-
1
-
-
70350343383
-
A comparison of tools for detecting fake websites
-
Abbasi, A., & Chen, H. (2009a). A comparison of tools for detecting fake websites. IEEE Computer, 42(10), 78-86.
-
(2009)
IEEE Computer
, vol.42
, Issue.10
, pp. 78-86
-
-
Abbasi, A.1
Chen, H.2
-
2
-
-
68349154502
-
A comparison of fraud cues and classification methods for fake escrow website detection
-
Abbasi, A., & Chen, H. (2009b). A comparison of fraud cues and classification methods for fake escrow website detection. Information Technology and Management, 10(2), 83-101.
-
(2009)
Information Technology and Management
, vol.10
, Issue.2
, pp. 83-101
-
-
Abbasi, A.1
Chen, H.2
-
3
-
-
77957045434
-
Detecting fake websites: The contribution of statistical learning theory
-
Abbasi, A., Zhang, Z., Zimbra, D., Chen, H., & Nunamaker, J. F., Jr. (2010). Detecting fake websites: The contribution of statistical learning theory. MIS Quarterly, 34(3), 435-461.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 435-461
-
-
Abbasi, A.1
Zhang, Z.2
Zimbra, D.3
Chen, H.4
Nunamaker, J.F.5
-
4
-
-
84871254978
-
Detecting fake medical websites using recursive trust labeling
-
Abbasi, A., Zahedi, F. M., Kaza, S. (2012). Detecting fake medical websites using recursive trust labeling. ACM Transactions on Information Systems, 30(4), 1-36.
-
(2012)
ACM Transactions on Information Systems
, vol.30
, Issue.4
, pp. 1-36
-
-
Abbasi, A.1
Zahedi, F.M.2
Kaza, S.3
-
5
-
-
72449167296
-
A comparison of machine learning techniques for phishing detection
-
Abu-Nimeh, S., Nappa, D., Wang, X., & Nair, S. (2007). A comparison of machine learning techniques for phishing detection. In Proceedings of the Anti-Phishing Working Groups 2nd Annual Ecrime Researchers Summit (Pp. 60-69).
-
(2007)
Proceedings of the Anti-Phishing Working Groups 2Nd Annual Ecrime Researchers Summit
, pp. 60-69
-
-
Abu-Nimeh, S.1
Nappa, D.2
Wang, X.3
Nair, S.4
-
6
-
-
80051709626
-
The effects of tree-view based presentation adaptation on mobile Web browsing
-
Adipat, B., Zhang, D., & Zhou, L. (2011). The effects of tree-view based presentation adaptation on mobile Web browsing. MIS Quarterly, 35(1), 99-122.
-
(2011)
MIS Quarterly
, vol.35
, Issue.1
, pp. 99-122
-
-
Adipat, B.1
Zhang, D.2
Zhou, L.3
-
8
-
-
85002862540
-
Alice in warningland: A large-scale field study of browser security warning effectiveness
-
Akhawe, D., & Felt, A. P. (2013). Alice in warningland: A large-scale field study of browser security warning effectiveness. In Proceedings of the 22nd USENIX Security Symposium.
-
(2013)
Proceedings of the 22Nd USENIX Security Symposium
-
-
Akhawe, D.1
Felt, A.P.2
-
9
-
-
84871204538
-
14 arrested for making, selling fake drugs via bogus military medical websites
-
An, B. (2010). 14 arrested for making, selling fake drugs via bogus military medical websites. Xinhua Net. Retrieved from http://big5.xinhuanet.com/gate/big5/news.xinhuanet.com/ english2010/china/2010-02/05/c_13165317.htm
-
(2010)
Xinhua Net
-
-
An, B.1
-
10
-
-
77957077814
-
Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions
-
Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613-643.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 613-643
-
-
Anderson, C.L.1
Agarwal, R.2
-
11
-
-
0000761228
-
Some methods for respecifying measurement models to obtain unidimensional construct measurement
-
Anderson, J., & Gerbing, D. (1982). Some methods for respecifying measurement models to obtain unidimensional construct measurement. Journal of Marketing Research, 19(4), 453-460.
-
(1982)
Journal of Marketing Research
, vol.19
, Issue.4
, pp. 453-460
-
-
Anderson, J.1
Gerbing, D.2
-
12
-
-
66449136652
-
Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion
-
Angst, C. M., & Agarwal R. (2009). Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion. MIS Quarterly, 33(2), 339-370.
-
(2009)
MIS Quarterly
, vol.33
, Issue.2
, pp. 339-370
-
-
Angst, C.M.1
Agarwal, R.2
-
13
-
-
85081878987
-
Internet drug rings and their “killer” online pharmacies
-
Armin, J. (2010). Internet drug rings and their “killer” online pharmacies. Internet Evolution. Retrieved from http://www.internetevolution.com/author.asp?section_id=717&doc_id=191640
-
(2010)
Internet Evolution
-
-
Armin, J.1
-
14
-
-
79958697053
-
Measurement and meaning in information systems and organizational research: Methodological and philosophical foundations
-
Bagozzi, R. P. (2011). Measurement and meaning in information systems and organizational research: Methodological and philosophical foundations. MIS Quarterly, 35(2), 261-292.
-
(2011)
MIS Quarterly
, vol.35
, Issue.2
, pp. 261-292
-
-
Bagozzi, R.P.1
-
15
-
-
33746878674
-
Self-efficacy mechanism in human agency
-
Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37(2), 122-147.
-
(1982)
American Psychologist
, vol.37
, Issue.2
, pp. 122-147
-
-
Bandura, A.1
-
17
-
-
0017466442
-
Cognitive processes mediating behavioral change
-
Bandura, A., Adams, N. E., & Beyer, J. (1977). Cognitive processes mediating behavioral change. Journal of Personality and Social Psychology, 35(3), 125-139.
-
(1977)
Journal of Personality and Social Psychology
, vol.35
, Issue.3
, pp. 125-139
-
-
Bandura, A.1
Adams, N.E.2
Beyer, J.3
-
18
-
-
77951135204
-
The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online
-
Bansal, G., Zahedi, F. M., & Gefen, D. (2010). The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49(2), 138-150.
-
(2010)
Decision Support Systems
, vol.49
, Issue.2
, pp. 138-150
-
-
Bansal, G.1
Zahedi, F.M.2
Gefen, D.3
-
19
-
-
84870963426
-
The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: A multiple-context investigation
-
Bansal, G., Zahedi, F. M., & Gefen, D. (2008). The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: A multiple-context investigation. In Proceedings of 29th International Conference on Information Systems.
-
(2008)
Proceedings of 29Th International Conference on Information Systems
-
-
Bansal, G.1
Zahedi, F.M.2
Gefen, D.3
-
20
-
-
67649723048
-
Probabilistic model checking for the quantification of DoS security threats
-
Basagiannis, S., Katsaros, P., Pombortsis, A., & Alexiou, N. (2009). Probabilistic model checking for the quantification of DoS security threats. Computer and Security, 28(6), 450-465.
-
(2009)
Computer and Security
, vol.28
, Issue.6
, pp. 450-465
-
-
Basagiannis, S.1
Katsaros, P.2
Pombortsis, A.3
Alexiou, N.4
-
21
-
-
0026954447
-
On the fit of models to covariances and methodology to the bulletin
-
Bentler, P. M. (1992). On the fit of models to covariances and methodology to the bulletin. Psychological Bulletin, 112(3), 400-404.
-
(1992)
Psychological Bulletin
, vol.112
, Issue.3
, pp. 400-404
-
-
Bentler, P.M.1
-
22
-
-
4243159210
-
Significance tests and goodness of fit in the analysis of covariance structures
-
Bentler P. M., & Bonnett, D.G. (1980). Significance tests and goodness of fit in the analysis of covariance structures. Psychological Bulletin, 88(3), 588-606.
-
(1980)
Psychological Bulletin
, vol.88
, Issue.3
, pp. 588-606
-
-
Bentler, P.M.1
Bonnett, D.G.2
-
23
-
-
9744258059
-
Inducing sensitivity to deception in order to improve decision making performance: A field study
-
Biros, D. P, George, J. F., & Zmud, R. W. (2002). Inducing sensitivity to deception in order to improve decision making performance: A field study. MIS Quarterly, 26(2), 119-144.
-
(2002)
MIS Quarterly
, vol.26
, Issue.2
, pp. 119-144
-
-
Biros, D.P.1
George, J.F.2
Zmud, R.W.3
-
24
-
-
0028808155
-
Human probability matching behavior in response to alarms of varying reliability
-
Bliss, J. P., Gilson, R. D., & Deaton, J. E. (1995). Human probability matching behavior in response to alarms of varying reliability. Ergonomics, 38(11), 2300-2312.
-
(1995)
Ergonomics
, vol.38
, Issue.11
, pp. 2300-2312
-
-
Bliss, J.P.1
Gilson, R.D.2
Deaton, J.E.3
-
25
-
-
9744260316
-
Validation in information systems research: A state-of-the-art assessment
-
Boudreau, M.-C., Gefen, D., & Straub, D. W. (2001). Validation in information systems research: A state-of-the-art assessment. MIS Quarterly, 25(1), 1-16.
-
(2001)
MIS Quarterly
, vol.25
, Issue.1
, pp. 1-16
-
-
Boudreau, M.-C.1
Gefen, D.2
Straub, D.W.3
-
26
-
-
79953645142
-
Bridging the gap in computer security warnings: A mental model approach
-
Bravo-Lillo, C., Cranor, L. F., Downs, J. S., & Komanduri, S. (2011). Bridging the gap in computer security warnings: A mental model approach. IEEE Security and Privacy, 9(2), 18-26.
-
(2011)
IEEE Security and Privacy
, vol.9
, Issue.2
, pp. 18-26
-
-
Bravo-Lillo, C.1
Cranor, L.F.2
Downs, J.S.3
Komanduri, S.4
-
27
-
-
0001233581
-
Alternative ways of assessing model fit
-
In K. A. Bollen & J. S. Long (Eds.), Newbury Park, CA: Sage
-
Browne, M. W., & Cudeck, R. (1993). Alternative ways of assessing model fit. In K. A. Bollen & J. S. Long (Eds.), Testing structural equation models (pp. 445-455). Newbury Park, CA: Sage.
-
(1993)
Testing Structural Equation Models
, pp. 445-455
-
-
Browne, M.W.1
Cudeck, R.2
-
28
-
-
70350230128
-
Mental models of privacy and security
-
Camp, L. J. (2009). Mental models of privacy and security. IEEE Technology and Society Magazine, 28(3), 37-46.
-
(2009)
IEEE Technology and Society Magazine
, vol.28
, Issue.3
, pp. 37-46
-
-
Camp, L.J.1
-
29
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
Cavusoglu, H., Mishra, B., & Raghunathan, S. (2005). The value of intrusion detection systems in information technology security architecture. Information Systems Research, 16(1), 28-46.
-
(2005)
Information Systems Research
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
32
-
-
79955877407
-
Interface design elements for anti-phishing systems
-
In H. Jain, A. P. Sinha, & P. Vitharana (Eds.), Berlin: Springer-Verlag
-
Chen, Y., Zahedi, M., & Abbasi, A. (2011). Interface design elements for anti-phishing systems. In H. Jain, A. P. Sinha, & P. Vitharana (Eds.), Service-oriented perspectives in design science research (Vol. 6629, pp. 253-265). Berlin: Springer-Verlag.
-
(2011)
Service-Oriented Perspectives in Design Science Research
, vol.6629
, pp. 253-265
-
-
Chen, Y.1
Zahedi, M.2
Abbasi, A.3
-
33
-
-
77649125818
-
Exploring the interactive effect of time control and justice perception on job attitudes
-
Chen, Z., Zhang, X., Leung, K., & Zhou, F. (2010). Exploring the interactive effect of time control and justice perception on job attitudes. The Journal of Social Psychology, 150(2), 181-197.
-
(2010)
The Journal of Social Psychology
, vol.150
, Issue.2
, pp. 181-197
-
-
Chen, Z.1
Zhang, X.2
Leung, K.3
Zhou, F.4
-
34
-
-
55949130648
-
A fast form approach to measuring technology acceptance and other constructs
-
Chin W.W., Johnson, N., & Schwarz, A. (2008). A fast form approach to measuring technology acceptance and other constructs. MIS Quarterly, 32(4), 687-703.
-
(2008)
MIS Quarterly
, vol.32
, Issue.4
, pp. 687-703
-
-
Chin, W.W.1
Johnson, N.2
Schwarz, A.3
-
35
-
-
85044841595
-
Client-side defense against Web-based identity theft
-
Chou, N., Ledesma, R., Teraguchi, Y., Boneh, D., & Mitchell, J. C. (2004). Client-side defense against Web-based identity theft. In Proceedings of the Network and Distributed System Security Symposium.
-
(2004)
Proceedings of the Network and Distributed System Security Symposium
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Boneh, D.4
Mitchell, J.C.5
-
36
-
-
7244245467
-
Fighting Internet auction fraud: An assessment and proposal
-
Chua, C. E. H., & Wareham, J. (2004). Fighting Internet auction fraud: An assessment and proposal. IEEE Computer, 37(10), 31-37.
-
(2004)
IEEE Computer
, vol.37
, Issue.10
, pp. 31-37
-
-
Chua, C.1
Wareham, J.2
-
38
-
-
49149116092
-
Computer self-efficacy: Development of a measure and initial test
-
Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: Development of a measure and initial test. MIS Quarterly, 9(2), 189-211.
-
(1995)
MIS Quarterly
, vol.9
, Issue.2
, pp. 189-211
-
-
Compeau, D.R.1
Higgins, C.A.2
-
39
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology
-
Davis, F. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340.
-
(1989)
MIS Quarterly
, vol.13
, Issue.3
, pp. 319-340
-
-
Davis, F.1
-
40
-
-
0002865976
-
Deceiving and Detecting Deceit
-
In B. R. Schlenker (Ed.), New York, NY: McGraw-Hill Book Company
-
DePaulo, B. M., Stone, J. I., & Lassiter, G. D. (1985). Deceiving and Detecting Deceit. In B. R. Schlenker (Ed.), The self and social life, New York, NY: McGraw-Hill Book Company.
-
(1985)
The Self and Social Life
-
-
Depaulo, B.M.1
Stone, J.I.2
Lassiter, G.D.3
-
42
-
-
33749551929
-
Why spoofing is serious internet fraud
-
Dinev, T. (2006). Why spoofing is serious internet fraud. Communications of the ACM, 49(10), 76-82.
-
(2006)
Communications of the ACM
, vol.49
, Issue.10
, pp. 76-82
-
-
Dinev, T.1
-
43
-
-
49049114397
-
The centrality of awareness in the formation of user behavioral intention toward protective information technologies
-
Dinev, T., & Hu, Q. (2007). The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of AIS, 8(7), 386-408.
-
(2007)
Journal of AIS
, vol.8
, Issue.7
, pp. 386-408
-
-
Dinev, T.1
Hu, Q.2
-
46
-
-
33846192369
-
Clicking for pills
-
Easton, G. (2007). Clicking for pills. British Medical Journal, 334(7583), 14-15.
-
(2007)
British Medical Journal
, vol.334
, Issue.7583
, pp. 14-15
-
-
Easton, G.1
-
49
-
-
0034397237
-
A meta-analysis of research on protection motivation theory
-
Floyd, D. L., Prentice-Dunn, S., & Rogers, R. W. (2000). A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology, 30(2), 407-429.
-
(2000)
Journal of Applied Social Psychology
, vol.30
, Issue.2
, pp. 407-429
-
-
Floyd, D.L.1
Prentice-Dunn, S.2
Rogers, R.W.3
-
50
-
-
0000009769
-
Evaluating structural equation models with unobservable variables and measurement error
-
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50.
-
(1981)
Journal of Marketing Research
, vol.18
, Issue.1
, pp. 39-50
-
-
Fornell, C.1
Larcker, D.F.2
-
51
-
-
0042976060
-
The importance of time congruity in the organization
-
Francis-Smythe, J. A., & Robertson, I. T. (2003). The importance of time congruity in the organization. Applied Psychology, 52(2), 298-321.
-
(2003)
Applied Psychology
, vol.52
, Issue.2
, pp. 298-321
-
-
Francis-Smythe, J.A.1
Robertson, I.T.2
-
53
-
-
0001178032
-
Structural equation modeling and regression: Guidelines for research practice
-
Gefen, D., Straub, D. W., & Boudreau, M.-C. (2000). Structural equation modeling and regression: Guidelines for research practice. Communications of the Association for Information Systems, 4, 1-79.
-
(2000)
Communications of the Association for Information Systems
, vol.4
, pp. 1-79
-
-
Gefen, D.1
Straub, D.W.2
Boudreau, M.-C.3
-
54
-
-
0034226904
-
Perils of internet fraud: An empirical investigation of deception and trust with experienced internet consumers
-
Grazioli, S., & Jarvenpaa, S. L. (2000). Perils of internet fraud: An empirical investigation of deception and trust with experienced internet consumers. IEEE Transactions on Systems, Man, and Cybernetics: Part A, 20(4), 395-410.
-
(2000)
IEEE Transactions on Systems, Man, and Cybernetics: Part A
, vol.20
, Issue.4
, pp. 395-410
-
-
Grazioli, S.1
Jarvenpaa, S.L.2
-
55
-
-
3142664237
-
Consumer and business deception on the Internet: Content analysis of documentary evidence
-
Grazioli, S., & Jarvenpaa, S. L. (2003). Consumer and business deception on the Internet: Content analysis of documentary evidence. International Journal of Electronic Commerce, 7(4), 93-118.
-
(2003)
International Journal of Electronic Commerce
, vol.7
, Issue.4
, pp. 93-118
-
-
Grazioli, S.1
Jarvenpaa, S.L.2
-
57
-
-
27344439205
-
Spam: It’s not just for inboxes anymore
-
Gyongyi, Z., & Garcia-Molina, H. (2005). Spam: It’s not just for inboxes anymore. IEEE Computer, 38(10), 28-34.
-
(2005)
IEEE Computer
, vol.38
, Issue.10
, pp. 28-34
-
-
Gyongyi, Z.1
Garcia-Molina, H.2
-
58
-
-
54049142548
-
Security and identification indicators for browsers against spoofing and phishing attacks
-
Herzberg, A., & Jbara, A. (2008). Security and identification indicators for browsers against spoofing and phishing attacks. ACM Transactions on Internet Technology, 8(4), 1-36.
-
(2008)
ACM Transactions on Internet Technology
, vol.8
, Issue.4
, pp. 1-36
-
-
Herzberg, A.1
Jbara, A.2
-
59
-
-
84897933983
-
A framework and guidelines for context-specific theorizing in information systems research
-
Hong, W., Chan, F. Y. K., Thong, J. Y. L., Chasalow, L. C., & Dhillon, G. (2014). A framework and guidelines for context-specific theorizing in information systems research. Information Systems Research, 35(1), 111-136.
-
(2014)
Information Systems Research
, vol.35
, Issue.1
, pp. 111-136
-
-
Hong, W.1
Chan, F.2
Thong, J.3
Chasalow, L.C.4
Dhillon, G.5
-
60
-
-
67650706330
-
Cut-off criteria for fit indexes in covariance matrix analysis: Conventional criteria versus new alternatives
-
Hu, L., & Bentler, P. M. (1999). Cut-off criteria for fit indexes in covariance matrix analysis: Conventional criteria versus new alternatives. Structural Equation Modeling, 6(1), 1-55.
-
(1999)
Structural Equation Modeling
, vol.6
, Issue.1
, pp. 1-55
-
-
Hu, L.1
Bentler, P.M.2
-
61
-
-
0036442295
-
Expert versus novice use of the executive support systems: An empirical study
-
Hung, S. Y. (2003). Expert versus novice use of the executive support systems: An empirical study. Information and Management, 40(3), 177-189.
-
(2003)
Information and Management
, vol.40
, Issue.3
, pp. 177-189
-
-
Hung, S.Y.1
-
62
-
-
0001080103
-
Personal computing acceptance factors in small firms: A structural equation model
-
Igbaria, M., Zinatelli, N., Cragg, P., & Cavaye A. L. M. (1997). Personal computing acceptance factors in small firms: A structural equation model. MIS Quarterly, 21(3), 279-302.
-
(1997)
MIS Quarterly
, vol.21
, Issue.3
, pp. 279-302
-
-
Igbaria, M.1
Zinatelli, N.2
Cragg, P.3
Cavaye, A.4
-
63
-
-
34848911641
-
Social Phishing
-
Jagatic, T. N., Johnson, N. A., Jakobsson, N., & Menczer, F. (2007). Social Phishing. Communications of the ACM, 50(10), 94-100.
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, N.3
Menczer, F.4
-
65
-
-
33646423850
-
The essential impact of context on organizational behavior
-
Johns, G. (2006). The essential impact of context on organizational behavior. Academy of Management Review, 31(2), 386-408.
-
(2006)
Academy of Management Review
, vol.31
, Issue.2
, pp. 386-408
-
-
Johns, G.1
-
66
-
-
0035740371
-
Detecting deception: Adversarial problem solving in a low base rate world
-
Johnson, P. E., Grazioli, S., Jamal, K., & Berryman, G. (2001). Detecting deception: Adversarial problem solving in a low base rate world. Cognitive Science, 25(3), 355-392.
-
(2001)
Cognitive Science
, vol.25
, Issue.3
, pp. 355-392
-
-
Johnson, P.E.1
Grazioli, S.2
Jamal, K.3
Berryman, G.4
-
67
-
-
77957057727
-
Fear appeals and information security behaviors: An empirical study
-
Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3), 549-566.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 549-566
-
-
Johnston, A.C.1
Warkentin, M.2
-
69
-
-
0002993699
-
A user-centered design approach to personalization
-
Kramer, J., Noronha, S., & Vergo, J. (2000). A user-centered design approach to personalization. Communications of the ACM, 43(8), 45-48.
-
(2000)
Communications of the ACM
, vol.43
, Issue.8
, pp. 45-48
-
-
Kramer, J.1
Noronha, S.2
Vergo, J.3
-
70
-
-
84893536110
-
Few online “Canadian pharmacies” based in Canada, FDA says
-
Krebs, B. (2005). Few online “Canadian pharmacies” based in Canada, FDA says. WashingtonPost.com.
-
(2005)
Washingtonpost.Com
-
-
Krebs, B.1
-
72
-
-
77953569639
-
Teaching Johnny not to fall for phish
-
Kumaraguru, P., Sheng, S., Aquisti, A., Cranor, L. F., & Hong, J. (2010). Teaching Johnny not to fall for phish. ACM Transactions on Internet Technology, 10(2), 1-31.
-
(2010)
ACM Transactions on Internet Technology
, vol.10
, Issue.2
, pp. 1-31
-
-
Kumaraguru, P.1
Sheng, S.2
Aquisti, A.3
Cranor, L.F.4
Hong, J.5
-
73
-
-
34249853668
-
Usability evaluation of anti-phishing toolbars
-
Li, L., & Helenius, M. (2007). Usability evaluation of anti-phishing toolbars. Journal in Computer Virology, 3(2), 163-184.
-
(2007)
Journal in Computer Virology
, vol.3
, Issue.2
, pp. 163-184
-
-
Li, L.1
Helenius, M.2
-
74
-
-
33748626273
-
Digital inclusiveness—longitudinal study of internet adoption by older adults
-
Lam, C. Y., & Lee, M. K. O. (2006). Digital inclusiveness—longitudinal study of internet adoption by older adults. Journal of Management Information Systems, 22(4), 177-306.
-
(2006)
Journal of Management Information Systems
, vol.22
, Issue.4
, pp. 177-306
-
-
Lam, C.Y.1
Lee, M.2
-
75
-
-
84859702088
-
Text mining and probabilistic language modeling for online review spam detection
-
Lau, R. Y. K., Liao, S. Y., Kwok, R. C., Xu, K., Xia, Y., & Li, Y. (2011). Text mining and probabilistic language modeling for online review spam detection. ACM Transactions on MIS, 2(4), 1-25.
-
(2011)
ACM Transactions on MIS
, vol.2
, Issue.4
, pp. 1-25
-
-
Lau, R.1
Liao, S.Y.2
Kwok, R.C.3
Xu, K.4
Xia, Y.5
Li, Y.6
-
76
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
Lee, W., Fan, W., Miller, M., Stolfo, S., & Zadok, E. (2002). Toward cost-sensitive modeling for intrusion detection and response. Journal of Computer Security, 10(1/2), 5-22.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 5-22
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.4
Zadok, E.5
-
77
-
-
85081874157
-
Cisco: Targeted attacks cost organizations $1.29 billion annually
-
Lennon, M. (2011). Cisco: Targeted attacks cost organizations $1.29 billion annually. Security Week.
-
(2011)
Security Week
-
-
Lennon, M.1
-
78
-
-
4644242309
-
Illegal, inappropriate, and unethical behavior in an information technology context: A study to explain influences
-
Leonard, L. N. K., & Cronan, T. P. (2001). Illegal, inappropriate, and unethical behavior in an information technology context: A study to explain influences. Journal of the Association for Information Systems, 1(12), 1-31.
-
(2001)
Journal of the Association for Information Systems
, vol.1
, Issue.12
, pp. 1-31
-
-
Leonard, L.1
Cronan, T.P.2
-
79
-
-
60649084770
-
Avoidance of information technology threats: A theoretical perspective
-
Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33(1), 71-90.
-
(2009)
MIS Quarterly
, vol.33
, Issue.1
, pp. 71-90
-
-
Liang, H.1
Xue, Y.2
-
80
-
-
77955121478
-
Understanding security behaviors in personal computer usage: A threat avoidance perspective
-
Liang, H., & Xue, Y. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 394-413.
-
(2010)
Journal of the Association for Information Systems
, vol.11
, Issue.7
, pp. 394-413
-
-
Liang, H.1
Xue, Y.2
-
81
-
-
21344476094
-
Time management: Test of a process model
-
Macan, T. H. (1994). Time management: Test of a process model. Journal of Applied Psychology, 79, 381-391.
-
(1994)
Journal of Applied Psychology
, vol.79
, pp. 381-391
-
-
Macan, T.H.1
-
82
-
-
13244298307
-
Internet users’ information privacy concern (IUIPC): The construct, the scale, and a causal model
-
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concern (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336-355.
-
(2004)
Information Systems Research
, vol.15
, Issue.4
, pp. 336-355
-
-
Malhotra, N.K.1
Kim, S.S.2
Agarwal, J.3
-
83
-
-
85081874131
-
Who is popping all those pills?
-
Maris, D. (2012). Who is popping all those pills? Forbes Magazine.
-
(2012)
Forbes Magazine
-
-
Maris, D.1
-
84
-
-
21444456209
-
A review and synthesis of research evidence for self-efficacy-enhancing interventions for reducing chronic disability: Implications for health education practice (part II)
-
Marks, R., & Allegrante, J. P. (2005). A review and synthesis of research evidence for self-efficacy-enhancing interventions for reducing chronic disability: Implications for health education practice (part II). Health Promotion Practice, 6(2), 148-156.
-
(2005)
Health Promotion Practice
, vol.6
, Issue.2
, pp. 148-156
-
-
Marks, R.1
Allegrante, J.P.2
-
87
-
-
0036737236
-
Developing and validating trust measures for e-commerce: An integrative typology
-
McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334-359.
-
(2002)
Information Systems Research
, vol.13
, Issue.3
, pp. 334-359
-
-
McKnight, D.H.1
Choudhury, V.2
Kacmar, C.3
-
88
-
-
0033622371
-
Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory
-
Milne, S., Sheeran, P., & Orbell, S. (2000). Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory. Journal of Applied Social Psychology, 30(1), 106-143.
-
(2000)
Journal of Applied Social Psychology
, vol.30
, Issue.1
, pp. 106-143
-
-
Milne, S.1
Sheeran, P.2
Orbell, S.3
-
89
-
-
73449149291
-
Development of an instrument to measure the perceptions of adopting an information technology innovation
-
Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2(3), 192-222.
-
(1991)
Information Systems Research
, vol.2
, Issue.3
, pp. 192-222
-
-
Moore, G.C.1
Benbasat, I.2
-
92
-
-
80053504215
-
Quality of online pharmacies and websites selling prescription drugs: A systematic review
-
Orizio, G., Merla, A., Schulz, P. J., & Gelatti, U. (2011). Quality of online pharmacies and websites selling prescription drugs: A systematic review. Journal of Medical Internet Research, 13(3), e74.
-
(2011)
Journal of Medical Internet Research
, vol.13
, Issue.3
-
-
Orizio, G.1
Merla, A.2
Schulz, P.J.3
Gelatti, U.4
-
93
-
-
4243050485
-
Trust and etiquette in high-criticality automated systems
-
Parasuraman, R., & Miller, C. A. (2004). Trust and etiquette in high-criticality automated systems. Communications of the ACM, 47(4), 51-55.
-
(2004)
Communications of the ACM
, vol.47
, Issue.4
, pp. 51-55
-
-
Parasuraman, R.1
Miller, C.A.2
-
94
-
-
33749347189
-
Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior
-
Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. MIS Quarterly, 30(1), 115-143.
-
(2006)
MIS Quarterly
, vol.30
, Issue.1
, pp. 115-143
-
-
Pavlou, P.A.1
Fygenson, M.2
-
95
-
-
0141907688
-
Common method biases in behavioral research: A critical review of the literature and recommended remedies
-
Podsakoff, P. M., MacKenzie, S. B., & Lee, J.-Y. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879-903.
-
(2003)
Journal of Applied Psychology
, vol.88
, Issue.5
, pp. 879-903
-
-
Podsakoff, P.M.1
Mackenzie, S.B.2
Lee, J.-Y.3
-
97
-
-
67651102420
-
Examining single- and multiple-process theories of trust in automation
-
Rice, S. (2009). Examining single- and multiple-process theories of trust in automation. The Journal of General Psychology, 136(3), 303-319.
-
(2009)
The Journal of General Psychology
, vol.136
, Issue.3
, pp. 303-319
-
-
Rice, S.1
-
98
-
-
0023304222
-
Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat
-
Rippetoe, P. A., & Rogers, R. W. (1987). Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat. Journal of Personality and Social Psychology, 52(3), 596-604.
-
(1987)
Journal of Personality and Social Psychology
, vol.52
, Issue.3
, pp. 596-604
-
-
Rippetoe, P.A.1
Rogers, R.W.2
-
99
-
-
0001840352
-
A protection motivation theory of fear appeals and attitude change
-
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. Journal of Psychology, 91, 93-114.
-
(1975)
Journal of Psychology
, vol.91
, pp. 93-114
-
-
Rogers, R.W.1
-
100
-
-
0002247369
-
Cognitive and psychological processes in fear appeals and attitude change: A revised theory of protected motivation
-
In J. T. Cacioppo & R. E. Petty (Eds.), New York, NY: The Guilford Press
-
Rogers, R. W. (1983). Cognitive and psychological processes in fear appeals and attitude change: A revised theory of protected motivation. In J. T. Cacioppo & R. E. Petty (Eds.), Social psychophysiology: A source book. New York, NY: The Guilford Press.
-
(1983)
Social Psychophysiology: A Source Book
-
-
Rogers, R.W.1
-
103
-
-
84940450758
-
Semantic network attacks
-
Schneier, B. (2000). Semantic network attacks. Communications of the ACM, 43(12), 168.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 168
-
-
Schneier, B.1
-
104
-
-
0031066695
-
Assessing the unidimensionality of measurement: A paradigm and illustration within the context of information systems research
-
Segars, A. H. (1997). Assessing the unidimensionality of measurement: A paradigm and illustration within the context of information systems research. Omega, 25(1), 107-121.
-
(1997)
Omega
, vol.25
, Issue.1
, pp. 107-121
-
-
Segars, A.H.1
-
105
-
-
73149103238
-
Alerting the general population to genetic risks: The value of health messages communicating the existence of genetic risk factors for public health promotion
-
Smerecnik, C. M. R., Mesters, I., de Vries, N. K., & de Vries, H. (2009). Alerting the general population to genetic risks: The value of health messages communicating the existence of genetic risk factors for public health promotion. Health Psychology, 28(6), 734-745.
-
(2009)
Health Psychology
, vol.28
, Issue.6
, pp. 734-745
-
-
Smerecnik, C.1
Mesters, I.2
De Vries, N.K.3
De Vries, H.4
-
106
-
-
25144467018
-
A theoretical approach to Web design in e-commerce: A belief reinforcement model
-
Song, J., & Zahedi, F. M. (2005). A theoretical approach to Web design in e-commerce: A belief reinforcement model. Management Science, 51(8), 1219-1235.
-
(2005)
Management Science
, vol.51
, Issue.8
, pp. 1219-1235
-
-
Song, J.1
Zahedi, F.M.2
-
107
-
-
55249123249
-
Validating instruments in MIS research
-
Straub, D. W. (1989). Validating instruments in MIS research. MIS Quarterly, 13(2), 147-169.
-
(1989)
MIS Quarterly
, vol.13
, Issue.2
, pp. 147-169
-
-
Straub, D.W.1
-
108
-
-
13244286108
-
Validation guidelines for IS positivist research
-
Straub, D., Boudreau, M.-C., & Gefen, D. (2004). Validation guidelines for IS positivist research. Communication of AIS, 13, 380-426.
-
(2004)
Communication of AIS
, vol.13
, pp. 380-426
-
-
Straub, D.1
Boudreau, M.-C.2
Gefen, D.3
-
109
-
-
0003196246
-
Measuring system usage: Implications for IS theory testing
-
Straub, D. W., Limayem, M., & Karahanna E. (1995). Measuring system usage: Implications for IS theory testing. Management Science, 41(8), 1328-1342.
-
(1995)
Management Science
, vol.41
, Issue.8
, pp. 1328-1342
-
-
Straub, D.W.1
Limayem, M.2
Karahanna, E.3
-
110
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22(4), 441-469.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
111
-
-
0022688942
-
The role of self-efficacy in achieving health behavior change
-
Strecher, V. J., DeVellis, B. M., Becker, M. H., & Rosenstock, I. M. (1986). The role of self-efficacy in achieving health behavior change. Health Education Quarterly, 13(1), 73-91.
-
(1986)
Health Education Quarterly
, vol.13
, Issue.1
, pp. 73-91
-
-
Strecher, V.J.1
Devellis, B.M.2
Becker, M.H.3
Rosenstock, I.M.4
-
112
-
-
0030137327
-
Preventive health psychology from a developmental perspective: An extension of protection motivation theory
-
Sturges, J. W., & Rogers, R. W. (1996). Preventive health psychology from a developmental perspective: An extension of protection motivation theory. Health Psychology, 15(3), 158-166.
-
(1996)
Health Psychology
, vol.15
, Issue.3
, pp. 158-166
-
-
Sturges, J.W.1
Rogers, R.W.2
-
113
-
-
84926351578
-
Crying wolf: An empirical study of SSL warning effectiveness
-
Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., & Cranor, L. F. (2009). Crying wolf: An empirical study of SSL warning effectiveness. In Proceedings of the 18th USENIX Security Symposium.
-
(2009)
Proceedings of the 18Th USENIX Security Symposium
-
-
Sunshine, J.1
Egelman, S.2
Almuhimedi, H.3
Atri, N.4
Cranor, L.F.5
-
114
-
-
44249124273
-
Examining trust in information technology artifacts: The effects of system quality and culture
-
Vance, A., Elie-Dit-Cosaque, C., & Straub, D. W. (2008). Examining trust in information technology artifacts: The effects of system quality and culture. Journal of Management Information Systems, 24(4), 73-100.
-
(2008)
Journal of Management Information Systems
, vol.24
, Issue.4
, pp. 73-100
-
-
Vance, A.1
Elie-Dit-Cosaque, C.2
Straub, D.W.3
-
115
-
-
85081876275
-
Internet Explorer gains Web browser market share from Firefox
-
Vaughan-Nichols, S. J. (2011). Internet Explorer gains Web browser market share from Firefox. ZDNet. Retrieved from http://www.zdnet.com/blog/networking/internet-explorer-gains-web-browser-market-share-from-firefox/743
-
(2011)
Zdnet
-
-
Vaughan-Nichols, S.J.1
-
116
-
-
1542382496
-
User acceptance of information technology: Toward a unified view
-
Venkatesh, V., Morris, M., Davis, G., & Davis, F. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425-478.
-
(2003)
MIS Quarterly
, vol.27
, Issue.3
, pp. 425-478
-
-
Venkatesh, V.1
Morris, M.2
Davis, G.3
Davis, F.4
-
117
-
-
0141816735
-
Analyzing the cost of screening selectee and non-selectee baggage
-
Virta, J. L., Jacobson, S. H., & Kobza, J. E. (2003). Analyzing the cost of screening selectee and non-selectee baggage. Risk Analysis, 23(5), 897-907.
-
(2003)
Risk Analysis
, vol.23
, Issue.5
, pp. 897-907
-
-
Virta, J.L.1
Jacobson, S.H.2
Kobza, J.E.3
-
118
-
-
0023782158
-
The precaution adoption process
-
Weinstein, N. D. (1988). The precaution adoption process. Health Psychology, 7(4), 355-386.
-
(1988)
Health Psychology
, vol.7
, Issue.4
, pp. 355-386
-
-
Weinstein, N.D.1
-
119
-
-
70350343741
-
An examination of the interface between context and theory applied to the study of Chinese organizations
-
Whetten, D. A. (2009). An examination of the interface between context and theory applied to the study of Chinese organizations. Management and Organization Review, 5(1), 29-55.
-
(2009)
Management and Organization Review
, vol.5
, Issue.1
, pp. 29-55
-
-
Whetten, D.A.1
-
120
-
-
67049167702
-
The practice of theory borrowing in organizational studies: Current issues and future directions
-
Whetten, D. A., Felin, T., & King, B. G. (2009). The practice of theory borrowing in organizational studies: Current issues and future directions. Journal of Management, 35(3), 537-563.
-
(2009)
Journal of Management
, vol.35
, Issue.3
, pp. 537-563
-
-
Whetten, D.A.1
Felin, T.2
King, B.G.3
-
121
-
-
75149180454
-
CyberChondria: Studies of the escalation of medical concerns in Web search
-
White, R. W., & Horvitz, E. (2009). CyberChondria: Studies of the escalation of medical concerns in Web search. ACM Transactions on Information Systems, 27(4), 1-37.
-
(2009)
ACM Transactions on Information Systems
, vol.27
, Issue.4
, pp. 1-37
-
-
White, R.W.1
Horvitz, E.2
-
122
-
-
84867343495
-
Fake anti-virus software catches 43 million users’ credit cards
-
Willis, P. (2009). Fake anti-virus software catches 43 million users’ credit cards. Digital Journal. Retrieved from www.digitaljournal.com/article/280746
-
(2009)
Digital Journal
-
-
Willis, P.1
-
123
-
-
0030251478
-
Predicting risk behaviors: Development and validation of a diagnostic scale
-
Witte K., Cameron, K. A., McKeon, J. K., & Berkowitz, J. M. (1996). Predicting risk behaviors: Development and validation of a diagnostic scale. Journal of Health Communication, 1(4), p317-342.
-
(1996)
Journal of Health Communication
, vol.1
, Issue.4
-
-
Witte, K.1
Cameron, K.A.2
McKeon, J.K.3
Berkowitz, J.M.4
-
125
-
-
81855218311
-
Cantina+: A feature-rich machine learning framework for detecting phishing web sites
-
Xiang, G., Hong, J., Rose, C. P., & Cranor, L. (2011). Cantina+: A feature-rich machine learning framework for detecting phishing web sites. ACM Transactions on Information and System Security, 14(2).
-
(2011)
ACM Transactions on Information and System Security
, vol.14
, Issue.2
-
-
Xiang, G.1
Hong, J.2
Rose, C.P.3
Cranor, L.4
-
126
-
-
80051718904
-
Product-related deception in e-commerce: A theoretical perspective
-
Xiao, B., & Benbasat, I. (2011). Product-related deception in e-commerce: A theoretical perspective. MIS Quarterly, 35(1), 169-196.
-
(2011)
MIS Quarterly
, vol.35
, Issue.1
, pp. 169-196
-
-
Xiao, B.1
Benbasat, I.2
-
127
-
-
38349147070
-
Intrusion prevention in information systems: Reactive and proactive responses
-
Yue, W. T., & Çakanyildirim, M. (2007). Intrusion prevention in information systems: Reactive and proactive responses. Journal of Management Information Systems, 24(1), 329-353.
-
(2007)
Journal of Management Information Systems
, vol.24
, Issue.1
, pp. 329-353
-
-
Yue, W.T.1
Çakanyildirim, M.2
-
128
-
-
44249118847
-
Dynamics of trust revision: Using health infomediaries
-
Zahedi, F. M., & Song, J. (2008). Dynamics of trust revision: Using health infomediaries. Journal of Management Information Systems, 24(4), 225-248.
-
(2008)
Journal of Management Information Systems
, vol.24
, Issue.4
, pp. 225-248
-
-
Zahedi, F.M.1
Song, J.2
-
129
-
-
84898190494
-
Phinding phish: Evaluating anti-phishing tools
-
Zhang, Y., Egelman, S., Cranor, L., & Hong, J. (2007). Phinding phish: Evaluating anti-phishing tools. In Proceedings of the 14th Annual Network and Distributed System Security Symposium.
-
(2007)
Proceedings of the 14Th Annual Network and Distributed System Security Symposium
-
-
Zhang, Y.1
Egelman, S.2
Cranor, L.3
Hong, J.4
|