-
2
-
-
19744380329
-
Spamming, phishing, authentication, and privacy
-
Bellovin, S.M. (2004) Spamming, phishing, authentication, and privacy. Communications of the ACM, 47, 144-144.
-
(2004)
Communications of the ACM
, vol.47
, pp. 144-144
-
-
Bellovin, S.M.1
-
3
-
-
0002042337
-
Issues and opinion on structure equation modeling
-
Chin, W.W. (1998) Issues and opinion on structure equation modeling. MIS Quarterly, 22, vii-xvi.
-
(1998)
MIS Quarterly
, vol.22
, pp. 7-16
-
-
Chin, W.W.1
-
4
-
-
60049095429
-
Knowing is doing: an empirical validation of the relationship between managerial information security awareness and action
-
Choi, N., Kim, D., Goo, J. & Whitmore, A. (2008) Knowing is doing: an empirical validation of the relationship between managerial information security awareness and action. Information Management & Computer Security, 16, 484-501.
-
(2008)
Information Management & Computer Security
, vol.16
, pp. 484-501
-
-
Choi, N.1
Kim, D.2
Goo, J.3
Whitmore, A.4
-
5
-
-
0001960725
-
Test validation
-
Thorndike, R.L. (ed.) American Council on Education, Washington, DC, USA.
-
Cronbach, L.J. (1971) Test validation. In: Educational Measurement (2nd Edition), Thorndike, R.L. (ed.), pp. 443-507. American Council on Education, Washington, DC, USA.
-
(1971)
Educational Measurement (2nd Edition)
, pp. 443-507
-
-
Cronbach, L.J.1
-
6
-
-
55249087535
-
Perceived usefulness, perceived ease of use and user acceptance of information technology
-
Davis, F.D. (1989) Perceived usefulness, perceived ease of use and user acceptance of information technology. MIS Quarterly, 13, 319-340.
-
(1989)
MIS Quarterly
, vol.13
, pp. 319-340
-
-
Davis, F.D.1
-
7
-
-
84936823933
-
User acceptance of computer technology: a comparison of two theoretical models
-
Davis, F.D., Bagozzi, R.P. & Warshaw, P.R. (1989) User acceptance of computer technology: a comparison of two theoretical models. Management Science, 35, 982-1002.
-
(1989)
Management Science
, vol.35
, pp. 982-1002
-
-
Davis, F.D.1
Bagozzi, R.P.2
Warshaw, P.R.3
-
8
-
-
33645133251
-
An extended privacy calculus model for e-commerce transactions
-
Dinev, T. & Hart, P. (2006) An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17, 61-80.
-
(2006)
Information Systems Research
, vol.17
, pp. 61-80
-
-
Dinev, T.1
Hart, P.2
-
9
-
-
23844486347
-
In search of coherence: a review of e-mail research
-
Ducheneaut, N. & Watts, L.A. (2005) In search of coherence: a review of e-mail research. Human-Computer Interaction, 20, 11-48.
-
(2005)
Human-Computer Interaction
, vol.20
, pp. 11-48
-
-
Ducheneaut, N.1
Watts, L.A.2
-
10
-
-
0036206977
-
An investigation of the determinants of investment risk behavior in employer-sponsored retirement plans
-
Dulebohn, J.H. (2002) An investigation of the determinants of investment risk behavior in employer-sponsored retirement plans. Journal of Management, 28, 3-26.
-
(2002)
Journal of Management
, vol.28
, pp. 3-26
-
-
Dulebohn, J.H.1
-
11
-
-
84889684999
-
-
FTC FTC report to congress: privacy online: fair information practices in the electronic marketplace: federal trade commission.
-
FTC (2000) FTC report to congress: privacy online: fair information practices in the electronic marketplace: federal trade commission.
-
(2000)
-
-
-
12
-
-
23844488077
-
Peer influence on risk taking, risk preference, and risky decision making in adolescence and adulthood: an experimental study
-
Gardner, M. & Steinberg, L. (2005) Peer influence on risk taking, risk preference, and risky decision making in adolescence and adulthood: an experimental study. Developmental Psychology, 41, 625-635.
-
(2005)
Developmental Psychology
, vol.41
, pp. 625-635
-
-
Gardner, M.1
Steinberg, L.2
-
13
-
-
29444460597
-
A practical guide to factorial validity using PLS-graph: tutorial and annotated example
-
Gefen, D. & Straub, D. (2005) A practical guide to factorial validity using PLS-graph: tutorial and annotated example. Communications of the Association for Information systems, 16, 91-109.
-
(2005)
Communications of the Association for Information systems
, vol.16
, pp. 91-109
-
-
Gefen, D.1
Straub, D.2
-
14
-
-
0002544658
-
Software security and privacy risks in mobile e-commerce
-
Anup K. Ghosh , Tara M. Swaminatha. (2001) Software security and privacy risks in mobile e-commerce. Communications of the ACM, 44, 51-57.
-
(2001)
Communications of the ACM
, vol.44
, pp. 51-57
-
-
Ghosh, A.K.1
Swaminatha, T.M.2
-
15
-
-
79951933340
-
Email management: a techno-managerial research perspective
-
Gupta, A., Sharda, R., Ducheneaut, N., Zhao, J.L. & Weber, R. (2006) Email management: a techno-managerial research perspective. Communications of the Association for Information Systems, 17, 941-961.
-
(2006)
Communications of the Association for Information Systems
, vol.17
, pp. 941-961
-
-
Gupta, A.1
Sharda, R.2
Ducheneaut, N.3
Zhao, J.L.4
Weber, R.5
-
16
-
-
84889647057
-
-
Harminka Latest SonicWALL email security statistics show rising threat from PDF and ZIP spam. HULIQ.
-
Harminka (2007) Latest SonicWALL email security statistics show rising threat from PDF and ZIP spam. HULIQ.
-
(2007)
-
-
-
17
-
-
0038880247
-
Preference and belief: ambiguity and competence in choice under uncertainty
-
Heath, C. & Tversky, A. (1991) Preference and belief: ambiguity and competence in choice under uncertainty. Journal of Risk and Uncertainty, 4, 5-28.
-
(1991)
Journal of Risk and Uncertainty
, vol.4
, pp. 5-28
-
-
Heath, C.1
Tversky, A.2
-
18
-
-
67349144062
-
Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness
-
Herath, T. & Rao, H.R. (2009a) Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47, 154-165.
-
(2009)
Decision Support Systems
, vol.47
, pp. 154-165
-
-
Herath, T.1
Rao, H.R.2
-
19
-
-
67650152666
-
Protection motivation and deterrence: a framework for security policy compliance in organisations
-
Herath, T. & Rao, H.R. (2009b) Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems, 18, 106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
20
-
-
33745046300
-
Understanding the adoption of multipurpose information appliances: the case of mobile data services
-
Hong, S.-J. & Tam, K.Y. (2006) Understanding the adoption of multipurpose information appliances: the case of mobile data services. Information Systems Research, 17, 162-179.
-
(2006)
Information Systems Research
, vol.17
, pp. 162-179
-
-
Hong, S.-J.1
Tam, K.Y.2
-
21
-
-
0002447342
-
Consumer trust in an Internet store
-
Jarvenpaa, S.L., Tractinsky, N. & Vitale, M. (1999) Consumer trust in an Internet store. Information Technology and Management, 1, 45-71.
-
(1999)
Information Technology and Management
, vol.1
, pp. 45-71
-
-
Jarvenpaa, S.L.1
Tractinsky, N.2
Vitale, M.3
-
22
-
-
77957057727
-
Fear appeals and information security behaviors: an empirical study
-
Johnston, A.C. & Warkentin, M. (2010) Fear appeals and information security behaviors: an empirical study. MIS Quarterly, 34, 1-20.
-
(2010)
MIS Quarterly
, vol.34
, pp. 1-20
-
-
Johnston, A.C.1
Warkentin, M.2
-
23
-
-
0001094004
-
Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption beliefs
-
Karahanna, E., Straub, D.W. & Chervany, N.L. (1999) Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS Quarterly, 23, 183-213.
-
(1999)
MIS Quarterly
, vol.23
, pp. 183-213
-
-
Karahanna, E.1
Straub, D.W.2
Chervany, N.L.3
-
24
-
-
84990586591
-
How believing in ourselves increases risk taking: perceived self-efficacy and opportunity recognition
-
Kruegar, N.J. & Dickson, P.R. (1994) How believing in ourselves increases risk taking: perceived self-efficacy and opportunity recognition. Decision Sciences, 25, 385-400.
-
(1994)
Decision Sciences
, vol.25
, pp. 385-400
-
-
Kruegar, N.J.1
Dickson, P.R.2
-
25
-
-
9744226442
-
Sources of influence on beliefs about information technology use: an empirical study of knowledge workers
-
Lewis, W., Agarwal, R. & Sambamurthy, V. (2003) Sources of influence on beliefs about information technology use: an empirical study of knowledge workers. MIS Quarterly, 27, 657-678.
-
(2003)
MIS Quarterly
, vol.27
, pp. 657-678
-
-
Lewis, W.1
Agarwal, R.2
Sambamurthy, V.3
-
26
-
-
77955121478
-
Understanding security behaviors in personal computer usage: a threat avoidance perspective
-
Liang, H. & Xue, Y. (2010) Understanding security behaviors in personal computer usage: a threat avoidance perspective. Journal of the Association for Information System, 11, 394-413.
-
(2010)
Journal of the Association for Information System
, vol.11
, pp. 394-413
-
-
Liang, H.1
Xue, Y.2
-
27
-
-
33847761422
-
Assimilation of enterprise systems: the effect of institutional pressures and mediating role of the top management
-
Liang, H., Saraf, N., Hu, Q. & Xue, Y. (2007) Assimilation of enterprise systems: the effect of institutional pressures and mediating role of the top management. MIS Quarterly, 31, 59-87.
-
(2007)
MIS Quarterly
, vol.31
, pp. 59-87
-
-
Liang, H.1
Saraf, N.2
Hu, Q.3
Xue, Y.4
-
28
-
-
60649084770
-
Avoidance of information technology threats: a theoretical perspective
-
Liang, H.G. & Xue, Y.J. (2009) Avoidance of information technology threats: a theoretical perspective. MIS Quarterly, 33, 71-90.
-
(2009)
MIS Quarterly
, vol.33
, pp. 71-90
-
-
Liang, H.G.1
Xue, Y.J.2
-
29
-
-
10644254580
-
Beyond concern - a privacy-trust-behavioral intention model of electronic commerce
-
Liu, C., Marchewka, J.T., Lu, J. & Yu, C.-S. (2005) Beyond concern - a privacy-trust-behavioral intention model of electronic commerce. Information & Management, 42, 289-304.
-
(2005)
Information & Management
, vol.42
, pp. 289-304
-
-
Liu, C.1
Marchewka, J.T.2
Lu, J.3
Yu, C.-S.4
-
30
-
-
33847013839
-
WebQual: an instrument for consumer evaluation of web sites
-
Loiacono, E., Watson, R. & Goodhue, D. (2007) WebQual: an instrument for consumer evaluation of web sites. International Journal of Electronic Commerce, 11, 51-87.
-
(2007)
International Journal of Electronic Commerce
, vol.11
, pp. 51-87
-
-
Loiacono, E.1
Watson, R.2
Goodhue, D.3
-
31
-
-
0035736917
-
Self-presentational determinants of health risk behavior among college freshmen
-
Martin, K.A. & Leary, M.R. (2001) Self-presentational determinants of health risk behavior among college freshmen. Psychology & Health, 16, 17-27.
-
(2001)
Psychology & Health
, vol.16
, pp. 17-27
-
-
Martin, K.A.1
Leary, M.R.2
-
32
-
-
0033653826
-
Protection motivation and risk communication
-
Neuwirth, K., Dunwoody, S. & Griffin, R.J. (2000) Protection motivation and risk communication. Risk Analysis, 20, 721-734.
-
(2000)
Risk Analysis
, vol.20
, pp. 721-734
-
-
Neuwirth, K.1
Dunwoody, S.2
Griffin, R.J.3
-
34
-
-
0036015965
-
Web site usability, design, and performance metrics
-
Palmer, J.W. (2002) Web site usability, design, and performance metrics. Information Systems Research, 13, 151-167.
-
(2002)
Information Systems Research
, vol.13
, pp. 151-167
-
-
Palmer, J.W.1
-
35
-
-
67649951505
-
Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model
-
Pavlou, P.A. (2003) Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7, 101-134.
-
(2003)
International Journal of Electronic Commerce
, vol.7
, pp. 101-134
-
-
Pavlou, P.A.1
-
36
-
-
33847764616
-
Understanding and mitigating uncertainty in online exchange relationships: a principle-agent perspective
-
Pavlou, P.A., Liang, H. & Xue, Y. (2007) Understanding and mitigating uncertainty in online exchange relationships: a principle-agent perspective. MIS Quarterly, 31, 105-136.
-
(2007)
MIS Quarterly
, vol.31
, pp. 105-136
-
-
Pavlou, P.A.1
Liang, H.2
Xue, Y.3
-
37
-
-
0141907688
-
Common method biases in behavioral research: a critical review of the literature and recommended remedies
-
Podsakoff, P.M., MacKenzie, S.B., Lee, J.-Y. & Podsakoff, N.P. (2003) Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology, 88, 879-903.
-
(2003)
Journal of Applied Psychology
, vol.88
, pp. 879-903
-
-
Podsakoff, P.M.1
MacKenzie, S.B.2
Lee, J.-Y.3
Podsakoff, N.P.4
-
38
-
-
84889633622
-
-
SmartPLS 2.0 (M3) Beta. Hamburg.
-
Ringle, C.M., Wende, S. & Will, S. (2005) SmartPLS 2.0 (M3) Beta. Hamburg.
-
(2005)
-
-
Ringle, C.M.1
Wende, S.2
Will, S.3
-
39
-
-
0001840352
-
A protection motivation theory of fear appeals and attitude change
-
Rogers, R.W. (1975) A protection motivation theory of fear appeals and attitude change. Journal of Psychology, 91, 93-114.
-
(1975)
Journal of Psychology
, vol.91
, pp. 93-114
-
-
Rogers, R.W.1
-
40
-
-
0002247369
-
Cognitive and physiological process in fear appeals and attitude change: a revised theory of protection motivation
-
Petty, R. (ed.) Guilford Press, New York.
-
Rogers, R.W. (1983) Cognitive and physiological process in fear appeals and attitude change: a revised theory of protection motivation. In: Social Psychophysiology: A Source Book, Petty, R. (ed.), pp. 153-176. Guilford Press, New York.
-
(1983)
Social Psychophysiology: A Source Book
, pp. 153-176
-
-
Rogers, R.W.1
-
41
-
-
0002551409
-
Current technological impediments to business-to-consumer electronic commerce
-
Rose, G., Khoo, H. & Straub, D. (1999) Current technological impediments to business-to-consumer electronic commerce. Communications of the AIS, 1, 1-74.
-
(1999)
Communications of the AIS
, vol.1
, pp. 1-74
-
-
Rose, G.1
Khoo, H.2
Straub, D.3
-
42
-
-
0242530341
-
A refined view of download time impacts on e-consumer attitudes and patronage intentions toward e-retailers
-
Rose, G.M., Lee, J. & Meuter, M.L. (2001) A refined view of download time impacts on e-consumer attitudes and patronage intentions toward e-retailers. The International Journal on Media Management, 3, 105-111.
-
(2001)
The International Journal on Media Management
, vol.3
, pp. 105-111
-
-
Rose, G.M.1
Lee, J.2
Meuter, M.L.3
-
43
-
-
0000981743
-
Information privacy: measuring individuals' concerns about organizational practices
-
Smith, H.J., Milberg, S.J. & Burke, S.J. (1996) Information privacy: measuring individuals' concerns about organizational practices. MIS Quarterly, 20, 167-197.
-
(1996)
MIS Quarterly
, vol.20
, pp. 167-197
-
-
Smith, H.J.1
Milberg, S.J.2
Burke, S.J.3
-
44
-
-
84942798526
-
Cognitive processes in health enhancement: investigation of a combined protection motivation and self-efficacy model
-
Stanley, M.A. & Maddux, J.E. (1986) Cognitive processes in health enhancement: investigation of a combined protection motivation and self-efficacy model. Basic and Applied Social Psychology, 7, 101-113.
-
(1986)
Basic and Applied Social Psychology
, vol.7
, pp. 101-113
-
-
Stanley, M.A.1
Maddux, J.E.2
-
45
-
-
84991128944
-
Men's motivation to perform the testicle self-exam: effects of prior knowledge and an educational brochure
-
Steffen, V.J. (1990) Men's motivation to perform the testicle self-exam: effects of prior knowledge and an educational brochure. Journal of Applied Social Psychology, 20, 681-702.
-
(1990)
Journal of Applied Social Psychology
, vol.20
, pp. 681-702
-
-
Steffen, V.J.1
-
46
-
-
0036004583
-
An empirical examination of the concern for information privacy instrument. [Article]
-
Stewart, K.A. & Segars, A.H. (2002) An empirical examination of the concern for information privacy instrument. [Article]. Information Systems Research, 13, 36-49.
-
(2002)
Information Systems Research
, vol.13
, pp. 36-49
-
-
Stewart, K.A.1
Segars, A.H.2
-
47
-
-
84889663953
-
-
Symantec Corp Symantec Global Internet Security Threat Report Trends for 2009 (Vol. XV).
-
Symantec Corp (2010) Symantec Global Internet Security Threat Report Trends for 2009 (Vol. XV).
-
(2010)
-
-
-
48
-
-
0034434546
-
Managing the costs of informational privacy: pure bundling as a strategy in the individual health insurance market
-
Thatcher, M.E. & Clemons, E.K. (2000) Managing the costs of informational privacy: pure bundling as a strategy in the individual health insurance market. Journal of Management Information Systems, 17, 29-58.
-
(2000)
Journal of Management Information Systems
, vol.17
, pp. 29-58
-
-
Thatcher, M.E.1
Clemons, E.K.2
-
49
-
-
1542382496
-
User acceptance of information technology: toward a unified view
-
Venkatesh, V., Morris, M.G., Davis, G.B. & Davis, F.D. (2003) User acceptance of information technology: toward a unified view. MIS Quarterly, 27, 425-478.
-
(2003)
MIS Quarterly
, vol.27
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.G.2
Davis, G.B.3
Davis, F.D.4
-
50
-
-
84878277951
-
An empirical exploration of the design pattern of phishing attacks
-
Upadhyaya, S.J. & Rao, H.R. (eds) Emerald Group Publishing Ltd., Bingley, England.
-
Wang, J., Chen, R., Herath, T. & Rao, H.R. (2009a) An empirical exploration of the design pattern of phishing attacks. In: Annals of Emerging Research in Information Assurance, Security and Privacy Services, Upadhyaya, S.J. & Rao, H.R. (eds), pp. 259-284. Emerald Group Publishing Ltd., Bingley, England.
-
(2009)
Annals of Emerging Research in Information Assurance, Security and Privacy Services
, pp. 259-284
-
-
Wang, J.1
Chen, R.2
Herath, T.3
Rao, H.R.4
-
51
-
-
70350752562
-
Visual e-mail authentication and identification services: an investigation of the effect on e-mail use
-
Wang, J., Chen, R., Herath, T. & Rao, H.R. (2009b) Visual e-mail authentication and identification services: an investigation of the effect on e-mail use. Decision Support Systems, 48, 92-102.
-
(2009)
Decision Support Systems
, vol.48
, pp. 92-102
-
-
Wang, J.1
Chen, R.2
Herath, T.3
Rao, H.R.4
-
52
-
-
77955101093
-
Chapter II: IT security governance and centralized security controls
-
Warkentin, M. & Vaughn, R. (eds) Idea Group Publishing, Hershey, PA, USA.
-
Warkentin, M. & Johnston, A.C. (2006) Chapter II: IT security governance and centralized security controls. In: Information Assurance and System Security: Managerial and Technical Issues, Warkentin, M. & Vaughn, R. (eds), pp. 16-24. Idea Group Publishing, Hershey, PA, USA.
-
(2006)
Information Assurance and System Security: Managerial and Technical Issues
, pp. 16-24
-
-
Warkentin, M.1
Johnston, A.C.2
-
53
-
-
84869780575
-
-
A Protection Motivation Theory Approach to Home Wireless Security. Paper presented at the Twenty-Fifth International Conference on Information Systems, Las Vegas, NV, USA.
-
Woon, I.M.Y., Tan, G.W. & Low, R.T. (2005) A Protection Motivation Theory Approach to Home Wireless Security. Paper presented at the Twenty-Fifth International Conference on Information Systems, Las Vegas, NV, USA.
-
(2005)
-
-
Woon, I.M.Y.1
Tan, G.W.2
Low, R.T.3
-
54
-
-
51349158689
-
Security lapses and the omission of information security measures: a threat control model and empirical test
-
Workman, M., Bommer, W.H. & Straub, D. (2008) Security lapses and the omission of information security measures: a threat control model and empirical test. Computers in Human Behavior, 24, 2799-2816.
-
(2008)
Computers in Human Behavior
, vol.24
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.H.2
Straub, D.3
-
55
-
-
84871016866
-
-
Consumers Privacy Concerns toward Using Location-Based Services: An Exploratory Framework and Research Proposal. Paper presented at the European Conference on Information Systems.
-
Xu, H. & Teo, H.H. (2005) Consumers Privacy Concerns toward Using Location-Based Services: An Exploratory Framework and Research Proposal. Paper presented at the European Conference on Information Systems.
-
(2005)
-
-
Xu, H.1
Teo, H.H.2
|