-
2
-
-
0002571450
-
Field research methods: Interviewing, questionnaires, participant observation, systematic observation, unobtrusive measures
-
T. Bouchard, "Field research methods: Interviewing, questionnaires, participant observation, systematic observation, unobtrusive measures", Handbook of industrial and organizational psychology (1976), pp. 363-413.
-
(1976)
Handbook of Industrial and Organizational Psychology
, pp. 363-413
-
-
Bouchard, T.1
-
3
-
-
9744260316
-
Validation in information systems research: A state-ofthe-art assessment
-
M.-C. Boudreau, D. Gefen and D. W. Straub, "Validation in Information Systems Research: A State-ofthe-Art Assessment", MIS Quarterly, 25 (2001), pp. 1-16.
-
(2001)
MIS Quarterly
, vol.25
, pp. 1-16
-
-
Boudreau, M.-C.1
Gefen, D.2
Straub, D.W.3
-
4
-
-
80053556855
-
-
M. Burnett and D. Kleiman, "Perfect Passwords: Selection, Protection, Authentication", (2006), pp. 53-59.
-
(2006)
Perfect Passwords: Selection, Protection, Authentication
, pp. 53-59
-
-
Burnett, M.1
Kleiman, D.2
-
5
-
-
0001698113
-
Designing research for application
-
B. Calder, L. Phillips and A. M. Tybout, "Designing research for application", Journal of Consumer Research, 8 (1981), pp. 197-207.
-
(1981)
Journal of Consumer Research
, vol.8
, pp. 197-207
-
-
Calder, B.1
Phillips, L.2
Tybout, A.M.3
-
8
-
-
35348884906
-
A large-scale study of web password habits
-
ACM Press, New York, New York, USA
-
D. Florencio and C. Herley, A large-scale study of web password habits, Proceedings of the 16th international conference on World Wide Web - WWW '07, ACM Press, New York, New York, USA, 2007, pp. 657.
-
(2007)
Proceedings of the 16th International Conference on World Wide Web - WWW '07
, pp. 657
-
-
Florencio, D.1
Herley, C.2
-
9
-
-
70349973978
-
-
H. Oinas-Kukkonen, P. Hasle, M. Harjumaa, K. Segerståhl and P. Øhrstr øm, eds., Springer Berlin /Heidelberg
-
A. Forget, S. Chiasson, P. van Oorschot and R. Biddle, Persuasion for Stronger Passwords: Motivation and Pilot Study, in H. Oinas-Kukkonen, P. Hasle, M. Harjumaa, K. Segerståhl and P. Øhrstr øm, eds., Springer Berlin /Heidelberg, 2008, pp. 140-150.
-
(2008)
Persuasion for Stronger Passwords: Motivation and Pilot Study
, pp. 140-150
-
-
Forget, A.1
Chiasson, S.2
Van Oorschot, P.3
Biddle, R.4
-
11
-
-
36549049369
-
An assessment of website password practices
-
S. Furnell, "An assessment of website password practices", Computers & Security, 26 (2007), pp. 445-451.
-
(2007)
Computers & Security
, vol.26
, pp. 445-451
-
-
Furnell, S.1
-
12
-
-
30344471401
-
Flow in human-computer interactions: Test of a model
-
J. M. Carey, ed., Ablex Publishing Copr., Norwood, NJ, USA
-
J. Ghani, Flow in human-computer interactions: test of a model, in J. M. Carey, ed., Human Factors in Information Systems, Ablex Publishing Copr., Norwood, NJ, USA, 1995, pp. 291 - 311.
-
(1995)
Human Factors in Information Systems
, pp. 291-311
-
-
Ghani, J.1
-
13
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
T. Herath and H. R. Rao, "Protection motivation and deterrence: a framework for security policy compliance in organisations", European Journal of Information, 18 (2009), pp. 106-125.
-
(2009)
European Journal of Information
, vol.18
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
14
-
-
77950877250
-
So long, and no thanks for the externalities: The rational rejection of security advice by users
-
C. Herley, "So long, and no thanks for the externalities: the rational rejection of security advice by users", Proceedings of the 2009 workshop on New security (2009).
-
(2009)
Proceedings of the 2009 Workshop on New Security
-
-
Herley, C.1
-
17
-
-
79952018667
-
-
Imperva, Imperva Application Defense Center
-
Imperva, Consumer Password Worst Practices, Imperva Application Defense Center, 2010, pp. 1-5.
-
(2010)
Consumer Password Worst Practices
, pp. 1-5
-
-
-
18
-
-
61349088058
-
Research note investigating the influence of the functional mechanisms of online product presentations
-
Z. Jiang and I. Benbasat, "Research Note Investigating the Influence of the Functional Mechanisms of Online Product Presentations", Information Systems Research, 18 (2007), pp. 454-470.
-
(2007)
Information Systems Research
, vol.18
, pp. 454-470
-
-
Jiang, Z.1
Benbasat, I.2
-
19
-
-
77957057727
-
Fear appeals and information security behaviors: An empirical study
-
A. C. Johnston and M. Warkentin, "Fear Appeals and Information Security Behaviors: An Empirical Study", MIS Quarterly, 34 (2010), pp. 549-566.
-
(2010)
MIS Quarterly
, vol.34
, pp. 549-566
-
-
Johnston, A.C.1
Warkentin, M.2
-
20
-
-
84875506640
-
Persuasive communication strategies: Assessing the fit between organizational identification and fear appeal message orientation
-
A. C. Johnston and M. Warkentin, Persuasive Communication Strategies: Assessing the Fit Between Organizational Identification and Fear Appeal Message Orientation, The Dewald Roode Information Security Workshop, IFIP WG 8.11/11.13, 2010, pp. 128-154.
-
(2010)
The Dewald Roode Information Security Workshop, IFIP WG 8.11/11.13
, pp. 128-154
-
-
Johnston, A.C.1
Warkentin, M.2
-
23
-
-
84866773732
-
Arousal theory and the religiosity-criminality relationship
-
L. J. Siegel and P. Cordella, eds., Northeastern University Press, Boston
-
E. Lee, Arousal Theory and the religiosity-Criminality Relationship, in L. J. Siegel and P. Cordella, eds., Contemporary Criminology Theory, Northeastern University Press, Boston, 1996, pp. 65-84.
-
(1996)
Contemporary Criminology Theory
, pp. 65-84
-
-
Lee, E.1
-
25
-
-
84965874692
-
Dilemmatics: The study of research choices and dilemmas
-
J. E. McGrath, "Dilemmatics: The Study of Research Choices and Dilemmas", American Behavioral Scientist, 25 (1981), pp. 179-210.
-
(1981)
American Behavioral Scientist
, vol.25
, pp. 179-210
-
-
McGrath, J.E.1
-
28
-
-
0034340409
-
Measuring the flow construct in online environments: A structural modeling approach
-
T. Novak, D. Hoffman and Y. Yung, "Measuring the Flow Construct in Online Environments: A Structural Modeling Approach", Marketing Science, 19 (2000), pp. 22 - 44.
-
(2000)
Marketing Science
, vol.19
, pp. 22-44
-
-
Novak, T.1
Hoffman, D.2
Yung, Y.3
-
29
-
-
0002247369
-
Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation
-
R. Rogers, "{Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation}", Social psychophysiology (1983), pp. 153 - 176.
-
(1983)
Social Psychophysiology
, pp. 153-176
-
-
Rogers, R.1
-
30
-
-
0001840352
-
A protection motivation theory of fear appeals and attitude change1
-
R. W. Rogers, "A Protection Motivation Theory of Fear Appeals and Attitude Change1", The Journal of Psychology, 91 (1975), pp. 93-114.
-
(1975)
The Journal of Psychology
, vol.91
, pp. 93-114
-
-
Rogers, R.W.1
-
32
-
-
84985084394
-
Defining virtual reality: Dimensions determining telepresence
-
J. Steuer, "Defining Virtual Reality: Dimensions Determining Telepresence", Journal of Communication, 42 (1992), pp. 73-93.
-
(1992)
Journal of Communication
, vol.42
, pp. 73-93
-
-
Steuer, J.1
-
33
-
-
13244286108
-
Validation guidelines for is positivist research
-
D. Straub, M.-C. Boudreau and D. Gefen, "Validation Guidelines for IS Positivist Research", Communications of the Association for Information Systems, 13 (2004), pp. 380-427.
-
(2004)
Communications of the Association for Information Systems
, vol.13
, pp. 380-427
-
-
Straub, D.1
Boudreau, M.-C.2
Gefen, D.3
-
34
-
-
0141463342
-
Deterring cheating by student programmers: A field experiment in computer security
-
D. Straub, P. Carlson and E. Jones, "Deterring cheating by student programmers: A field experiment in computer security", Journal of Management Systems, 5 (1993), pp. 33-48.
-
(1993)
Journal of Management Systems
, vol.5
, pp. 33-48
-
-
Straub, D.1
Carlson, P.2
Jones, E.3
-
35
-
-
84965761590
-
Flow in computer-mediated communication: Electronic mail and voice mail evaluation and impacts
-
L. K. Trevino and J. Webster, "Flow in Computer-Mediated Communication: Electronic Mail and Voice Mail Evaluation and Impacts", Communication Research, 19 (1992), pp. 539-573.
-
(1992)
Communication Research
, vol.19
, pp. 539-573
-
-
Trevino, L.K.1
Webster, J.2
-
36
-
-
84875496175
-
-
Trusteer, Trusteer, New York, New York, USA
-
Trusteer, Reused Login Credentials, Trusteer, New York, New York, USA, 2010.
-
(2010)
Reused Login Credentials
-
-
-
38
-
-
84861093724
-
Motivating IS security compliance: Insights from habit and protection motivation theory
-
A. Vance, M. Siponen and S. Pahnila, "Motivating IS security compliance: Insights from Habit and Protection Motivation Theory", Information & Management, 49 (2012), pp. 190-198.
-
(2012)
Information & Management
, vol.49
, pp. 190-198
-
-
Vance, A.1
Siponen, M.2
Pahnila, S.3
-
39
-
-
0242708745
-
Pretty good persuasion
-
ACM Press, New York, New York, USA
-
D. Weirich and M. A. Sasse, Pretty good persuasion, Proceedings of the 2001 workshop on New security paradigms - NSPW '01, ACM Press, New York, New York, USA, 2001, pp. 137.
-
(2001)
Proceedings of the 2001 Workshop on New Security Paradigms - NSPW '01
, pp. 137
-
-
Weirich, D.1
Sasse, M.A.2
-
41
-
-
84941646855
-
Putting the fear back into fear appeals: The extended parallel process model
-
K. Witte, "Putting the fear back into fear appeals: The extended parallel process model", Communications Monographs (1992).
-
(1992)
Communications Monographs
-
-
Witte, K.1
-
42
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
M. Workman, W. Bommer and D. Straub, "Security lapses and the omission of information security measures: A threat control model and empirical test", Computers in Human Behavior, 24 (2008), pp. 2799-2816.
-
(2008)
Computers in Human Behavior
, vol.24
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.2
Straub, D.3
-
43
-
-
12844275960
-
Password memorability and security: Empirical results
-
J. Yan, A. Blackwell, R. Anderson and A. Grant, "Password memorability and security: empirical results", IEEE Security & Privacy Magazine, 2 (2004), pp. 25-31.
-
(2004)
IEEE Security & Privacy Magazine
, vol.2
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
44
-
-
67650156801
-
Improving multiple-password recall: An empirical study
-
J. Zhang, X. Luo, S. Akkaladevi and J. Ziegelmayer, "Improving multiple-password recall: an empirical study", European Journal of Information Systems, 18 (2009), pp. 165-176.
-
(2009)
European Journal of Information Systems
, vol.18
, pp. 165-176
-
-
Zhang, J.1
Luo, X.2
Akkaladevi, S.3
Ziegelmayer, J.4
|