메뉴 건너뛰기




Volumn 16, Issue 6, 2015, Pages 448-484

Fake-website detection tools: Identifying elements that promote individuals’ use and enhance their performance

Author keywords

Concocted Websites; Detection Tool; Experimental Design; Protection Motivation Theory; Protective IT Artifact; Spoofed Websites

Indexed keywords

DESIGN OF EXPERIMENTS; INSPECTION EQUIPMENT; MOTIVATION; STATISTICS; TENSORS;

EID: 84932163324     PISSN: 15369323     EISSN: 15583457     Source Type: Journal    
DOI: 10.17705/1jais.00399     Document Type: Article
Times cited : (72)

References (129)
  • 1
    • 70350343383 scopus 로고    scopus 로고
    • A comparison of tools for detecting fake websites
    • Abbasi, A., & Chen, H. (2009a). A comparison of tools for detecting fake websites. IEEE Computer, 42(10), 78-86.
    • (2009) IEEE Computer , vol.42 , Issue.10 , pp. 78-86
    • Abbasi, A.1    Chen, H.2
  • 2
    • 68349154502 scopus 로고    scopus 로고
    • A comparison of fraud cues and classification methods for fake escrow website detection
    • Abbasi, A., & Chen, H. (2009b). A comparison of fraud cues and classification methods for fake escrow website detection. Information Technology and Management, 10(2), 83-101.
    • (2009) Information Technology and Management , vol.10 , Issue.2 , pp. 83-101
    • Abbasi, A.1    Chen, H.2
  • 3
    • 77957045434 scopus 로고    scopus 로고
    • Detecting fake websites: The contribution of statistical learning theory
    • Abbasi, A., Zhang, Z., Zimbra, D., Chen, H., & Nunamaker, J. F., Jr. (2010). Detecting fake websites: The contribution of statistical learning theory. MIS Quarterly, 34(3), 435-461.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 435-461
    • Abbasi, A.1    Zhang, Z.2    Zimbra, D.3    Chen, H.4    Nunamaker, J.F.5
  • 6
    • 80051709626 scopus 로고    scopus 로고
    • The effects of tree-view based presentation adaptation on mobile Web browsing
    • Adipat, B., Zhang, D., & Zhou, L. (2011). The effects of tree-view based presentation adaptation on mobile Web browsing. MIS Quarterly, 35(1), 99-122.
    • (2011) MIS Quarterly , vol.35 , Issue.1 , pp. 99-122
    • Adipat, B.1    Zhang, D.2    Zhou, L.3
  • 8
    • 85002862540 scopus 로고    scopus 로고
    • Alice in warningland: A large-scale field study of browser security warning effectiveness
    • Akhawe, D., & Felt, A. P. (2013). Alice in warningland: A large-scale field study of browser security warning effectiveness. In Proceedings of the 22nd USENIX Security Symposium.
    • (2013) Proceedings of the 22Nd USENIX Security Symposium
    • Akhawe, D.1    Felt, A.P.2
  • 9
    • 84871204538 scopus 로고    scopus 로고
    • 14 arrested for making, selling fake drugs via bogus military medical websites
    • An, B. (2010). 14 arrested for making, selling fake drugs via bogus military medical websites. Xinhua Net. Retrieved from http://big5.xinhuanet.com/gate/big5/news.xinhuanet.com/ english2010/china/2010-02/05/c_13165317.htm
    • (2010) Xinhua Net
    • An, B.1
  • 10
    • 77957077814 scopus 로고    scopus 로고
    • Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions
    • Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613-643.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 613-643
    • Anderson, C.L.1    Agarwal, R.2
  • 11
    • 0000761228 scopus 로고
    • Some methods for respecifying measurement models to obtain unidimensional construct measurement
    • Anderson, J., & Gerbing, D. (1982). Some methods for respecifying measurement models to obtain unidimensional construct measurement. Journal of Marketing Research, 19(4), 453-460.
    • (1982) Journal of Marketing Research , vol.19 , Issue.4 , pp. 453-460
    • Anderson, J.1    Gerbing, D.2
  • 12
    • 66449136652 scopus 로고    scopus 로고
    • Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion
    • Angst, C. M., & Agarwal R. (2009). Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion. MIS Quarterly, 33(2), 339-370.
    • (2009) MIS Quarterly , vol.33 , Issue.2 , pp. 339-370
    • Angst, C.M.1    Agarwal, R.2
  • 13
    • 85081878987 scopus 로고    scopus 로고
    • Internet drug rings and their “killer” online pharmacies
    • Armin, J. (2010). Internet drug rings and their “killer” online pharmacies. Internet Evolution. Retrieved from http://www.internetevolution.com/author.asp?section_id=717&doc_id=191640
    • (2010) Internet Evolution
    • Armin, J.1
  • 14
    • 79958697053 scopus 로고    scopus 로고
    • Measurement and meaning in information systems and organizational research: Methodological and philosophical foundations
    • Bagozzi, R. P. (2011). Measurement and meaning in information systems and organizational research: Methodological and philosophical foundations. MIS Quarterly, 35(2), 261-292.
    • (2011) MIS Quarterly , vol.35 , Issue.2 , pp. 261-292
    • Bagozzi, R.P.1
  • 15
    • 33746878674 scopus 로고
    • Self-efficacy mechanism in human agency
    • Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37(2), 122-147.
    • (1982) American Psychologist , vol.37 , Issue.2 , pp. 122-147
    • Bandura, A.1
  • 18
    • 77951135204 scopus 로고    scopus 로고
    • The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online
    • Bansal, G., Zahedi, F. M., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138-150.
    • (2010) Decision Support Systems , vol.49 , Issue.2 , pp. 138-150
    • Bansal, G.1    Zahedi, F.M.2    Gefen, D.3
  • 19
    • 84870963426 scopus 로고    scopus 로고
    • The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: A multiple-context investigation
    • Bansal, G., Zahedi, F. M., & Gefen, D. (2008). The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: A multiple-context investigation. In Proceedings of 29th International Conference on Information Systems.
    • (2008) Proceedings of 29Th International Conference on Information Systems
    • Bansal, G.1    Zahedi, F.M.2    Gefen, D.3
  • 20
    • 67649723048 scopus 로고    scopus 로고
    • Probabilistic model checking for the quantification of DoS security threats
    • Basagiannis, S., Katsaros, P., Pombortsis, A., & Alexiou, N. (2009). Probabilistic model checking for the quantification of DoS security threats. Computer and Security, 28(6), 450-465.
    • (2009) Computer and Security , vol.28 , Issue.6 , pp. 450-465
    • Basagiannis, S.1    Katsaros, P.2    Pombortsis, A.3    Alexiou, N.4
  • 21
    • 0026954447 scopus 로고
    • On the fit of models to covariances and methodology to the bulletin
    • Bentler, P. M. (1992). On the fit of models to covariances and methodology to the bulletin. Psychological Bulletin, 112(3), 400-404.
    • (1992) Psychological Bulletin , vol.112 , Issue.3 , pp. 400-404
    • Bentler, P.M.1
  • 22
    • 4243159210 scopus 로고
    • Significance tests and goodness of fit in the analysis of covariance structures
    • Bentler P. M., & Bonnett, D.G. (1980). Significance tests and goodness of fit in the analysis of covariance structures. Psychological Bulletin, 88(3), 588-606.
    • (1980) Psychological Bulletin , vol.88 , Issue.3 , pp. 588-606
    • Bentler, P.M.1    Bonnett, D.G.2
  • 23
    • 9744258059 scopus 로고    scopus 로고
    • Inducing sensitivity to deception in order to improve decision making performance: A field study
    • Biros, D. P, George, J. F., & Zmud, R. W. (2002). Inducing sensitivity to deception in order to improve decision making performance: A field study. MIS Quarterly, 26(2), 119-144.
    • (2002) MIS Quarterly , vol.26 , Issue.2 , pp. 119-144
    • Biros, D.P.1    George, J.F.2    Zmud, R.W.3
  • 24
    • 0028808155 scopus 로고
    • Human probability matching behavior in response to alarms of varying reliability
    • Bliss, J. P., Gilson, R. D., & Deaton, J. E. (1995). Human probability matching behavior in response to alarms of varying reliability. Ergonomics, 38(11), 2300-2312.
    • (1995) Ergonomics , vol.38 , Issue.11 , pp. 2300-2312
    • Bliss, J.P.1    Gilson, R.D.2    Deaton, J.E.3
  • 25
    • 9744260316 scopus 로고    scopus 로고
    • Validation in information systems research: A state-of-the-art assessment
    • Boudreau, M.-C., Gefen, D., & Straub, D. W. (2001). Validation in information systems research: A state-of-the-art assessment. MIS Quarterly, 25(1), 1-16.
    • (2001) MIS Quarterly , vol.25 , Issue.1 , pp. 1-16
    • Boudreau, M.-C.1    Gefen, D.2    Straub, D.W.3
  • 26
    • 79953645142 scopus 로고    scopus 로고
    • Bridging the gap in computer security warnings: A mental model approach
    • Bravo-Lillo, C., Cranor, L. F., Downs, J. S., & Komanduri, S. (2011). Bridging the gap in computer security warnings: A mental model approach. IEEE Security and Privacy, 9(2), 18-26.
    • (2011) IEEE Security and Privacy , vol.9 , Issue.2 , pp. 18-26
    • Bravo-Lillo, C.1    Cranor, L.F.2    Downs, J.S.3    Komanduri, S.4
  • 27
    • 0001233581 scopus 로고
    • Alternative ways of assessing model fit
    • In K. A. Bollen & J. S. Long (Eds.), Newbury Park, CA: Sage
    • Browne, M. W., & Cudeck, R. (1993). Alternative ways of assessing model fit. In K. A. Bollen & J. S. Long (Eds.), Testing structural equation models (pp. 445-455). Newbury Park, CA: Sage.
    • (1993) Testing Structural Equation Models , pp. 445-455
    • Browne, M.W.1    Cudeck, R.2
  • 28
    • 70350230128 scopus 로고    scopus 로고
    • Mental models of privacy and security
    • Camp, L. J. (2009). Mental models of privacy and security. IEEE Technology and Society Magazine, 28(3), 37-46.
    • (2009) IEEE Technology and Society Magazine , vol.28 , Issue.3 , pp. 37-46
    • Camp, L.J.1
  • 29
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology security architecture
    • Cavusoglu, H., Mishra, B., & Raghunathan, S. (2005). The value of intrusion detection systems in information technology security architecture. Information Systems Research, 16(1), 28-46.
    • (2005) Information Systems Research , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 32
    • 79955877407 scopus 로고    scopus 로고
    • Interface design elements for anti-phishing systems
    • In H. Jain, A. P. Sinha, & P. Vitharana (Eds.), Berlin: Springer-Verlag
    • Chen, Y., Zahedi, M., & Abbasi, A. (2011). Interface design elements for anti-phishing systems. In H. Jain, A. P. Sinha, & P. Vitharana (Eds.), Service-oriented perspectives in design science research (Vol. 6629, pp. 253-265). Berlin: Springer-Verlag.
    • (2011) Service-Oriented Perspectives in Design Science Research , vol.6629 , pp. 253-265
    • Chen, Y.1    Zahedi, M.2    Abbasi, A.3
  • 33
    • 77649125818 scopus 로고    scopus 로고
    • Exploring the interactive effect of time control and justice perception on job attitudes
    • Chen, Z., Zhang, X., Leung, K., & Zhou, F. (2010). Exploring the interactive effect of time control and justice perception on job attitudes. The Journal of Social Psychology, 150(2), 181-197.
    • (2010) The Journal of Social Psychology , vol.150 , Issue.2 , pp. 181-197
    • Chen, Z.1    Zhang, X.2    Leung, K.3    Zhou, F.4
  • 34
    • 55949130648 scopus 로고    scopus 로고
    • A fast form approach to measuring technology acceptance and other constructs
    • Chin W.W., Johnson, N., & Schwarz, A. (2008). A fast form approach to measuring technology acceptance and other constructs. MIS Quarterly, 32(4), 687-703.
    • (2008) MIS Quarterly , vol.32 , Issue.4 , pp. 687-703
    • Chin, W.W.1    Johnson, N.2    Schwarz, A.3
  • 36
    • 7244245467 scopus 로고    scopus 로고
    • Fighting Internet auction fraud: An assessment and proposal
    • Chua, C. E. H., & Wareham, J. (2004). Fighting Internet auction fraud: An assessment and proposal. IEEE Computer, 37(10), 31-37.
    • (2004) IEEE Computer , vol.37 , Issue.10 , pp. 31-37
    • Chua, C.1    Wareham, J.2
  • 38
    • 49149116092 scopus 로고
    • Computer self-efficacy: Development of a measure and initial test
    • Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: Development of a measure and initial test. MIS Quarterly, 9(2), 189-211.
    • (1995) MIS Quarterly , vol.9 , Issue.2 , pp. 189-211
    • Compeau, D.R.1    Higgins, C.A.2
  • 39
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    • Davis, F. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340.
    • (1989) MIS Quarterly , vol.13 , Issue.3 , pp. 319-340
    • Davis, F.1
  • 40
    • 0002865976 scopus 로고
    • Deceiving and Detecting Deceit
    • In B. R. Schlenker (Ed.), New York, NY: McGraw-Hill Book Company
    • DePaulo, B. M., Stone, J. I., & Lassiter, G. D. (1985). Deceiving and Detecting Deceit. In B. R. Schlenker (Ed.), The self and social life, New York, NY: McGraw-Hill Book Company.
    • (1985) The Self and Social Life
    • Depaulo, B.M.1    Stone, J.I.2    Lassiter, G.D.3
  • 42
    • 33749551929 scopus 로고    scopus 로고
    • Why spoofing is serious internet fraud
    • Dinev, T. (2006). Why spoofing is serious internet fraud. Communications of the ACM, 49(10), 76-82.
    • (2006) Communications of the ACM , vol.49 , Issue.10 , pp. 76-82
    • Dinev, T.1
  • 43
    • 49049114397 scopus 로고    scopus 로고
    • The centrality of awareness in the formation of user behavioral intention toward protective information technologies
    • Dinev, T., & Hu, Q. (2007). The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of AIS, 8(7), 386-408.
    • (2007) Journal of AIS , vol.8 , Issue.7 , pp. 386-408
    • Dinev, T.1    Hu, Q.2
  • 46
    • 33846192369 scopus 로고    scopus 로고
    • Clicking for pills
    • Easton, G. (2007). Clicking for pills. British Medical Journal, 334(7583), 14-15.
    • (2007) British Medical Journal , vol.334 , Issue.7583 , pp. 14-15
    • Easton, G.1
  • 50
    • 0000009769 scopus 로고
    • Evaluating structural equation models with unobservable variables and measurement error
    • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50.
    • (1981) Journal of Marketing Research , vol.18 , Issue.1 , pp. 39-50
    • Fornell, C.1    Larcker, D.F.2
  • 51
    • 0042976060 scopus 로고    scopus 로고
    • The importance of time congruity in the organization
    • Francis-Smythe, J. A., & Robertson, I. T. (2003). The importance of time congruity in the organization. Applied Psychology, 52(2), 298-321.
    • (2003) Applied Psychology , vol.52 , Issue.2 , pp. 298-321
    • Francis-Smythe, J.A.1    Robertson, I.T.2
  • 54
    • 0034226904 scopus 로고    scopus 로고
    • Perils of internet fraud: An empirical investigation of deception and trust with experienced internet consumers
    • Grazioli, S., & Jarvenpaa, S. L. (2000). Perils of internet fraud: An empirical investigation of deception and trust with experienced internet consumers. IEEE Transactions on Systems, Man, and Cybernetics: Part A, 20(4), 395-410.
    • (2000) IEEE Transactions on Systems, Man, and Cybernetics: Part A , vol.20 , Issue.4 , pp. 395-410
    • Grazioli, S.1    Jarvenpaa, S.L.2
  • 55
    • 3142664237 scopus 로고    scopus 로고
    • Consumer and business deception on the Internet: Content analysis of documentary evidence
    • Grazioli, S., & Jarvenpaa, S. L. (2003). Consumer and business deception on the Internet: Content analysis of documentary evidence. International Journal of Electronic Commerce, 7(4), 93-118.
    • (2003) International Journal of Electronic Commerce , vol.7 , Issue.4 , pp. 93-118
    • Grazioli, S.1    Jarvenpaa, S.L.2
  • 57
    • 27344439205 scopus 로고    scopus 로고
    • Spam: It’s not just for inboxes anymore
    • Gyongyi, Z., & Garcia-Molina, H. (2005). Spam: It’s not just for inboxes anymore. IEEE Computer, 38(10), 28-34.
    • (2005) IEEE Computer , vol.38 , Issue.10 , pp. 28-34
    • Gyongyi, Z.1    Garcia-Molina, H.2
  • 58
    • 54049142548 scopus 로고    scopus 로고
    • Security and identification indicators for browsers against spoofing and phishing attacks
    • Herzberg, A., & Jbara, A. (2008). Security and identification indicators for browsers against spoofing and phishing attacks. ACM Transactions on Internet Technology, 8(4), 1-36.
    • (2008) ACM Transactions on Internet Technology , vol.8 , Issue.4 , pp. 1-36
    • Herzberg, A.1    Jbara, A.2
  • 59
    • 84897933983 scopus 로고    scopus 로고
    • A framework and guidelines for context-specific theorizing in information systems research
    • Hong, W., Chan, F. Y. K., Thong, J. Y. L., Chasalow, L. C., & Dhillon, G. (2014). A framework and guidelines for context-specific theorizing in information systems research. Information Systems Research, 35(1), 111-136.
    • (2014) Information Systems Research , vol.35 , Issue.1 , pp. 111-136
    • Hong, W.1    Chan, F.2    Thong, J.3    Chasalow, L.C.4    Dhillon, G.5
  • 60
    • 67650706330 scopus 로고    scopus 로고
    • Cut-off criteria for fit indexes in covariance matrix analysis: Conventional criteria versus new alternatives
    • Hu, L., & Bentler, P. M. (1999). Cut-off criteria for fit indexes in covariance matrix analysis: Conventional criteria versus new alternatives. Structural Equation Modeling, 6(1), 1-55.
    • (1999) Structural Equation Modeling , vol.6 , Issue.1 , pp. 1-55
    • Hu, L.1    Bentler, P.M.2
  • 61
    • 0036442295 scopus 로고    scopus 로고
    • Expert versus novice use of the executive support systems: An empirical study
    • Hung, S. Y. (2003). Expert versus novice use of the executive support systems: An empirical study. Information and Management, 40(3), 177-189.
    • (2003) Information and Management , vol.40 , Issue.3 , pp. 177-189
    • Hung, S.Y.1
  • 62
    • 0001080103 scopus 로고    scopus 로고
    • Personal computing acceptance factors in small firms: A structural equation model
    • Igbaria, M., Zinatelli, N., Cragg, P., & Cavaye A. L. M. (1997). Personal computing acceptance factors in small firms: A structural equation model. MIS Quarterly, 21(3), 279-302.
    • (1997) MIS Quarterly , vol.21 , Issue.3 , pp. 279-302
    • Igbaria, M.1    Zinatelli, N.2    Cragg, P.3    Cavaye, A.4
  • 65
    • 33646423850 scopus 로고    scopus 로고
    • The essential impact of context on organizational behavior
    • Johns, G. (2006). The essential impact of context on organizational behavior. Academy of Management Review, 31(2), 386-408.
    • (2006) Academy of Management Review , vol.31 , Issue.2 , pp. 386-408
    • Johns, G.1
  • 66
    • 0035740371 scopus 로고    scopus 로고
    • Detecting deception: Adversarial problem solving in a low base rate world
    • Johnson, P. E., Grazioli, S., Jamal, K., & Berryman, G. (2001). Detecting deception: Adversarial problem solving in a low base rate world. Cognitive Science, 25(3), 355-392.
    • (2001) Cognitive Science , vol.25 , Issue.3 , pp. 355-392
    • Johnson, P.E.1    Grazioli, S.2    Jamal, K.3    Berryman, G.4
  • 67
    • 77957057727 scopus 로고    scopus 로고
    • Fear appeals and information security behaviors: An empirical study
    • Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3), 549-566.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 549-566
    • Johnston, A.C.1    Warkentin, M.2
  • 69
    • 0002993699 scopus 로고    scopus 로고
    • A user-centered design approach to personalization
    • Kramer, J., Noronha, S., & Vergo, J. (2000). A user-centered design approach to personalization. Communications of the ACM, 43(8), 45-48.
    • (2000) Communications of the ACM , vol.43 , Issue.8 , pp. 45-48
    • Kramer, J.1    Noronha, S.2    Vergo, J.3
  • 70
    • 84893536110 scopus 로고    scopus 로고
    • Few online “Canadian pharmacies” based in Canada, FDA says
    • Krebs, B. (2005). Few online “Canadian pharmacies” based in Canada, FDA says. WashingtonPost.com.
    • (2005) Washingtonpost.Com
    • Krebs, B.1
  • 73
    • 34249853668 scopus 로고    scopus 로고
    • Usability evaluation of anti-phishing toolbars
    • Li, L., & Helenius, M. (2007). Usability evaluation of anti-phishing toolbars. Journal in Computer Virology, 3(2), 163-184.
    • (2007) Journal in Computer Virology , vol.3 , Issue.2 , pp. 163-184
    • Li, L.1    Helenius, M.2
  • 74
    • 33748626273 scopus 로고    scopus 로고
    • Digital inclusiveness—longitudinal study of internet adoption by older adults
    • Lam, C. Y., & Lee, M. K. O. (2006). Digital inclusiveness—longitudinal study of internet adoption by older adults. Journal of Management Information Systems, 22(4), 177-306.
    • (2006) Journal of Management Information Systems , vol.22 , Issue.4 , pp. 177-306
    • Lam, C.Y.1    Lee, M.2
  • 75
    • 84859702088 scopus 로고    scopus 로고
    • Text mining and probabilistic language modeling for online review spam detection
    • Lau, R. Y. K., Liao, S. Y., Kwok, R. C., Xu, K., Xia, Y., & Li, Y. (2011). Text mining and probabilistic language modeling for online review spam detection. ACM Transactions on MIS, 2(4), 1-25.
    • (2011) ACM Transactions on MIS , vol.2 , Issue.4 , pp. 1-25
    • Lau, R.1    Liao, S.Y.2    Kwok, R.C.3    Xu, K.4    Xia, Y.5    Li, Y.6
  • 76
    • 0036093229 scopus 로고    scopus 로고
    • Toward cost-sensitive modeling for intrusion detection and response
    • Lee, W., Fan, W., Miller, M., Stolfo, S., & Zadok, E. (2002). Toward cost-sensitive modeling for intrusion detection and response. Journal of Computer Security, 10(1/2), 5-22.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 5-22
    • Lee, W.1    Fan, W.2    Miller, M.3    Stolfo, S.4    Zadok, E.5
  • 77
    • 85081874157 scopus 로고    scopus 로고
    • Cisco: Targeted attacks cost organizations $1.29 billion annually
    • Lennon, M. (2011). Cisco: Targeted attacks cost organizations $1.29 billion annually. Security Week.
    • (2011) Security Week
    • Lennon, M.1
  • 78
    • 4644242309 scopus 로고    scopus 로고
    • Illegal, inappropriate, and unethical behavior in an information technology context: A study to explain influences
    • Leonard, L. N. K., & Cronan, T. P. (2001). Illegal, inappropriate, and unethical behavior in an information technology context: A study to explain influences. Journal of the Association for Information Systems, 1(12), 1-31.
    • (2001) Journal of the Association for Information Systems , vol.1 , Issue.12 , pp. 1-31
    • Leonard, L.1    Cronan, T.P.2
  • 79
    • 60649084770 scopus 로고    scopus 로고
    • Avoidance of information technology threats: A theoretical perspective
    • Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33(1), 71-90.
    • (2009) MIS Quarterly , vol.33 , Issue.1 , pp. 71-90
    • Liang, H.1    Xue, Y.2
  • 80
    • 77955121478 scopus 로고    scopus 로고
    • Understanding security behaviors in personal computer usage: A threat avoidance perspective
    • Liang, H., & Xue, Y. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 394-413.
    • (2010) Journal of the Association for Information Systems , vol.11 , Issue.7 , pp. 394-413
    • Liang, H.1    Xue, Y.2
  • 81
    • 21344476094 scopus 로고
    • Time management: Test of a process model
    • Macan, T. H. (1994). Time management: Test of a process model. Journal of Applied Psychology, 79, 381-391.
    • (1994) Journal of Applied Psychology , vol.79 , pp. 381-391
    • Macan, T.H.1
  • 82
    • 13244298307 scopus 로고    scopus 로고
    • Internet users’ information privacy concern (IUIPC): The construct, the scale, and a causal model
    • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concern (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355.
    • (2004) Information Systems Research , vol.15 , Issue.4 , pp. 336-355
    • Malhotra, N.K.1    Kim, S.S.2    Agarwal, J.3
  • 83
    • 85081874131 scopus 로고    scopus 로고
    • Who is popping all those pills?
    • Maris, D. (2012). Who is popping all those pills? Forbes Magazine.
    • (2012) Forbes Magazine
    • Maris, D.1
  • 84
    • 21444456209 scopus 로고    scopus 로고
    • A review and synthesis of research evidence for self-efficacy-enhancing interventions for reducing chronic disability: Implications for health education practice (part II)
    • Marks, R., & Allegrante, J. P. (2005). A review and synthesis of research evidence for self-efficacy-enhancing interventions for reducing chronic disability: Implications for health education practice (part II). Health Promotion Practice, 6(2), 148-156.
    • (2005) Health Promotion Practice , vol.6 , Issue.2 , pp. 148-156
    • Marks, R.1    Allegrante, J.P.2
  • 87
    • 0036737236 scopus 로고    scopus 로고
    • Developing and validating trust measures for e-commerce: An integrative typology
    • McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334-359.
    • (2002) Information Systems Research , vol.13 , Issue.3 , pp. 334-359
    • McKnight, D.H.1    Choudhury, V.2    Kacmar, C.3
  • 88
    • 0033622371 scopus 로고    scopus 로고
    • Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory
    • Milne, S., Sheeran, P., & Orbell, S. (2000). Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory. Journal of Applied Social Psychology, 30(1), 106-143.
    • (2000) Journal of Applied Social Psychology , vol.30 , Issue.1 , pp. 106-143
    • Milne, S.1    Sheeran, P.2    Orbell, S.3
  • 89
    • 73449149291 scopus 로고
    • Development of an instrument to measure the perceptions of adopting an information technology innovation
    • Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192-222.
    • (1991) Information Systems Research , vol.2 , Issue.3 , pp. 192-222
    • Moore, G.C.1    Benbasat, I.2
  • 92
    • 80053504215 scopus 로고    scopus 로고
    • Quality of online pharmacies and websites selling prescription drugs: A systematic review
    • Orizio, G., Merla, A., Schulz, P. J., & Gelatti, U. (2011). Quality of online pharmacies and websites selling prescription drugs: A systematic review. Journal of Medical Internet Research, 13(3), e74.
    • (2011) Journal of Medical Internet Research , vol.13 , Issue.3
    • Orizio, G.1    Merla, A.2    Schulz, P.J.3    Gelatti, U.4
  • 93
    • 4243050485 scopus 로고    scopus 로고
    • Trust and etiquette in high-criticality automated systems
    • Parasuraman, R., & Miller, C. A. (2004). Trust and etiquette in high-criticality automated systems. Communications of the ACM, 47(4), 51-55.
    • (2004) Communications of the ACM , vol.47 , Issue.4 , pp. 51-55
    • Parasuraman, R.1    Miller, C.A.2
  • 94
    • 33749347189 scopus 로고    scopus 로고
    • Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior
    • Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. MIS Quarterly, 30(1), 115-143.
    • (2006) MIS Quarterly , vol.30 , Issue.1 , pp. 115-143
    • Pavlou, P.A.1    Fygenson, M.2
  • 95
    • 0141907688 scopus 로고    scopus 로고
    • Common method biases in behavioral research: A critical review of the literature and recommended remedies
    • Podsakoff, P. M., MacKenzie, S. B., & Lee, J.-Y. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879-903.
    • (2003) Journal of Applied Psychology , vol.88 , Issue.5 , pp. 879-903
    • Podsakoff, P.M.1    Mackenzie, S.B.2    Lee, J.-Y.3
  • 97
    • 67651102420 scopus 로고    scopus 로고
    • Examining single- and multiple-process theories of trust in automation
    • Rice, S. (2009). Examining single- and multiple-process theories of trust in automation. The Journal of General Psychology, 136(3), 303-319.
    • (2009) The Journal of General Psychology , vol.136 , Issue.3 , pp. 303-319
    • Rice, S.1
  • 98
    • 0023304222 scopus 로고
    • Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat
    • Rippetoe, P. A., & Rogers, R. W. (1987). Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat. Journal of Personality and Social Psychology, 52(3), 596-604.
    • (1987) Journal of Personality and Social Psychology , vol.52 , Issue.3 , pp. 596-604
    • Rippetoe, P.A.1    Rogers, R.W.2
  • 99
    • 0001840352 scopus 로고
    • A protection motivation theory of fear appeals and attitude change
    • Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. Journal of Psychology, 91, 93-114.
    • (1975) Journal of Psychology , vol.91 , pp. 93-114
    • Rogers, R.W.1
  • 100
    • 0002247369 scopus 로고
    • Cognitive and psychological processes in fear appeals and attitude change: A revised theory of protected motivation
    • In J. T. Cacioppo & R. E. Petty (Eds.), New York, NY: The Guilford Press
    • Rogers, R. W. (1983). Cognitive and psychological processes in fear appeals and attitude change: A revised theory of protected motivation. In J. T. Cacioppo & R. E. Petty (Eds.), Social psychophysiology: A source book. New York, NY: The Guilford Press.
    • (1983) Social Psychophysiology: A Source Book
    • Rogers, R.W.1
  • 103
    • 84940450758 scopus 로고    scopus 로고
    • Semantic network attacks
    • Schneier, B. (2000). Semantic network attacks. Communications of the ACM, 43(12), 168.
    • (2000) Communications of the ACM , vol.43 , Issue.12 , pp. 168
    • Schneier, B.1
  • 104
    • 0031066695 scopus 로고    scopus 로고
    • Assessing the unidimensionality of measurement: A paradigm and illustration within the context of information systems research
    • Segars, A. H. (1997). Assessing the unidimensionality of measurement: A paradigm and illustration within the context of information systems research. Omega, 25(1), 107-121.
    • (1997) Omega , vol.25 , Issue.1 , pp. 107-121
    • Segars, A.H.1
  • 105
    • 73149103238 scopus 로고    scopus 로고
    • Alerting the general population to genetic risks: The value of health messages communicating the existence of genetic risk factors for public health promotion
    • Smerecnik, C. M. R., Mesters, I., de Vries, N. K., & de Vries, H. (2009). Alerting the general population to genetic risks: The value of health messages communicating the existence of genetic risk factors for public health promotion. Health Psychology, 28(6), 734-745.
    • (2009) Health Psychology , vol.28 , Issue.6 , pp. 734-745
    • Smerecnik, C.1    Mesters, I.2    De Vries, N.K.3    De Vries, H.4
  • 106
    • 25144467018 scopus 로고    scopus 로고
    • A theoretical approach to Web design in e-commerce: A belief reinforcement model
    • Song, J., & Zahedi, F. M. (2005). A theoretical approach to Web design in e-commerce: A belief reinforcement model. Management Science, 51(8), 1219-1235.
    • (2005) Management Science , vol.51 , Issue.8 , pp. 1219-1235
    • Song, J.1    Zahedi, F.M.2
  • 107
    • 55249123249 scopus 로고
    • Validating instruments in MIS research
    • Straub, D. W. (1989). Validating instruments in MIS research. MIS Quarterly, 13(2), 147-169.
    • (1989) MIS Quarterly , vol.13 , Issue.2 , pp. 147-169
    • Straub, D.W.1
  • 108
    • 13244286108 scopus 로고    scopus 로고
    • Validation guidelines for IS positivist research
    • Straub, D., Boudreau, M.-C., & Gefen, D. (2004). Validation guidelines for IS positivist research. Communication of AIS, 13, 380-426.
    • (2004) Communication of AIS , vol.13 , pp. 380-426
    • Straub, D.1    Boudreau, M.-C.2    Gefen, D.3
  • 109
    • 0003196246 scopus 로고
    • Measuring system usage: Implications for IS theory testing
    • Straub, D. W., Limayem, M., & Karahanna E. (1995). Measuring system usage: Implications for IS theory testing. Management Science, 41(8), 1328-1342.
    • (1995) Management Science , vol.41 , Issue.8 , pp. 1328-1342
    • Straub, D.W.1    Limayem, M.2    Karahanna, E.3
  • 110
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22(4), 441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 112
    • 0030137327 scopus 로고    scopus 로고
    • Preventive health psychology from a developmental perspective: An extension of protection motivation theory
    • Sturges, J. W., & Rogers, R. W. (1996). Preventive health psychology from a developmental perspective: An extension of protection motivation theory. Health Psychology, 15(3), 158-166.
    • (1996) Health Psychology , vol.15 , Issue.3 , pp. 158-166
    • Sturges, J.W.1    Rogers, R.W.2
  • 114
    • 44249124273 scopus 로고    scopus 로고
    • Examining trust in information technology artifacts: The effects of system quality and culture
    • Vance, A., Elie-Dit-Cosaque, C., & Straub, D. W. (2008). Examining trust in information technology artifacts: The effects of system quality and culture. Journal of Management Information Systems, 24(4), 73-100.
    • (2008) Journal of Management Information Systems , vol.24 , Issue.4 , pp. 73-100
    • Vance, A.1    Elie-Dit-Cosaque, C.2    Straub, D.W.3
  • 115
    • 85081876275 scopus 로고    scopus 로고
    • Internet Explorer gains Web browser market share from Firefox
    • Vaughan-Nichols, S. J. (2011). Internet Explorer gains Web browser market share from Firefox. ZDNet. Retrieved from http://www.zdnet.com/blog/networking/internet-explorer-gains-web-browser-market-share-from-firefox/743
    • (2011) Zdnet
    • Vaughan-Nichols, S.J.1
  • 116
    • 1542382496 scopus 로고    scopus 로고
    • User acceptance of information technology: Toward a unified view
    • Venkatesh, V., Morris, M., Davis, G., & Davis, F. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425-478.
    • (2003) MIS Quarterly , vol.27 , Issue.3 , pp. 425-478
    • Venkatesh, V.1    Morris, M.2    Davis, G.3    Davis, F.4
  • 117
    • 0141816735 scopus 로고    scopus 로고
    • Analyzing the cost of screening selectee and non-selectee baggage
    • Virta, J. L., Jacobson, S. H., & Kobza, J. E. (2003). Analyzing the cost of screening selectee and non-selectee baggage. Risk Analysis, 23(5), 897-907.
    • (2003) Risk Analysis , vol.23 , Issue.5 , pp. 897-907
    • Virta, J.L.1    Jacobson, S.H.2    Kobza, J.E.3
  • 118
    • 0023782158 scopus 로고
    • The precaution adoption process
    • Weinstein, N. D. (1988). The precaution adoption process. Health Psychology, 7(4), 355-386.
    • (1988) Health Psychology , vol.7 , Issue.4 , pp. 355-386
    • Weinstein, N.D.1
  • 119
    • 70350343741 scopus 로고    scopus 로고
    • An examination of the interface between context and theory applied to the study of Chinese organizations
    • Whetten, D. A. (2009). An examination of the interface between context and theory applied to the study of Chinese organizations. Management and Organization Review, 5(1), 29-55.
    • (2009) Management and Organization Review , vol.5 , Issue.1 , pp. 29-55
    • Whetten, D.A.1
  • 120
    • 67049167702 scopus 로고    scopus 로고
    • The practice of theory borrowing in organizational studies: Current issues and future directions
    • Whetten, D. A., Felin, T., & King, B. G. (2009). The practice of theory borrowing in organizational studies: Current issues and future directions. Journal of Management, 35(3), 537-563.
    • (2009) Journal of Management , vol.35 , Issue.3 , pp. 537-563
    • Whetten, D.A.1    Felin, T.2    King, B.G.3
  • 121
    • 75149180454 scopus 로고    scopus 로고
    • CyberChondria: Studies of the escalation of medical concerns in Web search
    • White, R. W., & Horvitz, E. (2009). CyberChondria: Studies of the escalation of medical concerns in Web search. ACM Transactions on Information Systems, 27(4), 1-37.
    • (2009) ACM Transactions on Information Systems , vol.27 , Issue.4 , pp. 1-37
    • White, R.W.1    Horvitz, E.2
  • 122
    • 84867343495 scopus 로고    scopus 로고
    • Fake anti-virus software catches 43 million users’ credit cards
    • Willis, P. (2009). Fake anti-virus software catches 43 million users’ credit cards. Digital Journal. Retrieved from www.digitaljournal.com/article/280746
    • (2009) Digital Journal
    • Willis, P.1
  • 126
    • 80051718904 scopus 로고    scopus 로고
    • Product-related deception in e-commerce: A theoretical perspective
    • Xiao, B., & Benbasat, I. (2011). Product-related deception in e-commerce: A theoretical perspective. MIS Quarterly, 35(1), 169-196.
    • (2011) MIS Quarterly , vol.35 , Issue.1 , pp. 169-196
    • Xiao, B.1    Benbasat, I.2
  • 127
    • 38349147070 scopus 로고    scopus 로고
    • Intrusion prevention in information systems: Reactive and proactive responses
    • Yue, W. T., & Çakanyildirim, M. (2007). Intrusion prevention in information systems: Reactive and proactive responses. Journal of Management Information Systems, 24(1), 329-353.
    • (2007) Journal of Management Information Systems , vol.24 , Issue.1 , pp. 329-353
    • Yue, W.T.1    Çakanyildirim, M.2
  • 128
    • 44249118847 scopus 로고    scopus 로고
    • Dynamics of trust revision: Using health infomediaries
    • Zahedi, F. M., & Song, J. (2008). Dynamics of trust revision: Using health infomediaries. Journal of Management Information Systems, 24(4), 225-248.
    • (2008) Journal of Management Information Systems , vol.24 , Issue.4 , pp. 225-248
    • Zahedi, F.M.1    Song, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.