메뉴 건너뛰기




Volumn , Issue , 2014, Pages 3188-3197

Improving compliance with password guidelines: How user perceptions of passwords and security threats affect compliance with guidelines

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY SYSTEMS; SYSTEMS SCIENCE;

EID: 84902243096     PISSN: 15301605     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2014.396     Document Type: Conference Paper
Times cited : (35)

References (41)
  • 3
    • 12844275960 scopus 로고    scopus 로고
    • Password memorability and security: Empirical results
    • Grant, ASan Francisco
    • Yan, J, Blackwell, A, Anderson, R, and Grant, ASan Francisco, "Password Memorability and Security: Empirical Results,", IEEE Security & Privacy 2004, 2(5), pp. 25-31.
    • IEEE Security & Privacy 2004 , vol.2 , Issue.5 , pp. 25-31
    • Yan, J.1    Blackwell, A.2    Anderson, R.3
  • 14
    • 39749093168 scopus 로고    scopus 로고
    • The magical number seven, plus or minus two: Some limits on our capacity for processing information
    • Miller, G., "The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information,", Psychological Review 1956, 63(2), pp. 81-97.
    • Psychological Review 1956 , vol.63 , Issue.2 , pp. 81-97
    • Miller, G.1
  • 17
    • 77957057727 scopus 로고    scopus 로고
    • Fear appeals and information security behaviors: An empirical study
    • Johnston, A., and Warkentin, M., "Fear Appeals and Information Security Behaviors: An Empirical Study,", MIS Quarterly 2010, 34(3), pp. 549-566.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 549-566
    • Johnston, A.1    Warkentin, M.2
  • 18
    • 77951655145 scopus 로고    scopus 로고
    • Am I really at risk? Determinants of online users' intentions to use strong passwords
    • Zhang, L., and McDowell, W., "Am I Really at Risk? Determinants of Online Users' Intentions to Use Strong Passwords,", Journal of Internet Commerce 2009, 8(3), pp. 180-197.
    • (2009) Journal of Internet Commerce , vol.8 , Issue.3 , pp. 180-197
    • Zhang, L.1    McDowell, W.2
  • 19
    • 77955121478 scopus 로고    scopus 로고
    • Understanding security behaviors in personal computer usage: A threat avoidance perspective
    • Liang, H., and Xue, Y., "Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective,", Journal of the Association for Information Systems 2010, 11(7), pp. 394-413.
    • (2010) Journal of the Association for Information Systems , vol.11 , Issue.7 , pp. 394-413
    • Liang, H.1    Xue, Y.2
  • 20
    • 84861093724 scopus 로고    scopus 로고
    • Motivating is security compliance: Insights from habit and protection motivation theory
    • Vance, A., Siponen, M., and Pahnila, S., "Motivating Is Security Compliance: Insights from Habit and Protection Motivation Theory,", Information & Management 2012, 49(3-4), pp. 190-198.
    • (2012) Information & Management , vol.49 , Issue.3-4 , pp. 190-198
    • Vance, A.1    Siponen, M.2    Pahnila, S.3
  • 21
    • 67650166189 scopus 로고    scopus 로고
    • Threat or coping appraisal: Determinants of smb executives decision to adopt anti-malware software
    • Lee, Y., and Larsen, K.R., "Threat or Coping Appraisal: Determinants of Smb Executives Decision to Adopt Anti-Malware Software,", European Journal of Information Systems 2009, 18(2), pp. 177-187.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 177-187
    • Lee, Y.1    Larsen, K.R.2
  • 22
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • Workman, M., Bommer, W.H., and Straub, D., "Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test,", Computers in Human Behavior 2008, 24(6), pp. 2799-2816.
    • (2008) Computers in Human Behavior , vol.24 , Issue.6 , pp. 2799-2816
    • Workman, M.1    Bommer, W.H.2    Straub, D.3
  • 24
    • 0000242433 scopus 로고
    • Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change
    • Maddux, J., and Rogers, R., "Protection Motivation and Self-Efficacy: A Revised Theory of Fear Appeals and Attitude Change,", Journal of Experimental Social Psychology 1983, 19(5), pp. 469-479.
    • (1983) Journal of Experimental Social Psychology , vol.19 , Issue.5 , pp. 469-479
    • Maddux, J.1    Rogers, R.2
  • 25
    • 0001840352 scopus 로고
    • A protection motivation theory of fear appeals and attitude change
    • Rogers, R., "A Protection Motivation Theory of Fear Appeals and Attitude Change,", Journal of Psychology 1975, 91(1), pp. 93-114.
    • (1975) Journal of Psychology , vol.91 , Issue.1 , pp. 93-114
    • Rogers, R.1
  • 26
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organisations
    • Herath, T., and Rao, H.R., "Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations,", European Journal of Information Systems 2009, 18(2), pp. 106-125.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 27
    • 77149132467 scopus 로고    scopus 로고
    • Compliance with information security policies: An empirical investigation
    • Siponen, M., Pahnila, S., and Mahmood, M.A., "Compliance with Information Security Policies: An Empirical Investigation,", Computer 2010, 43(2), pp. 64-71.
    • (2010) Computer , vol.43 , Issue.2 , pp. 64-71
    • Siponen, M.1    Pahnila, S.2    Mahmood, M.A.3
  • 31
    • 0033622371 scopus 로고    scopus 로고
    • Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory
    • Milne, S., and Milne, "Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory,", Journal of Applied Social Psychology 2000, 30(1), pp. 106.
    • (2000) Journal of Applied Social Psychology , vol.30 , Issue.1 , pp. 106
    • Milne, S.1    Milne2
  • 32
    • 0023304222 scopus 로고
    • Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat
    • Rippetoe, P., and Rogers, R., "Effects of Components of Protection-Motivation Theory on Adaptive and Maladaptive Coping with a Health Threat,", Journal of Personality and Social Psychology 1987, 52(3), pp. 596-604.
    • (1987) Journal of Personality and Social Psychology , vol.52 , Issue.3 , pp. 596-604
    • Rippetoe, P.1    Rogers, R.2
  • 33
    • 0036106081 scopus 로고    scopus 로고
    • Combining motivational and volitional interventions to promote exercise participation: Protection motivation theory and implementation intentions
    • Milne, S., Orbell, S., and Sheeran, P., "Combining Motivational and Volitional Interventions to Promote Exercise Participation: Protection Motivation Theory and Implementation Intentions,", British Journal of Health Psychology 2002, 7(2), pp. 163-184.
    • (2002) British Journal of Health Psychology , vol.7 , Issue.2 , pp. 163-184
    • Milne, S.1    Orbell, S.2    Sheeran, P.3
  • 34
    • 49149116092 scopus 로고
    • Computer self-efficacy: Development of a measure and initial test
    • Compeau, D., and Higgins, C., "Computer Self-Efficacy: Development of a Measure and Initial Test,", MIS Quarterly 1995, 19(2), pp. 189-211.
    • (1995) MIS Quarterly , vol.19 , Issue.2 , pp. 189-211
    • Compeau, D.1    Higgins, C.2
  • 35
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    • Bulgurcu, B., Cavusoglu, H., and Benbasat, I., "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness,", MIS Quarterly 2010, 34(3), pp. 523-548.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 39
    • 55449084838 scopus 로고    scopus 로고
    • Testing for multigroup equivalence of a measuring instrument: A walk through the process
    • Byrne, B.M., "Testing for Multigroup Equivalence of a Measuring Instrument: A Walk through the Process,", Psicothema 2008, 20(4), pp. 872-882.
    • (2008) Psicothema , vol.20 , Issue.4 , pp. 872-882
    • Byrne, B.M.1
  • 40
    • 84857931598 scopus 로고    scopus 로고
    • Forget the fluff: Examining how media richness influences the impact of information security training on secure behavior
    • 2012 45th Hawaii International Conference on
    • Jenkins, J.L., Durcikova, A., and Burns, M.B., "Forget the Fluff: Examining How Media Richness Influences the Impact of Information Security Training on Secure Behavior,", System Science (HICSS), 2012 45th Hawaii International Conference on, 2012 pp. 3288-3296.
    • (2012) System Science (HICSS) , pp. 3288-3296
    • Jenkins, J.L.1    Durcikova, A.2    Burns, M.B.3
  • 41
    • 0033768584 scopus 로고    scopus 로고
    • Perceived probability, perceived severity, and health-protective behavior
    • Weinstein, N., "Perceived Probability, Perceived Severity, and Health-Protective Behavior,", Health Psychology 2000, 19(1), pp. 65-74.
    • (2000) Health Psychology , vol.19 , Issue.1 , pp. 65-74
    • Weinstein, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.