-
1
-
-
77957045434
-
Detecting Fake Websites: The Contribution of Statistical Learning Theory
-
Abbasi, A., Zhang, Z., Zimbra, D., Chen, H., and Nunamaker Jr., J.F. 2010. "Detecting Fake Websites: The Contribution of Statistical Learning Theory, " MIS Quarterly (34:3), pp. 435-461.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 435-461
-
-
Abbasi, A.1
Zhang, Z.2
Zimbra, D.3
Chen, H.4
Nunamaker Jr., J.F.5
-
2
-
-
0043232732
-
Users Are Not the Enemy
-
Adams, A., and Sasse, M.A. 1999. "Users Are Not the Enemy, " Communications of the ACM (42:12), pp. 40-46.
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
3
-
-
0002305454
-
From Intentions to Actions: A Theory of Planned Behavior
-
in, J. Kuhl and J. Beckman (eds.). Heidelberg: Springer
-
Ajzen, I. 1985. "From Intentions to Actions: A Theory of Planned Behavior, " in Action-Control: From Cognition to Behavior, J. Kuhl and J. Beckman (eds.). Heidelberg: Springer, pp. 11-39.
-
(1985)
Action-Control: From Cognition to Behavior
, pp. 11-39
-
-
Ajzen, I.1
-
5
-
-
0039869164
-
Attitudinal and Normative Variables as Predictors of Specific Behavior
-
Ajzen, I., and Fishbein, M. 1973. "Attitudinal and Normative Variables as Predictors of Specific Behavior, " Journal of Personality and Social Psychology (17:1), pp. 41-57.
-
(1973)
Journal of Personality and Social Psychology
, vol.17
, Issue.1
, pp. 41-57
-
-
Ajzen, I.1
Fishbein, M.2
-
7
-
-
41649112685
-
Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach
-
Anderson, J.C., and Gerbing, D.W. 1988. "Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach, " Psychological Bulletin (103:3), pp. 411-423.
-
(1988)
Psychological Bulletin
, vol.103
, Issue.3
, pp. 411-423
-
-
Anderson, J.C.1
Gerbing, D.W.2
-
8
-
-
0000106003
-
Regulation of Cognitive Processes through Perceived Self-Efficacy
-
Bandura, A. 1989. "Regulation of Cognitive Processes through Perceived Self-Efficacy, " Developmental Psychology (25:5), pp. 729-735.
-
(1989)
Developmental Psychology
, vol.25
, Issue.5
, pp. 729-735
-
-
Bandura, A.1
-
9
-
-
0000534580
-
Use of Path Analysis in Industrial/Organizational Psychology: Criticisms and Suggestions
-
Billings, R.S., and Wroten, S.P. 1978. "Use of Path Analysis in Industrial/Organizational Psychology: Criticisms and Suggestions, " Journal of Applied Psychology (63:3), pp. 677-688.
-
(1978)
Journal of Applied Psychology
, vol.63
, Issue.3
, pp. 677-688
-
-
Billings, R.S.1
Wroten, S.P.2
-
10
-
-
84864439174
-
Visual Mental Image Generation Does Not Overlap with Visual Short-Term Memory: A Dual-Task Interference Study
-
Borst, G., Niven, E., and Logie, R.H. 2012. "Visual Mental Image Generation Does Not Overlap with Visual Short-Term Memory: A Dual-Task Interference Study, " Memory & Cognition (40:3), pp. 360-372.
-
(2012)
Memory & Cognition
, vol.40
, Issue.3
, pp. 360-372
-
-
Borst, G.1
Niven, E.2
Logie, R.H.3
-
11
-
-
67650100804
-
If Someone Is Watching, I'll Do What I'm Asked: Mandatoriness, Control, and Information Security
-
Boss, S., Kirsch, L., Angermeier, I., Shingler, R., and Boss, R. 2009. "If Someone Is Watching, I'll Do What I'm Asked: Mandatoriness, Control, and Information Security, " European Journal of Information Systems (18:2), pp. 151-164.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 151-164
-
-
Boss, S.1
Kirsch, L.2
Angermeier, I.3
Shingler, R.4
Boss, R.5
-
12
-
-
80052795867
-
Improving Computer Security Dialogs
-
in, P. Campos, N. Graham, J. Jorge, N. Nunes, P. Palanque and M. Winckler (eds.). Springer Berlin Heidelberg
-
Bravo-Lillo, C., Cranor, L., Downs, J., Komanduri, S., and Sleeper, M. 2011. "Improving Computer Security Dialogs, " in Human-Computer Interaction-Interact 2011, P. Campos, N. Graham, J. Jorge, N. Nunes, P. Palanque and M. Winckler (eds.). Springer Berlin Heidelberg, pp. 18-35.
-
(2011)
Human-Computer Interaction-Interact 2011
, pp. 18-35
-
-
Bravo-Lillo, C.1
Cranor, L.2
Downs, J.3
Komanduri, S.4
Sleeper, M.5
-
13
-
-
36849077630
-
Improving Security Decisions with Polymorphic and Audited Dialogs
-
in:, Pittsburgh, Pennsylvania: ACM
-
Brustoloni, J.C., and Villamarin-Salom, R. 2007. "Improving Security Decisions with Polymorphic and Audited Dialogs, " in: Proceedings of the 3rd Symposium on Usable Privacy and Security. Pittsburgh, Pennsylvania: ACM, pp. 76-85.
-
(2007)
Proceedings of the 3rd Symposium on Usable Privacy and Security
, pp. 76-85
-
-
Brustoloni, J.C.1
Villamarin-Salom, R.2
-
14
-
-
77957061746
-
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
-
Bulgurcu, B., Cavusoglu, H., and Benbasat, I. 2010. "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness, " MIS Quarterly (34:3), pp. 523-548.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
15
-
-
0030968926
-
Just-in-Time Clinical Information
-
Chueh, H., and Barnett, G. 1997. ""Just-in-Time" Clinical Information, " Academic Medicine: Journal of the Association of American Medical Colleges (72:6), p. 512.
-
(1997)
Academic Medicine: Journal of the Association of American Medical Colleges
, vol.72
, Issue.6
, pp. 512
-
-
Chueh, H.1
Barnett, G.2
-
16
-
-
84992963195
-
Raising Information Security Awareness in the Academic Setting
-
Cox, A., Connolly, S., and Currall, J. 2001. "Raising Information Security Awareness in the Academic Setting, " VINE (31:2), pp. 11-16.
-
(2001)
VINE
, vol.31
, Issue.2
, pp. 11-16
-
-
Cox, A.1
Connolly, S.2
Currall, J.3
-
17
-
-
84893108843
-
A Framework for Reasoning About the Human in the Loop
-
in:, San Francisco, California: USENIX Association
-
Cranor, L.F. 2008. "A Framework for Reasoning About the Human in the Loop, " in: Proceedings of the 1st Conference on Usability, Psychology, and Security. San Francisco, California: USENIX Association, pp. 1-15.
-
(2008)
Proceedings of the 1st Conference on Usability, Psychology, and Security
, pp. 1-15
-
-
Cranor, L.F.1
-
18
-
-
84897780890
-
The Effects of Security Education Training and Awareness Programs and Individual Characteristics on End User Security Tool Usage
-
Crossler, R.E., and Belanger, F. 2009. "The Effects of Security Education Training and Awareness Programs and Individual Characteristics on End User Security Tool Usage, " Journal of Information Systems Security (5:3), pp. 3-22.
-
(2009)
Journal of Information Systems Security
, vol.5
, Issue.3
, pp. 3-22
-
-
Crossler, R.E.1
Belanger, F.2
-
19
-
-
67649551429
-
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
-
Mar
-
D'Arcy, J., Hovav, A., and Galletta, D. 2009. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach, " Information Systems Research (20:1), Mar, pp. 79-98.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 79-98
-
-
D'Arcy, J.1
Hovav, A.2
Galletta, D.3
-
20
-
-
2442463419
-
Conducting Experimental Research in Information Systems
-
Dennis, A.R., and Valacich, J.S. 2001. "Conducting Experimental Research in Information Systems, " Communications of AIS (7:5), pp. 1-41.
-
(2001)
Communications of AIS
, vol.7
, Issue.5
, pp. 1-41
-
-
Dennis, A.R.1
Valacich, J.S.2
-
22
-
-
84897805615
-
Health Insurance Reform: Security Standards; Final Rule
-
Department of Health and Human Services, in:, Federal Register
-
Department of Health and Human Services. 2003. "Health Insurance Reform: Security Standards; Final Rule, " in: 45 CFR Parts 160, 162, and 164. Federal Register.
-
(2003)
45 CFR Parts 160, 162, and 164
-
-
-
23
-
-
49049114397
-
The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies
-
Dinev, T., and Hu, Q. 2007. "The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies, " Journal of the Association for Information Systems (8:7), pp. 386-408.
-
(2007)
Journal of the Association for Information Systems
, vol.8
, Issue.7
, pp. 386-408
-
-
Dinev, T.1
Hu, Q.2
-
24
-
-
33846794868
-
Phishing for User Security Awareness
-
Dodge, R.C., Carver, C., and Ferguson, A.J. 2007. "Phishing for User Security Awareness, " Computers & Security (26:1), pp. 73-80.
-
(2007)
Computers & Security
, vol.26
, Issue.1
, pp. 73-80
-
-
Dodge, R.C.1
Carver, C.2
Ferguson, A.J.3
-
25
-
-
33845400993
-
Isolation of a Central Bottleneck of Information Processing with Time-Resolved Fmri
-
Dux, P.E., Ivanoff, J., Asplund, C.L., and Marois, R. 2006. "Isolation of a Central Bottleneck of Information Processing with Time-Resolved Fmri, " Neuron (52:6), pp. 1109-1120.
-
(2006)
Neuron
, vol.52
, Issue.6
, pp. 1109-1120
-
-
Dux, P.E.1
Ivanoff, J.2
Asplund, C.L.3
Marois, R.4
-
26
-
-
0003551671
-
-
Reading, Mass.: Addison-Wesley Pub. Co
-
Fishbein, M., and Ajzen, I. 1975. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research. Reading, Mass.: Addison-Wesley Pub. Co.
-
(1975)
Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research
-
-
Fishbein, M.1
Ajzen, I.2
-
27
-
-
0000009769
-
Evaluating Structural Equation Models with Unobservable Variables and Measurement Error
-
Fornell, C., and Larcker, D.F. 1981. "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error, " Journal of Marketing Research (18:1), pp. 39-50.
-
(1981)
Journal of Marketing Research
, vol.18
, Issue.1
, pp. 39-50
-
-
Fornell, C.1
Larcker, D.F.2
-
28
-
-
75549087484
-
Dual-Task Interference in Visual Working Memory: A Limitation in Storage Capacity but Not in Encoding or Retrieval
-
Fougnie, D., and Marois, R. 2009. "Dual-Task Interference in Visual Working Memory: A Limitation in Storage Capacity but Not in Encoding or Retrieval, " Attention, Perception, & Psychophysics (71:8), pp. 1831-1841.
-
(2009)
Attention, Perception, & Psychophysics
, vol.71
, Issue.8
, pp. 1831-1841
-
-
Fougnie, D.1
Marois, R.2
-
29
-
-
33645589662
-
A Prototype Tool for Information Security Awareness and Training
-
Furnell, S., Gennatou, M., and Dowland, P. 2002. "A Prototype Tool for Information Security Awareness and Training, " Logistics Information Management (15:5/6), pp. 352-357.
-
(2002)
Logistics Information Management
, vol.15
, Issue.5-6
, pp. 352-357
-
-
Furnell, S.1
Gennatou, M.2
Dowland, P.3
-
30
-
-
0000384380
-
The College Sophomore as a Guinea Pig: Setting the Record Straight
-
Greenburg, J. 1987. "The College Sophomore as a Guinea Pig: Setting the Record Straight, " Academy of Management Review (12:1), pp. 157-159.
-
(1987)
Academy of Management Review
, vol.12
, Issue.1
, pp. 157-159
-
-
Greenburg, J.1
-
31
-
-
33847080358
-
Research Note: Individual Cognition and Dual-Task Interference in Group Support Systems
-
Heninger, W.G., Dennis, A.R., and Hilmer, K.M.N. 2006. "Research Note: Individual Cognition and Dual-Task Interference in Group Support Systems, " Information Systems Research (17:4), pp. 415-424.
-
(2006)
Information Systems Research
, vol.17
, Issue.4
, pp. 415-424
-
-
Heninger, W.G.1
Dennis, A.R.2
Hilmer, K.M.N.3
-
32
-
-
84897746857
-
-
Retrieved January 30, 2013, from
-
Herold, R. 2009. "Common Infosec & Privacy Training Mistakes. " Retrieved January 30, 2013, from http://privacyguidance.com/blog/2009/06/01/common-infosec-privacy-training-mistakes/
-
(2009)
Common Infosec & Privacy Training Mistakes
-
-
Herold, R.1
-
33
-
-
70349265955
-
Dual-Task Interference: Attentional and Neurophysiological Influences
-
Hiraga, C.Y., Garry, M.I., Carson, R.G., and Summers, J.J. 2009. "Dual-Task Interference: Attentional and Neurophysiological Influences, " Behavioural Brain Research (205:1), pp. 10-18.
-
(2009)
Behavioural Brain Research
, vol.205
, Issue.1
, pp. 10-18
-
-
Hiraga, C.Y.1
Garry, M.I.2
Carson, R.G.3
Summers, J.J.4
-
34
-
-
0020985537
-
Deterrence in the Workplace: Perceived Certainty, Perceived Severity, and Employee Theft
-
Hollinger, R.C., and Clark, J.P. 1983. "Deterrence in the Workplace: Perceived Certainty, Perceived Severity, and Employee Theft, " Social Forces (62:2), pp. 398-418.
-
(1983)
Social Forces
, vol.62
, Issue.2
, pp. 398-418
-
-
Hollinger, R.C.1
Clark, J.P.2
-
35
-
-
84859105508
-
Does Culture Really Matter? A Cross-Cultural Analysis of Security Countermeasure Effectiveness Based on Deterrence Theory
-
Hovav, A., and D'Arcy, J. 2012. "Does Culture Really Matter? A Cross-Cultural Analysis of Security Countermeasure Effectiveness Based on Deterrence Theory, " Information & Management (49:2), pp. 99-110.
-
(2012)
Information & Management
, vol.49
, Issue.2
, pp. 99-110
-
-
Hovav, A.1
D'Arcy, J.2
-
36
-
-
84857931598
-
Forget the Fluff: Examining How Media Richness Influences the Impact of Information Security Training on Secure Behavior
-
Maui, Hawaii: IEEE
-
Jenkins, J.L., Durcikova, A., and Burns, M.B. 2012. "Forget the Fluff: Examining How Media Richness Influences the Impact of Information Security Training on Secure Behavior, " 45th Hawaii International Conference on System Science (HICSS), Maui, Hawaii: IEEE, pp. 3288-3296.
-
(2012)
45th Hawaii International Conference on System Science (HICSS)
, pp. 3288-3296
-
-
Jenkins, J.L.1
Durcikova, A.2
Burns, M.B.3
-
37
-
-
84887446180
-
Simplicity Is Bliss: Controlling Extraneous Cognitive Load in Online Security Training to Promote Secure Behavior
-
Jenkins, J.L., Durcikova, A., and Burns, M.B. 2013a. "Simplicity Is Bliss: Controlling Extraneous Cognitive Load in Online Security Training to Promote Secure Behavior, " Journal of Organizational and End User Computing (JOEUC) (25:3), pp. 52-66.
-
(2013)
Journal of Organizational and End User Computing (JOEUC)
, vol.25
, Issue.3
, pp. 52-66
-
-
Jenkins, J.L.1
Durcikova, A.2
Burns, M.B.3
-
38
-
-
84870959774
-
Encouraging Users to Behave Securely: Examining the Influence of Technical, Managerial, and Educational Controls on Users' Secure Behavior
-
Saint Louis, Missouri
-
Jenkins, J.L., Durcikova, A., Ross, G., and Nunamaker Jr, J.F. 2010. "Encouraging Users to Behave Securely: Examining the Influence of Technical, Managerial, and Educational Controls on Users' Secure Behavior, " ICIS, Saint Louis, Missouri.
-
(2010)
ICIS
-
-
Jenkins, J.L.1
Durcikova, A.2
Ross, G.3
Nunamaker Jr., J.F.4
-
39
-
-
84897710199
-
Improving Password Cybersecurity through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals
-
Jenkins, J.L., Grimes, M., Proudfoot, J.G., and Lowry, P.B. 2013b. "Improving Password Cybersecurity through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals, " Information Technology for Development, pp. 1-18.
-
(2013)
Information Technology for Development
, pp. 1-18
-
-
Jenkins, J.L.1
Grimes, M.2
Proudfoot, J.G.3
Lowry, P.B.4
-
40
-
-
80052902327
-
Toward a New Meta-Theory for Designing Information Systems (Is) Security Training Approaches
-
Karjalainen, M., and Siponen, M. 2011. "Toward a New Meta-Theory for Designing Information Systems (Is) Security Training Approaches, " Journal of the Association for Information Systems (12:8), pp. 518-555.
-
(2011)
Journal of the Association for Information Systems
, vol.12
, Issue.8
, pp. 518-555
-
-
Karjalainen, M.1
Siponen, M.2
-
41
-
-
70749087044
-
A Behavioral Analysis of Passphrase Design and Effectiveness
-
Keith, M., Shao, B., and Steinbart, P. 2009. "A Behavioral Analysis of Passphrase Design and Effectiveness, " Journal of the Association for Information Systems (10:2), pp. 63-89.
-
(2009)
Journal of the Association for Information Systems
, vol.10
, Issue.2
, pp. 63-89
-
-
Keith, M.1
Shao, B.2
Steinbart, P.3
-
42
-
-
84555162741
-
-
Retrieved January 10, 2012, from
-
Kenny, D. 2011. "Path Analysis. " Retrieved January 10, 2012, from http://davidakenny.net/cm/pathanal.htm
-
(2011)
Path Analysis
-
-
Kenny, D.1
-
43
-
-
70350605916
-
Adaptive Security Dialogs for Improved Security Behavior of Users
-
in, T. Gross, J. Gulliksen, P. Kotzé, L. Oestreicher, P. Palanque, R. Prates and M. Winckler (eds.). Springer Berlin Heidelberg
-
Keukelaere, F., Yoshihama, S., Trent, S., Zhang, Y., Luo, L., and Zurko, M. 2009. "Adaptive Security Dialogs for Improved Security Behavior of Users, " in Human-Computer Interaction-Interact 2009, T. Gross, J. Gulliksen, P. Kotzé, L. Oestreicher, P. Palanque, R. Prates and M. Winckler (eds.). Springer Berlin Heidelberg, pp. 510-523.
-
(2009)
Human-Computer Interaction-Interact 2009
, pp. 510-523
-
-
Keukelaere, F.1
Yoshihama, S.2
Trent, S.3
Zhang, Y.4
Luo, L.5
Zurko, M.6
-
44
-
-
62949223304
-
The Role of Crosstalk in Dual-Task Performance: Evidence from Manipulating Response-Code Overlap
-
Koch, I. 2009. "The Role of Crosstalk in Dual-Task Performance: Evidence from Manipulating Response-Code Overlap, " Psychological Research (73:3), pp. 417-424.
-
(2009)
Psychological Research
, vol.73
, Issue.3
, pp. 417-424
-
-
Koch, I.1
-
45
-
-
19544390006
-
Capacity Limits of Information Processing in the Brain
-
Marois, R., and Ivanoff, J. 2005. "Capacity Limits of Information Processing in the Brain, " Trends in Cognitive Sciences (9:6), pp. 296-305.
-
(2005)
Trends in Cognitive Sciences
, vol.9
, Issue.6
, pp. 296-305
-
-
Marois, R.1
Ivanoff, J.2
-
46
-
-
84886517444
-
The Effects of Information Disclosure Policy on the Diffusion of Security Attacks
-
Orlando, Florida
-
Mitra, S., and Ransbotham, S. 2012. "The Effects of Information Disclosure Policy on the Diffusion of Security Attacks, " ICIS, Orlando, Florida.
-
(2012)
ICIS
-
-
Mitra, S.1
Ransbotham, S.2
-
47
-
-
84864567494
-
Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats
-
Australia: School of Computer and Information Science, Edith Cowan University
-
Molok, N.N.A., Chang, S., and Ahmad, A. 2010. "Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats, " Australian Information Security Management Conference, Australia: School of Computer and Information Science, Edith Cowan University, pp. 70-80.
-
(2010)
Australian Information Security Management Conference
, pp. 70-80
-
-
Molok, N.N.A.1
Chang, S.2
Ahmad, A.3
-
48
-
-
73849124985
-
Running Corporate and National Security Awareness Programs
-
Amsterdam: North-Holland Publishing Co
-
Murray, B. 1991. "Running Corporate and National Security Awareness Programs, " IFIP TC11 Seventh International Conference on IS Security, Amsterdam: North-Holland Publishing Co., pp. 203-207.
-
(1991)
IFIP TC11 Seventh International Conference on IS Security
, pp. 203-207
-
-
Murray, B.1
-
49
-
-
20344386485
-
Just-in-Time Evidence-Based E-Mail "Reminders" in Home Health Care: Impact on Nurse Practices
-
Murtaugh, C.M., Pezzin, L.E., McDonald, M.V., Feldman, P.H., and Peng, T.R. 2005. "Just-in-Time Evidence-Based E-Mail "Reminders" in Home Health Care: Impact on Nurse Practices, " Health Services Research (40:3), pp. 849-864.
-
(2005)
Health Services Research
, vol.40
, Issue.3
, pp. 849-864
-
-
Murtaugh, C.M.1
Pezzin, L.E.2
McDonald, M.V.3
Feldman, P.H.4
Peng, T.R.5
-
50
-
-
0023394659
-
Role of Outcome Conflict in Dual-Task Interference
-
Navon, D., and Miller, J. 1987. "Role of Outcome Conflict in Dual-Task Interference, " Journal of Experimental Psychology: Human Perception and Performance (13:3), pp. 435-448.
-
(1987)
Journal of Experimental Psychology: Human Perception and Performance
, vol.13
, Issue.3
, pp. 435-448
-
-
Navon, D.1
Miller, J.2
-
51
-
-
0036583139
-
Queuing or Sharing? A Critical Evaluation of the Single-Bottleneck Notion
-
Navon, D., and Miller, J. 2002. "Queuing or Sharing? A Critical Evaluation of the Single-Bottleneck Notion, " Cognitive Psychology (44:3), pp. 193-251.
-
(2002)
Cognitive Psychology
, vol.44
, Issue.3
, pp. 193-251
-
-
Navon, D.1
Miller, J.2
-
52
-
-
0025515637
-
Do Response Modality Effects Support Multiprocessor Models of Divided Attention?
-
Pashler, H. 1990. "Do Response Modality Effects Support Multiprocessor Models of Divided Attention?, " Journal of Experimental Psychology: Human Perception and Performance (16:4), pp. 826-842.
-
(1990)
Journal of Experimental Psychology: Human Perception and Performance
, vol.16
, Issue.4
, pp. 826-842
-
-
Pashler, H.1
-
53
-
-
0028502653
-
Dual-Task Interference in Simple Tasks: Data and Theory
-
Pashler, H. 1994. "Dual-Task Interference in Simple Tasks: Data and Theory, " Psychological Bulletin (116:2), pp. 220-244.
-
(1994)
Psychological Bulletin
, vol.116
, Issue.2
, pp. 220-244
-
-
Pashler, H.1
-
54
-
-
0027548638
-
Saccadic Eye Movements and Dual-Task Interference
-
Pashler, H., Carrier, M., and Hoffman, J. 1993. "Saccadic Eye Movements and Dual-Task Interference, " The Quarterly Journal of Experimental Psychology (46:1), pp. 51-82.
-
(1993)
The Quarterly Journal of Experimental Psychology
, vol.46
, Issue.1
, pp. 51-82
-
-
Pashler, H.1
Carrier, M.2
Hoffman, J.3
-
55
-
-
80155212119
-
Effects of Dual Task Interference on Memory Intrusions for Affective Images
-
Pearson, D.G., and Sawyer, T. 2011. "Effects of Dual Task Interference on Memory Intrusions for Affective Images, " International Journal of Cognitive Therapy (4:2), pp. 122-133.
-
(2011)
International Journal of Cognitive Therapy
, vol.4
, Issue.2
, pp. 122-133
-
-
Pearson, D.G.1
Sawyer, T.2
-
56
-
-
78650770842
-
Improving Employees' Compliance through Information Systems Security Training: An Action Research Study
-
Dec
-
Puhakainen, P., and Siponen, M. 2010. "Improving Employees' Compliance through Information Systems Security Training: An Action Research Study, " MIS Quarterly (34:4), Dec, pp. 757-778.
-
(2010)
MIS Quarterly
, vol.34
, Issue.4
, pp. 757-778
-
-
Puhakainen, P.1
Siponen, M.2
-
58
-
-
0035387175
-
Transforming the 'Weakest Link': A Human/Computer Interaction Approach to Usable and Effective Security
-
Sasse, M.A., Brostoff, S., and Weirich, D. 2001. "Transforming the 'Weakest Link': A Human/Computer Interaction Approach to Usable and Effective Security, " BT Technology Journal (19:3), pp. 122-131.
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
59
-
-
84865622297
-
-
Retrieved January 30, 2013, from
-
Schneier, B. 2005. "Insider Threat Statistics. " Retrieved January 30, 2013, from http://www.schneier.com/blog/archives/2005/12/insider_threat.html
-
(2005)
Insider Threat Statistics
-
-
Schneier, B.1
-
60
-
-
33744808509
-
The Role of Cognitive Fit in the Relationship between Software Comprehension and Modification
-
Shaft, T.M., and Vessey, I. 2006. "The Role of Cognitive Fit in the Relationship between Software Comprehension and Modification, " MIS Quarterly (30:1), pp. 29-55.
-
(2006)
MIS Quarterly
, vol.30
, Issue.1
, pp. 29-55
-
-
Shaft, T.M.1
Vessey, I.2
-
61
-
-
33745899916
-
Dynamics of the Central Bottleneck: Dual-Task and Task Uncertainty
-
Sigman, M., and Dehaene, S. 2006. "Dynamics of the Central Bottleneck: Dual-Task and Task Uncertainty, " PLoS Biology (4:7), p. e220.
-
(2006)
PLoS Biology
, vol.4
, Issue.7
-
-
Sigman, M.1
Dehaene, S.2
-
62
-
-
0033683516
-
A Conceptual Foundation for Organizational Information Security Awareness
-
Siponen, M. 2000. "A Conceptual Foundation for Organizational Information Security Awareness, " Information Management & Computer Security (8:1), pp. 31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.1
-
63
-
-
71149100808
-
Are Employees Putting Your Company at Risk by Not Following Information Security Policies?
-
Siponen, M., Mahmood, M.A., and Pahnila, S. 2009. "Are Employees Putting Your Company at Risk by Not Following Information Security Policies?, " Communications of the ACM (52:12), pp. 145-147.
-
(2009)
Communications of the ACM
, vol.52
, Issue.12
, pp. 145-147
-
-
Siponen, M.1
Mahmood, M.A.2
Pahnila, S.3
-
65
-
-
0000819688
-
Cognitive Load During Problem Solving: Effects on Learning
-
Sweller, J. 1988. "Cognitive Load During Problem Solving: Effects on Learning, " Cognitive Science (12:2), pp. 257-285.
-
(1988)
Cognitive Science
, vol.12
, Issue.2
, pp. 257-285
-
-
Sweller, J.1
-
66
-
-
73549120882
-
Understanding Information Technology Usage-a Test of Competing Models
-
Jun
-
Taylor, S., and Todd, P.A. 1995. "Understanding Information Technology Usage-a Test of Competing Models, " Information Systems Research (6:2), Jun, pp. 144-176.
-
(1995)
Information Systems Research
, vol.6
, Issue.2
, pp. 144-176
-
-
Taylor, S.1
Todd, P.A.2
-
67
-
-
0002527556
-
The Refractory Phase of Voluntary and Associative Responses
-
Telford, C.W. 1931. "The Refractory Phase of Voluntary and Associative Responses, " Journal of Experimental Psychology (14:1), pp. 1-36.
-
(1931)
Journal of Experimental Psychology
, vol.14
, Issue.1
, pp. 1-36
-
-
Telford, C.W.1
-
68
-
-
84897746858
-
An Effective Is Security Awareness Program for Industry
-
L. Yngström and J. Carlsen (eds.), London: Chapman and Hall
-
Thomson, M.E., and Solms, R. 1997. "An Effective Is Security Awareness Program for Industry, " IFIP TC 11 13th International Conference on IS Security, L. Yngström and J. Carlsen (eds.), London: Chapman and Hall.
-
(1997)
IFIP TC 11 13th International Conference on IS Security
-
-
Thomson, M.E.1
Solms, R.2
-
69
-
-
85047691739
-
A Central Capacity Sharing Model of Dual-Task Performance
-
Tombu, M., and Jolicoeur, P. 2003. "A Central Capacity Sharing Model of Dual-Task Performance, " Journal of Experimental Psychology: Human Perception and Performance (29:1), pp. 3-18.
-
(2003)
Journal of Experimental Psychology: Human Perception and Performance
, vol.29
, Issue.1
, pp. 3-18
-
-
Tombu, M.1
Jolicoeur, P.2
-
70
-
-
77954171061
-
Task Switching: Interplay of Reconfiguration and Interference Control
-
Vandierendonck, A., Liefooghe, B., and Verbruggen, F. 2010. "Task Switching: Interplay of Reconfiguration and Interference Control, " Psychological Bulletin (136:4), p. 601.
-
(2010)
Psychological Bulletin
, vol.136
, Issue.4
, pp. 601
-
-
Vandierendonck, A.1
Liefooghe, B.2
Verbruggen, F.3
-
71
-
-
2342475711
-
Towards Information Security Behavioural Compliance
-
May
-
Vroom, C., and von Solms, R. 2004. "Towards Information Security Behavioural Compliance, " Computers & Security (23:3), May, pp. 191-198.
-
(2004)
Computers & Security
, vol.23
, Issue.3
, pp. 191-198
-
-
Vroom, C.1
von Solms, R.2
-
72
-
-
79955622246
-
The Influence of the Informal Social Learning Environment on Information Privacy Policy Compliance Efficacy and Intention
-
Warkentin, M., Johnston, A.C., and Shropshire, J. 2011. "The Influence of the Informal Social Learning Environment on Information Privacy Policy Compliance Efficacy and Intention, " European Journal of Information Systems (20:3), pp. 267-284.
-
(2011)
European Journal of Information Systems
, vol.20
, Issue.3
, pp. 267-284
-
-
Warkentin, M.1
Johnston, A.C.2
Shropshire, J.3
-
73
-
-
42149161709
-
The Psychology of Security
-
West, R. 2008. "The Psychology of Security, " Communications of the ACM (51:4), pp. 34-40.
-
(2008)
Communications of the ACM
, vol.51
, Issue.4
, pp. 34-40
-
-
West, R.1
-
74
-
-
33846344673
-
Punishment and Ethics Deterrents: A Study of Insider Security Contravention
-
Workman, M., and Gathegi, J. 2007. "Punishment and Ethics Deterrents: A Study of Insider Security Contravention, " Journal of the American Society for Information Science and Technology (58:2), pp. 212-222.
-
(2007)
Journal of the American Society for Information Science and Technology
, vol.58
, Issue.2
, pp. 212-222
-
-
Workman, M.1
Gathegi, J.2
|