol.38 , Issue.2 , pp. 217-232
    • Milne, G.R.1    Rohm, A.J.2    Bahl, S.3
  • 31
    • 0035587412 scopus 로고    scopus 로고
    • Consumer perceptions of privacy and security risks for online shopping
    • Miyazaki, A. D. and Fernandez, A. (2001) Consumer perceptions of privacy and security risks for online shopping. Journal of Consumer Affairs 35 (1): 27-44.
    • (2001) Journal of Consumer Affairs , vol.35 , Issue.1 , pp. 27-44
    • Miyazaki, A.D.1    Fernandez, A.2
  • 32
    • 84873443277 scopus 로고    scopus 로고
    • Cybercrime victimization: An examination of individual and situational level factors
    • Ngo, F. T. and Paternoster, R. (2011) Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology 5 (1): 773-793.
    • (2011) International Journal of Cyber Criminology , vol.5 , Issue.1 , pp. 773-793
    • Ngo, F.T.1    Paternoster, R.2
  • 33
    • 33847382472 scopus 로고    scopus 로고
    • The privacy paradox: Personal information disclosure intentions versus behaviours
    • Norberg, P. A., Horne, D. R. and Horne, D. A. (2007) The privacy paradox: Personal information disclosure intentions versus behaviours. Journal of Consumer Affairs 41 (1): 100-126.
    • (2007) Journal of Consumer Affairs , vol.41 , Issue.1 , pp. 100-126
    • Norberg, P.A.1    Horne, D.R.2    Horne, D.A.3
  • 34
    • 0035530890 scopus 로고    scopus 로고
    • Analysis of internet users ' level of online privacy concerns
    • O'Neil, D. (2001) Analysis of internet users ' level of online privacy concerns. Social Science Computer Review 19 (1): 17-31.
    • (2001) Social Science Computer Review , vol.19 , Issue.1 , pp. 17-31
    • O'Neil, D.1
  • 35
    • 0032385513 scopus 로고    scopus 로고
    • Habit and intention in everyday life: The multiple processes by which past behaviour predicts future behaviour
    • Ouellette, J. A. and Wood, W. (1998) Habit and intention in everyday life: The multiple processes by which past behaviour predicts future behaviour. Psychological Bulletin 124 (1): 54-74.
    • (1998) Psychological Bulletin , vol.124 , Issue.1 , pp. 54-74
    • Ouellette, J.A.1    Wood, W.2
  • 37
    • 77949590385 scopus 로고    scopus 로고
    • A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers
    • Reyns, B. W. (2010) A situational crime prevention approach to cyberstalking victimization: Preventive tactics for Internet users and online place managers. Crime Prevention and Community Safety 12 (2): 99-118.
    • (2010) Crime Prevention and Community Safety , vol.12 , Issue.2 , pp. 99-118
    • Reyns, B.W.1
  • 38
    • 84878072805 scopus 로고    scopus 로고
    • Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses
    • published online 8 November. doi: 10.1177/0022427811425539
    • Reyns, B. W. (2011) Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses. Journal of Research in Crime and Delinquency, published online 8 November. doi: 10.1177/0022427811425539.
    • (2011) Journal of Research in Crime and Delinquency
    • Reyns, B.W.1
  • 39
    • 0037330558 scopus 로고    scopus 로고
    • Modelling the theory of planned behaviour and past behaviour
    • Rhodes, R. E. and Courneya, K. S. (2003) Modelling the theory of planned behaviour and past behaviour. Psychology, Health and Medicine 8 (1): 57-68.
    • (2003) Psychology, Health and Medicine , vol.8 , Issue.1 , pp. 57-68
    • Rhodes, R.E.1    Courneya, K.S.2
  • 41
    • 84873474762 scopus 로고    scopus 로고
    • Cyber-victimisation
    • R. Luppicini and R. Adell (eds.), New York: Information Science Reference
    • Roberts, L. (2009a) Cyber-victimisation. In: R. Luppicini and R. Adell (eds.) Handbook of Research on Technoethics. New York: Information Science Reference, pp. 575-592.
    • (2009) Handbook of Research on Technoethics , pp. 575-592
    • Roberts, L.1
  • 42
    • 84873473421 scopus 로고    scopus 로고
    • Cyber identity theft
    • R. Luppicini and R. Adell (eds.), New York: Information Science Reference
    • Roberts, L. (2009b) Cyber identity theft. In: R. Luppicini and R. Adell (eds.) Handbook of Research on Technoethics. New York: Information Science Reference, pp. 542-557.
    • (2009) Handbook of Research on Technoethics , pp. 542-557
    • Roberts, L.1
  • 45
    • 0009946245 scopus 로고    scopus 로고
    • An investigation of gender differences in online privacy concerns and resultant behaviours
    • Sheehan, K. B. (1999) An investigation of gender differences in online privacy concerns and resultant behaviours. Journal of Interactive Marketing 13 (4): 24-38.
    • (1999) Journal of Interactive Marketing , vol.13 , Issue.4 , pp. 24-38
    • Sheehan, K.B.1
  • 46
    • 0033242014 scopus 로고    scopus 로고
    • Does the temporal stability of behavioral intentions moderate intention-behavior and past behavior-future behavior relations?
    • Sheeran, P., Orbell, S. and Trafi mow, D. (1999) Does the temporal stability of behavioral intentions moderate intention-behavior and past behavior-future behavior relations? Personality and Social Psychology Bulletin 25 (6): 724-734.
    • (1999) Personality and Social Psychology Bulletin , vol.25 , Issue.6 , pp. 724-734
    • Sheeran, P.1    Orbell, S.2    Trafimow, D.3
  • 48
    • 52749096686 scopus 로고    scopus 로고
    • Predicting self-protections of online privacy
    • Yao, M. Z. and Linz, D. G. (2008) Predicting self-protections of online privacy. CyberPsychology and Behaviour 11 (5): 615-617.
    • (2008) CyberPsychology and Behaviour , vol.11 , Issue.5 , pp. 615-617
    • Yao, M.Z.1    Linz, D.G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.