-
1
-
-
14744275332
-
Privacy and rationality in individual decision making
-
Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making, IEEE Security and Privacy, 3: 26-33.
-
(2005)
IEEE Security and Privacy
, vol.3
, pp. 26-33
-
-
Acquisti, A.1
Grossklags, J.2
-
2
-
-
0035999319
-
Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior
-
Ajzen, I. (2002). Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior, Journal of Applied Social Psychology, 32: 665-683.
-
(2002)
Journal of Applied Social Psychology
, vol.32
, pp. 665-683
-
-
Ajzen, I.1
-
3
-
-
51349167484
-
A qualitative study of users' view on information security
-
Albrechtsen, E. (2006). A qualitative study of users' view on information security, Computers & Security, 25: 6, 445-451.
-
(2006)
Computers & Security
, vol.25
, Issue.6
, pp. 445-451
-
-
Albrechtsen, E.1
-
4
-
-
33748660099
-
The roles of perceived shared involvement and information overload in understanding how audiences make meaning of news about bioterrorism
-
Aldoory, L., & Van Dyke, M. A. (2006). The roles of perceived shared involvement and information overload in understanding how audiences make meaning of news about bioterrorism, Journalism & Mass Communication Quarterly, 83: 346-361.
-
(2006)
Journalism & Mass Communication Quarterly
, vol.83
, pp. 346-361
-
-
Aldoory, L.1
Van Dyke, M.A.2
-
5
-
-
84986665106
-
The measurement and antecedents of affective, continuance and normative commitment to the organization
-
Allen, N. J., & Meyer, J. P. (1990). The measurement and antecedents of affective, continuance and normative commitment to the organization, Journal of Occupational Psychology, 63: 1-18.
-
(1990)
Journal of Occupational Psychology
, vol.63
, pp. 1-18
-
-
Allen, N.J.1
Meyer, J.P.2
-
8
-
-
0005959905
-
Development of affective organizational commitment: A cross-sectional examination of change with tenure
-
Beck, K., & Wilson, C. (2000). Development of affective organizational commitment: A cross-sectional examination of change with tenure, Journal of Vocational Behavior, 56: 114-136.
-
(2000)
Journal of Vocational Behavior
, vol.56
, pp. 114-136
-
-
Beck, K.1
Wilson, C.2
-
9
-
-
33746279675
-
The relationship between affective and normative commitment: Review and research agenda
-
Bergman, M. E. (2006). The relationship between affective and normative commitment: Review and research agenda, Journal of Organizational Behavior, 27: 645-663.
-
(2006)
Journal of Organizational Behavior
, vol.27
, pp. 645-663
-
-
Bergman, M.E.1
-
10
-
-
10844269972
-
Invited response to review of –obedience to authority: Current perspectives on the milgram paradigm,—
-
Blass, T. (2000). Invited response to review of –Obedience to authority: Current perspectives on the Milgram paradigm,— British Journal of Educational Psychology, 70: 624-625.
-
(2000)
British Journal of Educational Psychology
, vol.70
, pp. 624-625
-
-
Blass, T.1
-
11
-
-
84992542393
-
On the interchangeability of objective and subjective measures of employee performance: A meta-analysis
-
Bommer, W. H., Johnson, J. L., Rich, G. A., Podsakoff, P. M., & MacKenzie, S. B. (1995). On the interchangeability of objective and subjective measures of employee performance: A meta-analysis, Personnel Psychology, 48: 587-605.
-
(1995)
Personnel Psychology
, vol.48
, pp. 587-605
-
-
Bommer, W.H.1
Johnson, J.L.2
Rich, G.A.3
Podsakoff, P.M.4
MacKenzie, S.B.5
-
14
-
-
33846367309
-
People-often the weakest link in security, but one of the best places to start
-
July- August
-
Bresz, F. P. (2004). People-often the weakest link in security, but one of the best places to start, Journal of Health Care Compliance, July- August: 57-60.
-
(2004)
Journal of Health Care Compliance
, pp. 57-60
-
-
Bresz, F.P.1
-
15
-
-
85023980343
-
Escalation of economic costs, sunk costs, and opportunity costs: A psychological investment perspective
-
Brill D. W., & Molton, P. (2006). Escalation of economic costs, sunk costs, and opportunity costs: A psychological investment perspective, International Journal of Human Decisioning, 12: 29-38.
-
(2006)
International Journal of Human Decisioning
, vol.12
, pp. 29-38
-
-
Brill, D.W.1
Molton, P.2
-
16
-
-
34248522780
-
Central and peripheral routes to persuasion: An individual difference perspective
-
Cacioppo, J. T., Petty, R. E., Kao, C. F., & Rodriguez, R. (1986). Central and peripheral routes to persuasion: An individual difference perspective, Journal of Personality and Social Psychology, 51; 1032-1043.
-
(1986)
Journal of Personality and Social Psychology
, vol.51
, pp. 1032-1043
-
-
Cacioppo, J.T.1
Petty, R.E.2
Kao, C.F.3
Rodriguez, R.4
-
17
-
-
33750922314
-
Ethics in information technology and software use
-
Calluzzo, V. J., & Cante, C. J. (2004). Ethics in information technology and software use. Journal of Business Ethics, 51(3): 301-312.
-
(2004)
Journal of Business Ethics
, vol.51
, Issue.3
, pp. 301-312
-
-
Calluzzo, V.J.1
Cante, C.J.2
-
18
-
-
20144378379
-
Competent jerks, lovable fools, and the formation of social networks
-
Casciaro, T., & Lobo, M. S. (2005). Competent jerks, lovable fools, and the formation of social networks, Harvard Business Review, 83: 92-99.
-
(2005)
Harvard Business Review
, vol.83
, pp. 92-99
-
-
Casciaro, T.1
Lobo, M.S.2
-
19
-
-
19644365309
-
Individuality, willingness to take risk, and use of a personal e-card
-
Charbaji, A., & Jannoun, S. E. L. (2005). Individuality, willingness to take risk, and use of a personal e-card, Journal of Managerial Psychology, 20: 51-58.
-
(2005)
Journal of Managerial Psychology
, vol.20
, pp. 51-58
-
-
Charbaji, A.1
Jannoun, S.2
-
22
-
-
33749468564
-
Security information management as an outsourced service
-
Debar, H., & Viinikka, J. (2006). Security information management as an outsourced service, Information Management & Computer Security, 14:5: 417-435.
-
(2006)
Information Management & Computer Security
, vol.14
, Issue.5
, pp. 417-435
-
-
Debar, H.1
Viinikka, J.2
-
23
-
-
33947529513
-
Information system security and human behavior
-
Denis, T., Trobec, R., Pavei, N., & Tasi, J. F. (2007). Information system security and human behavior, Behavior & Information Technology, 26: 113-118.
-
(2007)
Behavior & Information Technology
, vol.26
, pp. 113-118
-
-
Denis, T.1
Trobec, R.2
Pavei, N.3
Tasi, J.F.4
-
24
-
-
33846794868
-
Phishing for user security awareness
-
Dodge, R. C., Carver, C., & Ferguson, A. J. (2007). Phishing for user security awareness, Computers & Security, 26: 73-80.
-
(2007)
Computers & Security
, vol.26
, pp. 73-80
-
-
Dodge, R.C.1
Carver, C.2
Ferguson, A.J.3
-
26
-
-
33745726919
-
The practically of super bowl advertising for new products and companies
-
Dotterweich, D. P., & Collins, K. S. (2006). The practically of super bowl advertising for new products and companies, Journal of Promotion Management, 11: 19-31.
-
(2006)
Journal of Promotion Management
, vol.11
, pp. 19-31
-
-
Dotterweich, D.P.1
Collins, K.S.2
-
27
-
-
0001762979
-
A cognitive theory of resistance and reactance: Implications for treatment
-
Dowd, E. T., & Seibel, C. A. (1990). A cognitive theory of resistance and reactance: Implications for treatment, Journal of Mental Health Counseling, 12: 458-469.
-
(1990)
Journal of Mental Health Counseling
, vol.12
, pp. 458-469
-
-
Dowd, E.T.1
Seibel, C.A.2
-
28
-
-
39749112353
-
-
Accessed January 29, 2007, from http://www.ftc.gov/bcp/ conline/pubs/buspubs/tsrcomp.htm
-
Federal Trade Commission. (2003). Complying with the telemarketing sales rule. Accessed January 29, 2007, from http://www.ftc.gov/bcp/ conline/pubs/buspubs/tsrcomp.htm
-
(2003)
Complying with the Telemarketing Sales Rule
-
-
-
29
-
-
33646671664
-
Interpersonal communication and compliance: The disrupt-then-reframe technique in dyadic influence settings
-
Fennis, B. M., Das, E., & Pruyn, A. Th. H. (2006). Interpersonal communication and compliance: The disrupt-then-reframe technique in dyadic influence settings, Communication Research, 33(2): 136-151.
-
(2006)
Communication Research
, vol.33
, Issue.2
, pp. 136-151
-
-
Fennis, B.M.1
Das, E.2
Pruyn, A.T.3
-
31
-
-
85023968268
-
Robbing the cradle is like taking candy from a baby, proceedings of the annual conference of the security policy institute (Gcspi), october 4, amsterdam
-
Gao, W., & Kim, J. (2007). Robbing the cradle is like taking candy from a baby, Proceedings of the Annual Conference of the Security Policy Institute (GCSPI), October 4, Amsterdam, The Netherlands, 1, 23-37.
-
(2007)
The Netherlands
, vol.1
, pp. 23-37
-
-
Gao, W.1
Kim, J.2
-
32
-
-
0005632181
-
-
Needham Heights, MA: Allyn-Bacon
-
Gass, R. H., & Seiter, J. S. (1999). Persuasion, Social Influence, and Compliance Gaining. Needham Heights, MA: Allyn-Bacon.
-
(1999)
Persuasion, Social Influence, and Compliance Gaining
-
-
Gass, R.H.1
Seiter, J.S.2
-
33
-
-
24644517491
-
Can you judge a questionnaire by its cover? The effect of questionnaire cover design on mail survey response
-
Gendall, P. (2005). Can you judge a questionnaire by its cover? The effect of questionnaire cover design on mail survey response, International Journal of Public Opinion Research, 17: 346-361.
-
(2005)
International Journal of Public Opinion Research
, vol.17
, pp. 346-361
-
-
Gendall, P.1
-
34
-
-
0003385603
-
Language, social comparison and power
-
C. R. Berger and S. H. Chaffee (Eds.), Newbury Park, CA: Sage
-
Giles, H., & Wiemann, J. M. (1987). Language, social comparison and power. In C. R. Berger and S. H. Chaffee (Eds.), The Handbook of Communication Science (pp. 350-384). Newbury Park, CA: Sage.
-
(1987)
The Handbook of Communication Science
, pp. 350-384
-
-
Giles, H.1
Wiemann, J.M.2
-
35
-
-
67650897413
-
-
June 6, Pittsburgh, PA
-
Grossklags, J., & Acquisti, A. (2007). When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information, Sixth Workshop on the Economics of Information Security (WEIS 2007), June 6, Pittsburgh, PA, 7-18.
-
(2007)
When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information, Sixth Workshop on the Economics of Information Security (WEIS 2007)
, pp. 7-18
-
-
Grossklags, J.1
Acquisti, A.2
-
36
-
-
33645848461
-
People at risk of flooding: Why some residents take precautionary action while others do not
-
Grothmann, T., & Reusswig, F. (2006). People at risk of flooding: Why some residents take precautionary action while others do not, Natural Hazards, 38: 101-120.
-
(2006)
Natural Hazards
, vol.38
, pp. 101-120
-
-
Grothmann, T.1
Reusswig, F.2
-
37
-
-
0007124075
-
A situational theory of publics: Conceptual history, recent challenges and new research
-
D. Moss, T. MacManus, & D. Vercic (Eds.), London: International Thomson Business Press
-
Grunig, J. E. (1997). A situational theory of publics: Conceptual history, recent challenges and new research. In D. Moss, T. MacManus, & D. Vercic (Eds.), Public Relations Research: An International Perspective (pp. 3-48). London: International Thomson Business Press.
-
(1997)
Public Relations Research: An International Perspective
, pp. 3-48
-
-
Grunig, J.E.1
-
38
-
-
0036125972
-
On-line persuasion: An examination of differences in computer-mediated interpersonal influence
-
Guadagno, R. E., & Cialdini, R. B. (2002). On-line persuasion: An examination of differences in computer-mediated interpersonal influence, Group Dynamics: Theory, Research and Practice, 6: 38-51.
-
(2002)
Group Dynamics: Theory, Research and Practice
, vol.6
, pp. 38-51
-
-
Guadagno, R.E.1
Cialdini, R.B.2
-
39
-
-
85107963557
-
The structure of commitment in exchange
-
Gundlach, G. T., Achrol, R. S., & Mentzer, J. T. (1995). The structure of commitment in exchange, Journal of Marketing, 59: 78-92.
-
(1995)
Journal of Marketing
, vol.59
, pp. 78-92
-
-
Gundlach, G.T.1
Achrol, R.S.2
Mentzer, J.T.3
-
40
-
-
0000917858
-
The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
-
(Sept.)
-
Harrington, S. J. (1996). The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions, MIS Quarterly, 20(Sept.): 257-258.
-
(1996)
MIS Quarterly
, vol.20
, pp. 257-258
-
-
Harrington, S.J.1
-
41
-
-
84982737886
-
Obedience to authority in a laboratory setting: Generalizability and context dependency
-
Helm, C., & Morelli, M. (1985). Obedience to authority in a laboratory setting: Generalizability and context dependency, Political Studies, 14: 610-627.
-
(1985)
Political Studies
, vol.14
, pp. 610-627
-
-
Helm, C.1
Morelli, M.2
-
42
-
-
33846389143
-
Smart executives, dumb decisions
-
Hochhauser, M. (2004). Smart executives, dumb decisions, Journal of Risk Management, 51: 64-73.
-
(2004)
Journal of Risk Management
, vol.51
, pp. 64-73
-
-
Hochhauser, M.1
-
43
-
-
84925886526
-
The effects of expertise and physical attractiveness upon opinion agreement and liking
-
Horai, J., Naccari, N., & Fatoullah, E. (1974). The effects of expertise and physical attractiveness upon opinion agreement and liking, Sociometry, 37: 601-606.
-
(1974)
Sociometry
, vol.37
, pp. 601-606
-
-
Horai, J.1
Naccari, N.2
Fatoullah, E.3
-
44
-
-
0037276463
-
An investigation of volitional control in information ethics
-
Hsu, M-H., & Kuo, F-Y. (2003). An investigation of volitional control in information ethics, Behavior and Information Technology, 22: 53-62.
-
(2003)
Behavior and Information Technology
, vol.22
, pp. 53-62
-
-
Hsu, M.-H.1
Kuo, F.-Y.2
-
46
-
-
84993839827
-
A theoretical perspective for understanding reactions to victimization
-
Janoff-Bulman, R., & Frieze, I. H. (1983). A theoretical perspective for understanding reactions to victimization, Journal of Social Issues, 39: 1-17.
-
(1983)
Journal of Social Issues
, vol.39
, pp. 1-17
-
-
Janoff-Bulman, R.1
Frieze, I.H.2
-
47
-
-
0026467452
-
Protecting the self from the negative consequences of risky decisions
-
Josephs, R. A., Larrick, R. P., Steele, M., & Nisbett, R. E. (1992). Protecting the self from the negative consequences of risky decisions, Journal of Personality and Social Psychology, 62: 26-37.
-
(1992)
Journal of Personality and Social Psychology
, vol.62
, pp. 26-37
-
-
Josephs, R.A.1
Larrick, R.P.2
Steele, M.3
Nisbett, R.E.4
-
48
-
-
39749188622
-
Disruptive technologies and the evolution of the law
-
Keck, R. (2005). Disruptive technologies and the evolution of the law, Legal Briefs, 23(1): 22-49.
-
(2005)
Legal Briefs
, vol.23
, Issue.1
, pp. 22-49
-
-
Keck, R.1
-
50
-
-
85024035089
-
Communities of practice and communities of trust: Global culture and information technology
-
Komlto, L. (1994). Communities of practice and communities of trust: Global culture and information technology, Journal of Anthropology, 4: 33-45.
-
(1994)
Journal of Anthropology
, vol.4
, pp. 33-45
-
-
Komlto, L.1
-
52
-
-
84986356306
-
Ethical intentions and the theories of reasoned action and planned behavior
-
Kurland, N. B. (1995). Ethical intentions and the theories of reasoned action and planned behavior. Journal of Applied Social Psychology, 25(4): 297-313.
-
(1995)
Journal of Applied Social Psychology
, vol.25
, Issue.4
, pp. 297-313
-
-
Kurland, N.B.1
-
53
-
-
0345764837
-
Improving user security behavior
-
Leach, J. (2003). Improving user security behavior, Computers & Security, 22: 685-691.
-
(2003)
Computers & Security
, vol.22
, pp. 685-691
-
-
Leach, J.1
-
54
-
-
84965799600
-
On being mugged: The event and its aftermath
-
Lejeune, R., & Alex, N. (1973). On being mugged: The event and its aftermath, Urban Life and Culture, 2: 259-287.
-
(1973)
Urban Life and Culture
, vol.2
, pp. 259-287
-
-
Lejeune, R.1
Alex, N.2
-
55
-
-
60049089661
-
Clueless office workers help spread computer viruses, the register
-
Leyden, J. (2004). Clueless office workers help spread computer viruses, The Register, February 6: 17-21.
-
(2004)
February
, vol.6
, pp. 17-21
-
-
Leyden, J.1
-
56
-
-
26644460676
-
Anticipated guilt as behavioral motivation: An examination of appeals to help unknown others through bone marrow donation
-
Lindsey, L. L. M. (2005). Anticipated guilt as behavioral motivation: An examination of appeals to help unknown others through bone marrow donation, Human Communication Research, 31: 453-481.
-
(2005)
Human Communication Research
, vol.31
, pp. 453-481
-
-
Lindsey, L.1
-
57
-
-
39749172221
-
-
Orlando, FL: The Information Law Web. Accessed November 5, 2007, at http://fioridalawfirm.com/privacy.html
-
Losey, R. C. (1998). The electronic communications privacy act: United States Code. Orlando, FL: The Information Law Web. Accessed November 5, 2007, at http://fioridalawfirm.com/privacy.html
-
(1998)
The Electronic Communications Privacy Act: United States Code
-
-
Losey, R.C.1
-
58
-
-
84948872568
-
Scarcity's enhancement of desirability
-
Lynn, M. (1992). Scarcity's enhancement of desirability, Basic and Applied Social Psychology, 13: 67-78.
-
(1992)
Basic and Applied Social Psychology
, vol.13
, pp. 67-78
-
-
Lynn, M.1
-
59
-
-
84965484852
-
Assessing organizational commitment: An employee's global attitude toward the organization
-
McCaul, H. S., Hinsz, V. B., & McCaul, K. D. (1995). Assessing organizational commitment: An employee's global attitude toward the organization, Journal of Applied Behavioral Science, 31: 80-90.
-
(1995)
Journal of Applied Behavioral Science
, vol.31
, pp. 80-90
-
-
McCaul, H.S.1
Hinsz, V.B.2
McCaul, K.D.3
-
60
-
-
0031724051
-
Hoarding: What does it mean?
-
Melamed, Y., Szor, H., Barak, Y., & Elizur, A. (1998). Hoarding: What does it mean? Comprehensive Psychiatry, 39: 400-402.
-
(1998)
Comprehensive Psychiatry
, vol.39
, pp. 400-402
-
-
Melamed, Y.1
Szor, H.2
Barak, Y.3
Elizur, A.4
-
63
-
-
0033622371
-
Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory
-
Milne, S., Sheeran, P., & Orbell, S. (2000). Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory, Journal of Applied Social Psychology, (30): 106-143.
-
(2000)
Journal of Applied Social Psychology
, Issue.30
, pp. 106-143
-
-
Milne, S.1
Sheeran, P.2
Orbell, S.3
-
65
-
-
33845715263
-
The measurement of organizational commitment
-
Mowday, R. T., Steers, R. T., & Porter, L. W. (1979). The measurement of organizational commitment, Journal of Vocational Behavior, 14: 224-247.
-
(1979)
Journal of Vocational Behavior
, vol.14
, pp. 224-247
-
-
Mowday, R.T.1
Steers, R.T.2
Porter, L.W.3
-
66
-
-
60049100586
-
Snms - shadow network management system, symposium on network computing and management, singapore
-
Ong, T. H., Tan, C. P., Tan, Y. T., & Ting, C. (1999). SNMS - Shadow network management system, Symposium on Network Computing and Management, Singapore, May 21, 1-9.
-
(1999)
May
, vol.21
, pp. 1-9
-
-
Ong, T.H.1
Tan, C.P.2
Tan, Y.T.3
Ting, C.4
-
69
-
-
0037396112
-
What to convey in antismoking advertisements of adolescents: The use of protection motivation theory to identify effective message themes
-
Pechmann, C., Zhao, G., Goldberg, M., & Reibling E. T. (2003). What to convey in antismoking advertisements of adolescents: The use of protection motivation theory to identify effective message themes, Journal of Marketing, 67(2): 1-18.
-
(2003)
Journal of Marketing
, vol.67
, Issue.2
, pp. 1-18
-
-
Pechmann, C.1
Zhao, G.2
Goldberg, M.3
Reibling, E.T.4
-
72
-
-
85047671982
-
Thought confidence as a determinant of persuasion: The self-validation hypothesis
-
Petty, R. E., Brinol, P., & Tormala, Z. L. (2002). Thought confidence as a determinant of persuasion: The self-validation hypothesis, Journal of Personality and Social Psychology, 82: 722-741.
-
(2002)
Journal of Personality and Social Psychology
, vol.82
, pp. 722-741
-
-
Petty, R.E.1
Brinol, P.2
Tormala, Z.L.3
-
74
-
-
0000428577
-
Central and peripheral routes to advertising effectiveness: The moderating role of involvement
-
Petty, R. E., Cacioppo, J. T., & Schumann, D. W. (1983). Central and peripheral routes to advertising effectiveness: The moderating role of involvement, Journal of Consumer Research, 10: 135-146.
-
(1983)
Journal of Consumer Research
, vol.10
, pp. 135-146
-
-
Petty, R.E.1
Cacioppo, J.T.2
Schumann, D.W.3
-
75
-
-
0004254964
-
-
4th ed.). New York: Worth Publishers
-
Plomin, R., DeFries, J. C., McClearn, G. E., & McGuffin, P. (2001). Behavioral Genetics (4th ed.). New York: Worth Publishers.
-
(2001)
Behavioral Genetics
-
-
Plomin, R.1
DeFries, J.C.2
McClearn, G.E.3
McGuffin, P.4
-
76
-
-
21444458113
-
Why do we need what we need? A terror management perspective on the roots of human social motivation,"
-
Pyszczynski, T., Greenberg, J., & Solomon, S. (1997). Why do we need what we need? A terror management perspective on the roots of human social motivation," Psychological Inquiry, 8: 1-20.
-
(1997)
Psychological Inquiry
, vol.8
, pp. 1-20
-
-
Pyszczynski, T.1
Greenberg, J.2
Solomon, S.3
-
77
-
-
0030919502
-
The association between illusions of invulnerability and exposure to trauma
-
Roe-Berning, S., & Straker, G. (1997). The association between illusions of invulnerability and exposure to trauma, Journal of Traumatic Stress, 10: 319-327.
-
(1997)
Journal of Traumatic Stress
, vol.10
, pp. 319-327
-
-
Roe-Berning, S.1
Straker, G.2
-
78
-
-
0001840352
-
A protection motivation theory of fear appeals and attitude change
-
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change, Journal of Psychology, 91: 93-114.
-
(1975)
Journal of Psychology
, vol.91
, pp. 93-114
-
-
Rogers, R.W.1
-
79
-
-
84973744422
-
Historical origins of the health belief model
-
Rosenstock, I. M. (1974). Historical origins of the health belief model, Health Education Monograph, 2: 328-335.
-
(1974)
Health Education Monograph
, vol.2
, pp. 328-335
-
-
Rosenstock, I.M.1
-
80
-
-
33846849570
-
Organizational security culture: Extending the end-user perspective
-
Ruighaver, A. B., Maynard, S. B., & Chang, S. (2007). Organizational security culture: Extending the end-user perspective, Computers and Security, 26(1): 56-62.
-
(2007)
Computers and Security
, vol.26
, Issue.1
, pp. 56-62
-
-
Ruighaver, A.B.1
Maynard, S.B.2
Chang, S.3
-
81
-
-
85023971931
-
-
Report of the U.S. Department of Justice, INET'99 Conference. Retrieved February 6, 2007, from: http://www.isoc.org/inet99/proceedings/3g/3g_2.htm
-
Rusch, J. J. (1999). The social engineering of Internet fraud. Report of the U.S. Department of Justice, INET'99 Conference. Retrieved February 6, 2007, from: http://www.isoc.org/inet99/proceedings/3g/3g_2.htm
-
(1999)
The Social Engineering of Internet Fraud
-
-
Rusch, J.J.1
-
82
-
-
45949118681
-
Scarcity or abundance caused by people or the environment as determinants of behavior in the resource dilemma
-
Rutte, C. G., Wilke, H. A. M., & Messick, D. M. (1987). Scarcity or abundance caused by people or the environment as determinants of behavior in the resource dilemma, Journal of Experimental Social Psychology, 23: 208-216.
-
(1987)
Journal of Experimental Social Psychology
, vol.23
, pp. 208-216
-
-
Rutte, C.G.1
Wilke, H.2
Messick, D.M.3
-
84
-
-
0009206503
-
Employee absenteeism, organizational commitment, and job satisfaction: Another look
-
Sagie, A. (1998). Employee absenteeism, organizational commitment, and job satisfaction: Another look, Journal of Vocational Behavior, 52: 156-171.
-
(1998)
Journal of Vocational Behavior
, vol.52
, pp. 156-171
-
-
Sagie, A.1
-
85
-
-
0035387175
-
Transforming the weakest link-a human/computer interaction approach to usable and effective security
-
Sasse, M. A., Brostoff, S., & Weirich, D. (2004). Transforming the weakest link-A human/computer interaction approach to usable and effective security, BT Technology Journal, 19(3): 122-131.
-
(2004)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
86
-
-
0007026070
-
Enforcement policy and corporate misconduct: The changing perspective of deterrence theory
-
Scholz, J. T. (1997). Enforcement policy and corporate misconduct: The changing perspective of deterrence theory, Law and Contemporary Problem, (60): 153-268.
-
(1997)
Law and Contemporary Problem
, Issue.60
, pp. 153-268
-
-
Scholz, J.T.1
-
87
-
-
84936043926
-
Corporate advertising in america: A review of published studies on use, measurement, and effectiveness
-
September
-
Schumann, D. W., Hathcote, J. M., & West, S. (1991). Corporate advertising in America: A review of published studies on use, measurement, and effectiveness, Journal of Advertising September: 35-55.
-
(1991)
Journal of Advertising
, pp. 35-55
-
-
Schumann, D.W.1
Hathcote, J.M.2
West, S.3
-
89
-
-
3943061616
-
Intrusion detection: The art and the practice
-
Sherif, J. S., Ayers, R., & Dearmond, T. G. (2003). Intrusion detection: The art and the practice, Information Management and Computer Security, 11(4): 175-186.
-
(2003)
Information Management and Computer Security
, vol.11
, Issue.4
, pp. 175-186
-
-
Sherif, J.S.1
Ayers, R.2
Dearmond, T.G.3
-
90
-
-
77649328070
-
The office now a major place for identity theft
-
(Sept.): 1-4
-
Shreve, M. (2004). The office now a major place for identity theft, Crains, (Sept.): 1-4.
-
(2004)
Crains
-
-
Shreve, M.1
-
91
-
-
0000815341
-
The escalation of commitment to a course of action
-
Staw, B. M. (1981). The escalation of commitment to a course of action, The Academy of Management Review, 6: 577-587.
-
(1981)
The Academy of Management Review
, vol.6
, pp. 577-587
-
-
Staw, B.M.1
-
94
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations: A field study, mis quarterly
-
Straub, D. W., & Nance, W. D. (1990). Discovering and disciplining computer abuse in organizations: A field study, MIS Quarterly, March 14: 45-62.
-
(1990)
March
, vol.14
, pp. 45-62
-
-
Straub, D.W.1
Nance, W.D.2
-
95
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision-making
-
Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision-making, MIS Quarterly, 22: 441-469.
-
(1998)
MIS Quarterly
, vol.22
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
96
-
-
0001868677
-
The social identity theory of inter-group behavior
-
S. Worchel & L. W. Austin (Eds.), Chicago, IL: Nelson-Hall
-
Tajfel, H., & Turner, J. C. (1986). The social identity theory of inter-group behavior. In S. Worchel & L. W. Austin (Eds.), Psychology of Intergroup Relations. Chicago, IL: Nelson-Hall.
-
(1986)
Psychology of Intergroup Relations
-
-
Tajfel, H.1
Turner, J.C.2
-
97
-
-
24644470542
-
The insider threat to information systems and the effectiveness of iso17799
-
Theoharidou, M., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2005). The insider threat to information systems and the effectiveness of ISO17799, Computers and Security, 24: 472-484.
-
(2005)
Computers and Security
, vol.24
, pp. 472-484
-
-
Theoharidou, M.1
Kokolakis, S.2
Karyda, M.3
Kiountouzis, E.4
-
99
-
-
39749183298
-
Violation of 18 usc. Gaining unauthorized access
-
U.S. Department of Justice
-
U.S. Department of Justice. (2004). Violation of 18 USC. Gaining unauthorized access. Information Security Report of the GAO, 17: 188-219.
-
(2004)
Information Security Report of the GAO
, vol.17
, pp. 188-219
-
-
-
100
-
-
3042812983
-
The 10 deadly sins of information security management
-
von Solms, B., & von Solms, R. (2004). The 10 deadly sins of information security management, Computers & Security, 23: 371-376.
-
(2004)
Computers & Security
, vol.23
, pp. 371-376
-
-
Von Solms, B.1
Von Solms, R.2
-
101
-
-
33745700454
-
Examining user perceptions of third-party organization credibility and trust in an e-retailer
-
Wakefield, R. L., & Whitten, D. (2006). Examining user perceptions of third-party organization credibility and trust in an e-retailer, Journal of Organizational and End User Computing, 18: 1-19.
-
(2006)
Journal of Organizational and End User Computing
, vol.18
, pp. 1-19
-
-
Wakefield, R.L.1
Whitten, D.2
-
102
-
-
4544277953
-
Psychological antecedents of institution-based consumer trust in e-retailing
-
Walczuch, R., & Lundgren, H. (2004). Psychological antecedents of institution-based consumer trust in e-retailing, Information & Management, 42(1): 159-177.
-
(2004)
Information & Management
, vol.42
, Issue.1
, pp. 159-177
-
-
Walczuch, R.1
Lundgren, H.2
-
103
-
-
9244224654
-
An overview of online trust: Concepts, elements, and implications
-
Wang, Y. D., & Emurian, H. H. (2005). An overview of online trust: Concepts, elements, and implications, Journal of Computers in Human Behavior, 21: 105-125.
-
(2005)
Journal of Computers in Human Behavior
, vol.21
, pp. 105-125
-
-
Wang, Y.D.1
Emurian, H.H.2
-
104
-
-
39749131478
-
Social influence as stimulus control
-
Weatherly, J. N., Miller, K., & McDonald, T. W. (1999). Social influence as stimulus control, Behavior and Social Issues, 9: 25-46.
-
(1999)
Behavior and Social Issues
, vol.9
, pp. 25-46
-
-
Weatherly, J.N.1
Miller, K.2
McDonald, T.W.3
-
105
-
-
33846345293
-
Understanding the offender/environment dynamic for computer crimes: Assessing the feasibility of applying criminology theory to the is security context
-
January 5, Waikoloa, Hawaii
-
Wilson, R. (2004). Understanding the offender/environment dynamic for computer crimes: Assessing the feasibility of applying criminology theory to the IS security context, Proceedings from the 37th Hawaii International Conference on System Sciences (HICSS), January 5, Waikoloa, Hawaii, 1-10.
-
(2004)
Th Hawaii International Conference on System Sciences (HICSS)
, pp. 1-10
-
-
Wilson, R.1
-
106
-
-
33846393137
-
Observance and contravention of information security measures
-
SAM01 June 16, Las Vegas, NV
-
Workman, M., & Gathegi, J. (2005). Observance and contravention of information security measures, Proceedings of the World Conference on Security Management and Applied Computing, SAM01 June 16, Las Vegas, NV, 241-247.
-
(2005)
Proceedings of the World Conference on Security Management and Applied Computing
, pp. 241-247
-
-
Workman, M.1
Gathegi, J.2
-
108
-
-
27144550225
-
Are the drivers and role of online trust the same for all web sites and consumers?: A large scale exploratory empirical study
-
Yakov, B., Shankar, V., Sultan, F., & Urban G. L. (2005). Are the drivers and role of online trust the same for all web sites and consumers?: A large scale exploratory empirical study, Journal of Marketing, 69 (4): 133-152.
-
(2005)
Journal of Marketing
, vol.69
, Issue.4
, pp. 133-152
-
-
Yakov, B.1
Shankar, V.2
Sultan, F.3
Urban, G.L.4
-
109
-
-
33646689546
-
Investigating initial trust toward e-tailers from the elaboration likelihood model perspective
-
Yang, S., Hung, W., Sung, K., & Farn, C. (2006). Investigating initial trust toward e-tailers from the elaboration likelihood model perspective, Psychology and Marketing, 23: 429-445.
-
(2006)
Psychology and Marketing
, vol.23
, pp. 429-445
-
-
Yang, S.1
Hung, W.2
Sung, K.3
Farn, C.4
|