-
1
-
-
77949434452
-
-
San Francisco, CA
-
Stewart, J.M., Tittel, E., and Chapple, M., Cissp: Certified Information Systems Security Professional Study Guide Sybex, San Francisco, CA 2008.
-
(2008)
Cissp: Certified Information Systems Security Professional Study Guide Sybex
-
-
Stewart, J.M.1
Tittel, E.2
Chapple, M.3
-
2
-
-
40949152760
-
Password authentication schemes: Current status and key issues
-
Tsai, CS, Lee, C.C, and Hwang, M.S., "Password Authentication Schemes: Current Status and Key Issues,", International Journal of Network Security 2006, 3(2), pp. 101-115.
-
International Journal of Network Security 2006
, vol.3
, Issue.2
, pp. 101-115
-
-
Tsai, C.S.1
Lee, C.C.2
Hwang, M.S.3
-
3
-
-
12844275960
-
Password memorability and security: Empirical results
-
Grant, ASan Francisco
-
Yan, J, Blackwell, A, Anderson, R, and Grant, ASan Francisco, "Password Memorability and Security: Empirical Results,", IEEE Security & Privacy 2004, 2(5), pp. 25-31.
-
IEEE Security & Privacy 2004
, vol.2
, Issue.5
, pp. 25-31
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
-
4
-
-
77953963809
-
The true cost of unusable password policies: Password use in the wild
-
Inglesant, P.G., and Sasse, MA, "The True Cost of Unusable Password Policies: Password Use in the Wild,", Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010 pp. 383-392.
-
(2010)
Proceedings of the 28th International Conference on Human Factors in Computing Systems
, pp. 383-392
-
-
Inglesant, P.G.1
Sasse, M.A.2
-
5
-
-
84979173757
-
How does your password measure up? The effect of strength meters on password creation
-
Ur, B, Kelley, P.G, Komanduri, S, Lee, J, Maass, M, Mazurek, M, Passaro, T, Shay, R, Vidas, T, and Bauer, L, "How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation,", Proceedings of the 21st USENIX Conference on Security Symposium, 2012
-
(2012)
Proceedings of the 21st USENIX Conference on Security Symposium
-
-
Ur, B.1
Kelley, P.G.2
Komanduri, S.3
Lee, J.4
Maass, M.5
Mazurek, M.6
Passaro, T.7
Shay, R.8
Vidas, T.9
Bauer, L.10
-
6
-
-
35348884906
-
A large-scale study of web password habits
-
Banff, Alberta, Canada
-
Florêncio, D., and Herley, C., "A Large-Scale Study of Web Password Habits,", Proceedings of the 16th International Conference on World Wide Web, Banff, Alberta, Canada, 2007 pp. 657-666.
-
(2007)
Proceedings of the 16th International Conference on World Wide Web
, pp. 657-666
-
-
Florêncio, D.1
Herley, C.2
-
10
-
-
84865041518
-
Where do security policies come from?
-
Microsoft in Redmond, WA
-
Florêncio, D., and Herley, C., "Where Do Security Policies Come From?,", Symposium on Usable Privacy and Security (SOUPS), Microsoft in Redmond, WA, 2010 pp. 83-93.
-
(2010)
Symposium on Usable Privacy and Security (SOUPS)
, pp. 83-93
-
-
Florêncio, D.1
Herley, C.2
-
11
-
-
84875495633
-
Enhancing password security through interactive fear appeals: A web-based field experiment
-
Hawaii
-
Vance, A., David, E., Kirk, O., and Detmar, S., "Enhancing Password Security through Interactive Fear Appeals: A Web-Based Field Experiment,", 2013 46th Hawaii International Conference on System Sciences (HICSS), Hawaii, 2013 pp. 2988-2997.
-
(2013)
2013 46th Hawaii International Conference on System Sciences (HICSS)
, pp. 2988-2997
-
-
Vance, A.1
David, E.2
Kirk, O.3
Detmar, S.4
-
12
-
-
79958097346
-
The password thicket: Technical and market failures in human authentication on the web
-
Harvard University, USA
-
Bonneau, J., and Preibusch, S., "The Password Thicket: Technical and Market Failures in Human Authentication on the Web,", Proceedings of the Ninth Workshop on the Economics of Information Security, Harvard University, USA, 2010
-
(2010)
Proceedings of the Ninth Workshop on the Economics of Information Security
-
-
Bonneau, J.1
Preibusch, S.2
-
13
-
-
70749087044
-
A behavioral analysis of passphrase design and effectiveness
-
Keith, M., Shao, B., and Steinbart, P., "A Behavioral Analysis of Passphrase Design and Effectiveness,", Journal of the Association for Information Systems 2009, 10(2), pp. 63-89.
-
(2009)
Journal of the Association for Information Systems
, vol.10
, Issue.2
, pp. 63-89
-
-
Keith, M.1
Shao, B.2
Steinbart, P.3
-
14
-
-
39749093168
-
The magical number seven, plus or minus two: Some limits on our capacity for processing information
-
Miller, G., "The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information,", Psychological Review 1956, 63(2), pp. 81-97.
-
Psychological Review 1956
, vol.63
, Issue.2
, pp. 81-97
-
-
Miller, G.1
-
15
-
-
0033277446
-
Password security: An empirical study
-
Zviran, M., and Haga, W., "Password Security: An Empirical Study,", Journal of Management Information Systems 1999, 15(4), pp. 161-185.
-
(1999)
Journal of Management Information Systems
, vol.15
, Issue.4
, pp. 161-185
-
-
Zviran, M.1
Haga, W.2
-
16
-
-
84869780575
-
A protection motivation theory approach to home wireless security
-
Las Vegas
-
Woon, I., Tan, G., and Low, R., "A Protection Motivation Theory Approach to Home Wireless Security,", Proceedings of the Twenty-Sixth International Conference on Information Systems, Las Vegas, 2005 pp. 367-380.
-
(2005)
Proceedings of the Twenty-Sixth International Conference on Information Systems
, pp. 367-380
-
-
Woon, I.1
Tan, G.2
Low, R.3
-
17
-
-
77957057727
-
Fear appeals and information security behaviors: An empirical study
-
Johnston, A., and Warkentin, M., "Fear Appeals and Information Security Behaviors: An Empirical Study,", MIS Quarterly 2010, 34(3), pp. 549-566.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 549-566
-
-
Johnston, A.1
Warkentin, M.2
-
18
-
-
77951655145
-
Am I really at risk? Determinants of online users' intentions to use strong passwords
-
Zhang, L., and McDowell, W., "Am I Really at Risk? Determinants of Online Users' Intentions to Use Strong Passwords,", Journal of Internet Commerce 2009, 8(3), pp. 180-197.
-
(2009)
Journal of Internet Commerce
, vol.8
, Issue.3
, pp. 180-197
-
-
Zhang, L.1
McDowell, W.2
-
19
-
-
77955121478
-
Understanding security behaviors in personal computer usage: A threat avoidance perspective
-
Liang, H., and Xue, Y., "Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective,", Journal of the Association for Information Systems 2010, 11(7), pp. 394-413.
-
(2010)
Journal of the Association for Information Systems
, vol.11
, Issue.7
, pp. 394-413
-
-
Liang, H.1
Xue, Y.2
-
20
-
-
84861093724
-
Motivating is security compliance: Insights from habit and protection motivation theory
-
Vance, A., Siponen, M., and Pahnila, S., "Motivating Is Security Compliance: Insights from Habit and Protection Motivation Theory,", Information & Management 2012, 49(3-4), pp. 190-198.
-
(2012)
Information & Management
, vol.49
, Issue.3-4
, pp. 190-198
-
-
Vance, A.1
Siponen, M.2
Pahnila, S.3
-
21
-
-
67650166189
-
Threat or coping appraisal: Determinants of smb executives decision to adopt anti-malware software
-
Lee, Y., and Larsen, K.R., "Threat or Coping Appraisal: Determinants of Smb Executives Decision to Adopt Anti-Malware Software,", European Journal of Information Systems 2009, 18(2), pp. 177-187.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 177-187
-
-
Lee, Y.1
Larsen, K.R.2
-
22
-
-
51349158689
-
Security lapses and the omission of information security measures: A threat control model and empirical test
-
Workman, M., Bommer, W.H., and Straub, D., "Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test,", Computers in Human Behavior 2008, 24(6), pp. 2799-2816.
-
(2008)
Computers in Human Behavior
, vol.24
, Issue.6
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.H.2
Straub, D.3
-
23
-
-
0242444871
-
Making passwords secure and usable
-
Adams, A., Sasse, M., and Lunt, P., "Making Passwords Secure and Usable,", People and Computers 1997, pp. 1-20.
-
(1997)
People and Computers
, pp. 1-20
-
-
Adams, A.1
Sasse, M.2
Lunt, P.3
-
24
-
-
0000242433
-
Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change
-
Maddux, J., and Rogers, R., "Protection Motivation and Self-Efficacy: A Revised Theory of Fear Appeals and Attitude Change,", Journal of Experimental Social Psychology 1983, 19(5), pp. 469-479.
-
(1983)
Journal of Experimental Social Psychology
, vol.19
, Issue.5
, pp. 469-479
-
-
Maddux, J.1
Rogers, R.2
-
25
-
-
0001840352
-
A protection motivation theory of fear appeals and attitude change
-
Rogers, R., "A Protection Motivation Theory of Fear Appeals and Attitude Change,", Journal of Psychology 1975, 91(1), pp. 93-114.
-
(1975)
Journal of Psychology
, vol.91
, Issue.1
, pp. 93-114
-
-
Rogers, R.1
-
26
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
Herath, T., and Rao, H.R., "Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations,", European Journal of Information Systems 2009, 18(2), pp. 106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
27
-
-
77149132467
-
Compliance with information security policies: An empirical investigation
-
Siponen, M., Pahnila, S., and Mahmood, M.A., "Compliance with Information Security Policies: An Empirical Investigation,", Computer 2010, 43(2), pp. 64-71.
-
(2010)
Computer
, vol.43
, Issue.2
, pp. 64-71
-
-
Siponen, M.1
Pahnila, S.2
Mahmood, M.A.3
-
28
-
-
0003434293
-
-
Sage Publications, Beverly Hills, CA
-
Skogan, W., and Maxfield, M., Coping with Crime: Individual and Neighborhood Reactions Sage Publications, Beverly Hills, CA 1981.
-
(1981)
Coping with Crime: Individual and Neighborhood Reactions
-
-
Skogan, W.1
Maxfield, M.2
-
30
-
-
84880753888
-
Relationships between password choices, perceptions of risk and security expertise
-
Springer
-
Creese, S., Hodges, D., Jamison-Powell, S., and Whitty, M. (2013). Relationships between Password Choices, Perceptions of Risk and Security Expertise Human Aspects of Information Security, Privacy, and Trust (pp. 80-89): Springer.
-
(2013)
Human Aspects of Information Security, Privacy, and Trust
, pp. 80-89
-
-
Creese, S.1
Hodges, D.2
Jamison-Powell, S.3
Whitty, M.4
-
31
-
-
0033622371
-
Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory
-
Milne, S., and Milne, "Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory,", Journal of Applied Social Psychology 2000, 30(1), pp. 106.
-
(2000)
Journal of Applied Social Psychology
, vol.30
, Issue.1
, pp. 106
-
-
Milne, S.1
Milne2
-
32
-
-
0023304222
-
Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat
-
Rippetoe, P., and Rogers, R., "Effects of Components of Protection-Motivation Theory on Adaptive and Maladaptive Coping with a Health Threat,", Journal of Personality and Social Psychology 1987, 52(3), pp. 596-604.
-
(1987)
Journal of Personality and Social Psychology
, vol.52
, Issue.3
, pp. 596-604
-
-
Rippetoe, P.1
Rogers, R.2
-
33
-
-
0036106081
-
Combining motivational and volitional interventions to promote exercise participation: Protection motivation theory and implementation intentions
-
Milne, S., Orbell, S., and Sheeran, P., "Combining Motivational and Volitional Interventions to Promote Exercise Participation: Protection Motivation Theory and Implementation Intentions,", British Journal of Health Psychology 2002, 7(2), pp. 163-184.
-
(2002)
British Journal of Health Psychology
, vol.7
, Issue.2
, pp. 163-184
-
-
Milne, S.1
Orbell, S.2
Sheeran, P.3
-
34
-
-
49149116092
-
Computer self-efficacy: Development of a measure and initial test
-
Compeau, D., and Higgins, C., "Computer Self-Efficacy: Development of a Measure and Initial Test,", MIS Quarterly 1995, 19(2), pp. 189-211.
-
(1995)
MIS Quarterly
, vol.19
, Issue.2
, pp. 189-211
-
-
Compeau, D.1
Higgins, C.2
-
35
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
Bulgurcu, B., Cavusoglu, H., and Benbasat, I., "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness,", MIS Quarterly 2010, 34(3), pp. 523-548.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
37
-
-
84902287420
-
Choosing and protecting passwords
-
McDowell, M., Rafail, J., and Hernan, S., "Choosing and Protecting Passwords,", Retrieved October 2010 from the World Wide Web, 2009.
-
(2009)
Retrieved October 2010 from the World Wide Web
-
-
McDowell, M.1
Rafail, J.2
Hernan, S.3
-
38
-
-
0003506109
-
-
Prentice Hall, Upper Saddle River, NJ
-
Hair, J., Black, W., Babin, B., Anderson, R., and Tatham, R., Multivariate Data Analysis Prentice Hall, Upper Saddle River, NJ 2010.
-
(2010)
Multivariate Data Analysis
-
-
Hair, J.1
Black, W.2
Babin, B.3
Anderson, R.4
Tatham, R.5
-
39
-
-
55449084838
-
Testing for multigroup equivalence of a measuring instrument: A walk through the process
-
Byrne, B.M., "Testing for Multigroup Equivalence of a Measuring Instrument: A Walk through the Process,", Psicothema 2008, 20(4), pp. 872-882.
-
(2008)
Psicothema
, vol.20
, Issue.4
, pp. 872-882
-
-
Byrne, B.M.1
-
40
-
-
84857931598
-
Forget the fluff: Examining how media richness influences the impact of information security training on secure behavior
-
2012 45th Hawaii International Conference on
-
Jenkins, J.L., Durcikova, A., and Burns, M.B., "Forget the Fluff: Examining How Media Richness Influences the Impact of Information Security Training on Secure Behavior,", System Science (HICSS), 2012 45th Hawaii International Conference on, 2012 pp. 3288-3296.
-
(2012)
System Science (HICSS)
, pp. 3288-3296
-
-
Jenkins, J.L.1
Durcikova, A.2
Burns, M.B.3
-
41
-
-
0033768584
-
Perceived probability, perceived severity, and health-protective behavior
-
Weinstein, N., "Perceived Probability, Perceived Severity, and Health-Protective Behavior,", Health Psychology 2000, 19(1), pp. 65-74.
-
(2000)
Health Psychology
, vol.19
, Issue.1
, pp. 65-74
-
-
Weinstein, N.1
|