-
3
-
-
17844366573
-
Analysis of end user security behaviours
-
Stanton, J. M., Stam, K. R., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviours. Computers & Security. 24, 124-133 (2005)
-
(2005)
Computers & Security
, vol.24
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
4
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly. 34, 523-548 (2010)
-
(2010)
MIS Quarterly
, vol.34
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
5
-
-
84856018908
-
Understanding information systems security policy compliance: An integration of the theory of planned behaviour and the protection motivation theory
-
Ifinedo, P.: Understanding information systems security policy compliance: An integration of the theory of planned behaviour and the protection motivation theory. Computers & Security. 31, 83-95 (2012)
-
(2012)
Computers & Security
, vol.31
, pp. 83-95
-
-
Ifinedo, P.1
-
6
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
Herath, T., Rao, H. R.: Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems. 18, 2, 106-125 (2009)
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
7
-
-
67349144062
-
Encouraging information security behaviours in organisations: Role of penalties, pressures and perceived effectiveness
-
Herath, T., Rao, H. R.: Encouraging information security behaviours in organisations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems. 47, 2, 154-165 (2009)
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 154-165
-
-
Herath, T.1
Rao, H.R.2
-
8
-
-
33746766203
-
The role of theory in developing effective health communications
-
Fishbein, M., Cappella, J. N.: The role of theory in developing effective health communications. Journal of Communication. 56, S1-S17 (2006)
-
(2006)
Journal of Communication
, vol.56
, pp. S1-S17
-
-
Fishbein, M.1
Cappella, J.N.2
-
9
-
-
77957077814
-
Practicing safe computing: A multimedia empirical examination of home computer user security behavioural intentions
-
Anderson, C. L., Agarwal, R.: Practicing safe computing: a multimedia empirical examination of home computer user security behavioural intentions. MIS Quarterly. 34, 3, 613-643 (2010)
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 613-643
-
-
Anderson, C.L.1
Agarwal, R.2
-
10
-
-
78650770842
-
Improving employees' compliance through information systems security training: An action research study
-
Puhakainen, P., Siponen, M.: Improving employees' compliance through information systems security training: An action research study. MIS Quarterly. 34, 757-778 (2010)
-
(2010)
MIS Quarterly
, vol.34
, pp. 757-778
-
-
Puhakainen, P.1
Siponen, M.2
-
11
-
-
77956187913
-
It won't happen to me: Promoting secure behaviour among internet users
-
Davinson, N., Sillence, E.: It won't happen to me: Promoting secure behaviour among internet users. Computers in Human Behaviour. 26, 1739-1747 (2010)
-
(2010)
Computers in Human Behaviour
, vol.26
, pp. 1739-1747
-
-
Davinson, N.1
Sillence, E.2
-
12
-
-
40949147823
-
The qualitative content analysis process
-
Elo, S., Kyngäs, H.: The qualitative content analysis process. Journal of advanced nursing. 62, 1, 107-115 (2008)
-
(2008)
Journal of Advanced Nursing
, vol.62
, Issue.1
, pp. 107-115
-
-
Elo, S.1
Kyngäs, H.2
-
13
-
-
85011237933
-
'I wanna tell you a story': Exploring the application of vignettes in qualitative research with children and young people
-
Barter, C, Renold, E.: 'I wanna tell you a story': exploring the application of vignettes in qualitative research with children and young people. International Journal of Social Research Methodology. 3, 4, 307-323 (2000)
-
(2000)
International Journal of Social Research Methodology
, vol.3
, Issue.4
, pp. 307-323
-
-
Barter, C.1
Renold, E.2
-
14
-
-
0001457476
-
Qualitative data analysis for applied policy research
-
Bryman, A. & Burgess, R. G. eds., Sage, London
-
Ritchie, J., Spencer, L.: Qualitative data analysis for applied policy research. In: Bryman, A. & Burgess, R. G. [eds.] "Analyzing qualitative data". Sage, London. (1994)
-
(1994)
Analyzing Qualitative Data
-
-
Ritchie, J.1
Spencer, L.2
-
15
-
-
47749113622
-
A taxonomy of behavior change techniques used in interventions
-
Abraham, C, Michie, S.: A taxonomy of behavior change techniques used in interventions. Health psychology. 27, 3, 379 (2008)
-
(2008)
Health Psychology
, vol.27
, Issue.3
, pp. 379
-
-
Abraham, C.1
Michie, S.2
-
16
-
-
0034675239
-
Framework for design and evaluation of complex interventions to improve health
-
Campbell, M., Fitzpatrick, R., Haines, A., Kinmonth, A. L., Sandercock, P., Spiegelhalter, D., Tyrer, P.: Framework for design and evaluation of complex interventions to improve health. BMJ: British Medical Journal. 321, 7262, 694 (2000)
-
(2000)
BMJ: British Medical Journal
, vol.321
, Issue.7262
, pp. 694
-
-
Campbell, M.1
Fitzpatrick, R.2
Haines, A.3
Kinmonth, A.L.4
Sandercock, P.5
Spiegelhalter, D.6
Tyrer, P.7
-
18
-
-
84865766376
-
-
Cabinet Office-Behavioural Insights Team
-
Haynes, L., Goldacre, B., Torgerson, D.: Test, learn, adapt: developing public policy with randomised controlled trials. Cabinet Office-Behavioural Insights Team (2012)
-
(2012)
Test, Learn, Adapt: Developing Public Policy with Randomised Controlled Trials
-
-
Haynes, L.1
Goldacre, B.2
Torgerson, D.3
-
19
-
-
61349092288
-
Studying users' computer security behaviour: A health belief perspective
-
Ng, B.-Y., Kankanhalli, A., Xu, Y.: Studying users' computer security behaviour: A health belief perspective. Decision Support Systems. 46, 4, 815-825 (2009)
-
(2009)
Decision Support Systems
, vol.46
, Issue.4
, pp. 815-825
-
-
Ng, B.-Y.1
Kankanhalli, A.2
Xu, Y.3
|